09=>0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x0, "0d4abfd4b32220"}) r184 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000840)={0x0, 0xfaef, 0xffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r184, 0x0) r185 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r185, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r185, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0xfffffffffffffeff, 0x1) sendto$inet(r185, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b300)={0xffff, [{r72, r60}, {}, {r110}, {r160}, {}, {r171}, {}, {}, {r103}, {}, {r134}, {}, {0x0, r52}, {0x0, r40}, {0x0, r181}, {r127, r14}, {r159, r32}, {r176, r58}, {}, {r13, r175}, {0x0, r179}, {r11}, {r19, r24}, {r28}, {r129}, {0x0, r33}, {}, {}, {}, {r104, r49}, {}, {}, {r47}, {r116, r157}, {0x0, r9}, {r56}, {0x0, r38}, {0x0, r37}, {}, {}, {0x0, r173}, {}, {r104, r32}, {r126}, {r107, r142}, {0x0, r124}, {}, {}, {0x0, r61}, {}, {}, {0x0, r117}, {r116}, {r66}, {r89, r99}, {}, {}, {}, {r167}, {r34}, {0x0, r151}, {}, {}, {r72}, {0x0, r96}, {}, {}, {0x0, r80}, {r78, r136}, {r41}, {0x0, r80}, {}, {0x0, r85}, {r55}, {0x0, r50}, {r25, r169}, {r6}, {r62}, {r178, r12}, {r174}, {0x0, r22}, {r17, r173}, {r46}, {}, {r138, r75}, {r36, r31}, {}, {}, {r139, r100}, {0x0, r92}, {r108}, {r69}, {r180}, {}, {}, {r160}, {r172}, {}, {0x0, r112}, {r101, r7}, {0x0, r143}, {r91}, {}, {r93}, {}, {r95}, {0x0, r114}, {0x0, r133}, {r115}, {}, {r23}, {0x0, r68}, {r51}, {0x0, r90}, {0x0, r109}, {r57, r166}, {0x0, r155}, {r15, r29}, {}, {r97}, {r101, r120}, {}, {r83, r117}, {}, {0x0, r102}, {}, {r180}, {}, {}, {}, {r71}, {r154, r148}, {}, {r153, r65}, {}, {r158, r79}, {0x0, r183}, {r137, r54}, {r42}, {}, {}, {0x0, r48}, {r39}, {}, {0x0, r18}, {r137}, {r164}, {r145}, {0x0, r142}, {}, {r70, r122}, {r20, r105}, {r119}, {r182}, {r113, r45}, {}, {}, {0x0, r100}, {r72}, {}, {0x0, r128}, {0x0, r81}, {r140}, {}, {r170, r84}, {r97}, {}, {r10, r38}, {r176}, {}, {r47, r106}, {0x0, r142}, {r113}, {}, {r144}, {r69}, {r57}, {0x0, r161}, {0x0, r35}, {r87}, {0x0, r53}, {}, {r118, r106}, {0x0, r76}, {r123, r149}, {r121}, {}, {}, {r8}, {}, {}, {}, {}, {}, {r150, r130}, {}, {r180, r35}, {r94, r90}, {r82}, {r72}, {r16}, {}, {r134, r44}, {0x0, r88}, {r123}, {r129}, {r98}, {}, {}, {0x0, r163}, {0x0, r27}, {r156}, {0x0, r63}, {0x0, r43}, {0x0, r59}, {0x0, r43}, {0x0, r27}, {r121, r67}, {}, {r86, r43}, {0x0, r165}, {r34}, {0x0, r73}, {r30, r147}, {}, {}, {}, {}, {0x0, r146}, {r56, r31}, {r115}, {r144, r21}, {r64}, {0x0, r141}, {}, {r135}, {}, {r132, r84}, {0x0, r163}, {0x0, r111}, {0x0, r125}, {0x0, r100}, {}, {0x0, r177}, {r16}, {r178, r152}, {}, {r62, r33}, {r162, r168}, {}, {}, {r26}, {0x0, r74}, {r56, r131}, {r77}], 0x0, "e8da0117d3c471"}) 02:21:19 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000f00000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:19 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000700daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 903.717573][T11468] loop4: detected capacity change from 0 to 4096 [ 903.731215][T11475] loop1: detected capacity change from 0 to 4 [ 903.731479][T11472] loop3: detected capacity change from 0 to 4096 [ 903.744967][T11474] loop2: detected capacity change from 0 to 4096 [ 903.752183][T11475] EXT4-fs (loop1): #clusters per group too big: 32768 [ 903.760207][T11472] EXT4-fs (loop3): inodes count not valid: 5571360 vs 32 02:21:19 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001001800daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:19 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000001000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 903.779599][T11468] EXT4-fs (loop4): Invalid log block size: 15 [ 903.789010][T11474] EXT4-fs (loop2): bad geometry: block count 521 exceeds size of device (512 blocks) [ 903.809795][T11475] loop1: detected capacity change from 0 to 4 [ 903.822035][T11475] EXT4-fs (loop1): #clusters per group too big: 32768 02:21:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000250002000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:19 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20035f000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 903.865474][T11474] loop2: detected capacity change from 0 to 4096 [ 903.879071][T11474] EXT4-fs (loop2): bad geometry: block count 521 exceeds size of device (512 blocks) [ 903.896616][T11515] loop1: detected capacity change from 0 to 4 [ 903.903712][T11516] loop3: detected capacity change from 0 to 4096 02:21:19 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001001c00daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000a02000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:19 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200060000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 903.910571][T11520] loop4: detected capacity change from 0 to 4096 [ 903.917624][T11515] EXT4-fs (loop1): #clusters per group too big: 32768 [ 903.925381][T11516] EXT4-fs (loop3): inodes count not valid: 6226720 vs 32 [ 903.945028][T11515] loop1: detected capacity change from 0 to 4 [ 903.955978][T11520] EXT4-fs (loop4): Invalid log block size: 16 02:21:19 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001002000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000002e0002000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 903.969210][T11515] EXT4-fs (loop1): #clusters per group too big: 32768 [ 903.989179][T11537] loop2: detected capacity change from 0 to 4096 [ 904.019133][T11545] loop3: detected capacity change from 0 to 4096 [ 904.025962][T11537] EXT4-fs (loop2): bad geometry: block count 522 exceeds size of device (512 blocks) [ 904.038352][T11549] loop1: detected capacity change from 0 to 4 [ 904.047429][T11545] EXT4-fs (loop3): inodes count not valid: 6291488 vs 32 [ 904.059722][T11549] EXT4-fs (loop1): #clusters per group too big: 32768 02:21:20 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x97, 0x0, 0x7, 0x0, 0x0, 0x28300, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x418, 0x0, @perf_config_ext={0x4118, 0x100}, 0x800, 0x7, 0x0, 0x8, 0x0, 0xed7, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x3b, 0x5, 0x0, 0x0, 0xcc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xcb8, 0x80}, 0x480, 0xffffffffffffffe0, 0x0, 0x0, 0x20, 0x0, 0x173, 0x0, 0x4bf, 0x0, 0xe408}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000f00)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000004c0)={0x53, 0xffffffffffffffff, 0x2e, 0x6, @scatter={0x2, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000d40)=""/136, 0x88}, {&(0x7f0000000e00)=""/208, 0xd0}]}, &(0x7f00000001c0)="e49d028c0715e20b5104226936005973918fe159f86d8e030acfa71b168531e97c8c98e798097a3c8229ad24d9cb", &(0x7f0000000540)=""/101, 0x15, 0x10000, 0x2, &(0x7f0000000340)}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x10\'\\@$&\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055300)={0x8f7, [{0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r5}, {}, {}, {r3}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {r3}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, r4}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x0, "0d4abfd4b32220"}) r184 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000840)={0x0, 0xfaef, 0xffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r184, 0x0) r185 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r185, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r185, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0xfffffffffffffeff, 0x1) sendto$inet(r185, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b300)={0xffff, [{r72, r60}, {}, {r110}, {r160}, {}, {r171}, {}, {}, {r103}, {}, {r135}, {}, {0x0, r52}, {0x0, r40}, {0x0, r181}, {r127, r14}, {r159, r32}, {r176, r58}, {}, {r13, r175}, {0x0, r179}, {r11}, {r19, r24}, {r28}, {r129}, {0x0, r33}, {}, {}, {}, {r104, r49}, {}, {}, {r47}, {r116, r157}, {0x0, r9}, {r56}, {0x0, r38}, {0x0, r37}, {}, {}, {0x0, r173}, {}, {r104, r32}, {r126}, {r107, r143}, {0x0, r124}, {}, {}, {0x0, r61}, {}, {}, {0x0, r117}, {r116}, {r66}, {r89, r99}, {}, {}, {}, {r167}, {r34}, {r131}, {}, {}, {r72}, {0x0, r96}, {}, {}, {0x0, r80}, {r78, r137}, {r41}, {0x0, r80}, {}, {0x0, r85}, {r55}, {0x0, r50}, {r25, r169}, {r6}, {r62}, {r178, r12}, {r174}, {0x0, r22}, {r17, r173}, {r46}, {}, {r139, r75}, {r36, r31}, {}, {}, {r140, r100}, {0x0, r92}, {r108}, {r69}, {r180}, {}, {}, {r160}, {r172}, {}, {0x0, r112}, {r101, r7}, {0x0, r144}, {r91}, {}, {r93}, {}, {r95}, {0x0, r114}, {0x0, r134}, {r115}, {}, {r23}, {0x0, r68}, {r51}, {0x0, r90}, {0x0, r109}, {r57, r166}, {0x0, r155}, {r15, r29}, {}, {r97}, {r101, r120}, {}, {r83, r117}, {}, {0x0, r102}, {}, {r180}, {}, {}, {}, {r71}, {r154, r149}, {}, {r153, r65}, {}, {r158, r79}, {0x0, r183}, {r138, r54}, {r42}, {}, {}, {0x0, r48}, {r39}, {}, {0x0, r18}, {r138}, {r164}, {r146}, {0x0, r143}, {}, {r70, r122}, {r20, r105}, {r119}, {r182}, {r113, r45}, {}, {}, {0x0, r100}, {r72}, {}, {0x0, r128}, {0x0, r81}, {r141}, {}, {r170, r84}, {r97}, {}, {r10, r38}, {r176}, {}, {r47, r106}, {0x0, r143}, {r113}, {}, {r145}, {r69}, {r57}, {0x0, r161}, {0x0, r35}, {r87}, {0x0, r53}, {}, {r118, r106}, {0x0, r76}, {r123, r150}, {r121}, {}, {}, {r8}, {}, {}, {}, {}, {}, {r151, r130}, {}, {r180, r35}, {r94, r90}, {r82}, {r72}, {r16}, {}, {r135, r44}, {0x0, r88}, {r123}, {r129}, {r98}, {}, {}, {0x0, r163}, {0x0, r27}, {r156}, {0x0, r63}, {0x0, r43}, {0x0, r59}, {0x0, r43}, {0x0, r27}, {r121, r67}, {}, {r86, r43}, {0x0, r165}, {r34}, {0x0, r73}, {r30, r148}, {}, {}, {}, {}, {0x0, r147}, {r56, r31}, {r115}, {r145, r21}, {r64}, {0x0, r142}, {}, {r136}, {}, {r133, r84}, {0x0, r163}, {0x0, r111}, {0x0, r125}, {0x0, r100}, {}, {0x0, r177}, {r16}, {r178, r152}, {}, {r62, r33}, {r162, r168}, {}, {}, {r26}, {0x0, r74}, {r56, r132}, {r77}], 0x0, "e8da0117d3c471"}) 02:21:20 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001002600daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:20 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200068000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000b02000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000480002000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:20 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000001100000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:20 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001052a00daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 904.628330][T11574] loop3: detected capacity change from 0 to 4096 [ 904.638192][T11578] loop2: detected capacity change from 0 to 4096 [ 904.642857][T11577] loop4: detected capacity change from 0 to 4096 [ 904.652071][ C1] scsi_io_completion_action: 4 callbacks suppressed [ 904.652097][ C1] sd 0:0:1:0: tag#5251 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 904.654133][T11580] loop1: detected capacity change from 0 to 4 02:21:20 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001003f00daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 904.658839][ C1] sd 0:0:1:0: tag#5251 CDB: opcode=0xe5 (vendor) [ 904.681205][ C1] sd 0:0:1:0: tag#5251 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 904.690517][ C1] sd 0:0:1:0: tag#5251 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 904.694217][T11577] EXT4-fs (loop4): Invalid log block size: 17 [ 904.699573][ C1] sd 0:0:1:0: tag#5251 CDB[20]: ba [ 904.707992][T11580] EXT4-fs (loop1): #clusters per group too big: 32768 02:21:20 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001004000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 904.733405][T11574] EXT4-fs (loop3): inodes count not valid: 6815776 vs 32 [ 904.748733][T11578] EXT4-fs (loop2): bad geometry: block count 523 exceeds size of device (512 blocks) [ 904.750041][ C1] sd 0:0:1:0: tag#5252 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 904.768246][ C1] sd 0:0:1:0: tag#5252 CDB: opcode=0xe4 (vendor) [ 904.774612][ C1] sd 0:0:1:0: tag#5252 CDB[00]: e4 9d 02 8c 07 15 e2 0b 51 04 22 69 36 00 59 73 02:21:20 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001048000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:20 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001fffe00daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:20 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001feff00daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 904.783633][ C1] sd 0:0:1:0: tag#5252 CDB[10]: 91 8f e1 59 f8 6d 8e 03 0a cf a7 1b 16 85 31 e9 [ 904.792677][ C1] sd 0:0:1:0: tag#5252 CDB[20]: 7c 8c 98 e7 98 09 7a 3c 82 29 ad 24 d9 cb [ 904.834777][T11578] loop2: detected capacity change from 0 to 4096 [ 904.854141][T11580] loop1: detected capacity change from 0 to 4 [ 904.867559][T11580] EXT4-fs (loop1): #clusters per group too big: 32768 [ 904.884465][T11578] EXT4-fs (loop2): bad geometry: block count 523 exceeds size of device (512 blocks) 02:21:20 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x97, 0x0, 0x7, 0x0, 0x0, 0x28300, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x418, 0x0, @perf_config_ext={0x4118, 0x100}, 0x800, 0x7, 0x0, 0x8, 0x0, 0xed7, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x3b, 0x5, 0x0, 0x0, 0xcc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xcb8, 0x80}, 0x480, 0xffffffffffffffe0, 0x0, 0x0, 0x20, 0x0, 0x173, 0x0, 0x4bf, 0x0, 0xe408}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000f00)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000004c0)={0x53, 0xffffffffffffffff, 0x2e, 0x6, @scatter={0x2, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000d40)=""/136, 0x88}, {&(0x7f0000000e00)=""/208, 0xd0}]}, &(0x7f00000001c0)="e49d028c0715e20b5104226936005973918fe159f86d8e030acfa71b168531e97c8c98e798097a3c8229ad24d9cb", &(0x7f0000000540)=""/101, 0x15, 0x10000, 0x2, &(0x7f0000000340)}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x10\'\\@$&\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055300)={0x8f7, [{0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r5}, {}, {}, {r3}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {r3}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, r4}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x0, "0d4abfd4b32220"}) r184 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000840)={0x0, 0xfaef, 0xffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r184, 0x0) r185 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r185, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r185, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0xfffffffffffffeff, 0x1) sendto$inet(r185, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b300)={0xffff, [{r72, r60}, {}, {r110}, {r160}, {}, {r171}, {}, {}, {r103}, {}, {r135}, {}, {0x0, r52}, {0x0, r40}, {0x0, r181}, {r127, r14}, {r159, r32}, {r176, r58}, {}, {r13, r175}, {0x0, r179}, {r11}, {r19, r24}, {r28}, {r129}, {0x0, r33}, {}, {}, {}, {r104, r49}, {}, {}, {r47}, {r116, r157}, {0x0, r9}, {r56}, {0x0, r38}, {0x0, r37}, {}, {}, {0x0, r173}, {}, {r104, r32}, {r126}, {r107, r143}, {0x0, r124}, {}, {}, {0x0, r61}, {}, {}, {0x0, r117}, {r116}, {r66}, {r89, r99}, {}, {}, {}, {r167}, {r34}, {r131}, {}, {}, {r72}, {0x0, r96}, {}, {}, {0x0, r80}, {r78, r137}, {r41}, {0x0, r80}, {}, {0x0, r85}, {r55}, {0x0, r50}, {r25, r169}, {r6}, {r62}, {r178, r12}, {r174}, {0x0, r22}, {r17, r173}, {r46}, {}, {r139, r75}, {r36, r31}, {}, {}, {r140, r100}, {0x0, r92}, {r108}, {r69}, {r180}, {}, {}, {r160}, {r172}, {}, {0x0, r112}, {r101, r7}, {0x0, r144}, {r91}, {}, {r93}, {}, {r95}, {0x0, r114}, {0x0, r134}, {r115}, {}, {r23}, {0x0, r68}, {r51}, {0x0, r90}, {0x0, r109}, {r57, r166}, {0x0, r155}, {r15, r29}, {}, {r97}, {r101, r120}, {}, {r83, r117}, {}, {0x0, r102}, {}, {r180}, {}, {}, {}, {r71}, {r154, r149}, {}, {r153, r65}, {}, {r158, r79}, {0x0, r183}, {r138, r54}, {r42}, {}, {}, {0x0, r48}, {r39}, {}, {0x0, r18}, {r138}, {r164}, {r146}, {0x0, r143}, {}, {r70, r122}, {r20, r105}, {r119}, {r182}, {r113, r45}, {}, {}, {0x0, r100}, {r72}, {}, {0x0, r128}, {0x0, r81}, {r141}, {}, {r170, r84}, {r97}, {}, {r10, r38}, {r176}, {}, {r47, r106}, {0x0, r143}, {r113}, {}, {r145}, {r69}, {r57}, {0x0, r161}, {0x0, r35}, {r87}, {0x0, r53}, {}, {r118, r106}, {0x0, r76}, {r123, r150}, {r121}, {}, {}, {r8}, {}, {}, {}, {}, {}, {r151, r130}, {}, {r180, r35}, {r94, r90}, {r82}, {r72}, {r16}, {}, {r135, r44}, {0x0, r88}, {r123}, {r129}, {r98}, {}, {}, {0x0, r163}, {0x0, r27}, {r156}, {0x0, r63}, {0x0, r43}, {0x0, r59}, {0x0, r43}, {0x0, r27}, {r121, r67}, {}, {r86, r43}, {0x0, r165}, {r34}, {0x0, r73}, {r30, r148}, {}, {}, {}, {}, {0x0, r147}, {r56, r31}, {r115}, {r145, r21}, {r64}, {0x0, r142}, {}, {r136}, {}, {r133, r84}, {0x0, r163}, {0x0, r111}, {0x0, r125}, {0x0, r100}, {}, {0x0, r177}, {r16}, {r178, r152}, {}, {r62, r33}, {r162, r168}, {}, {}, {r26}, {0x0, r74}, {r56, r132}, {r77}], 0x0, "e8da0117d3c471"}) 02:21:20 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20006c000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:20 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000200daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:20 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000001200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000004c0002000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000c02000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:20 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000300daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 905.499329][T11630] loop2: detected capacity change from 0 to 4096 [ 905.521425][T11636] loop1: detected capacity change from 0 to 4 [ 905.529887][T11637] loop3: detected capacity change from 0 to 4096 [ 905.530610][T11638] loop4: detected capacity change from 0 to 4096 02:21:20 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000002e00000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 905.553760][T11636] EXT4-fs (loop1): #clusters per group too big: 32768 [ 905.562732][T11638] EXT4-fs (loop4): Invalid log block size: 18 [ 905.567276][T11637] EXT4-fs (loop3): inodes count not valid: 7077920 vs 32 [ 905.581838][ C1] sd 0:0:1:0: tag#5253 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 905.591709][ C1] sd 0:0:1:0: tag#5253 CDB: opcode=0xe5 (vendor) 02:21:21 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200272000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:21 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000400daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 905.594797][T11630] EXT4-fs (loop2): bad geometry: block count 524 exceeds size of device (512 blocks) [ 905.598325][ C1] sd 0:0:1:0: tag#5253 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 905.616794][ C1] sd 0:0:1:0: tag#5253 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 905.625933][ C1] sd 0:0:1:0: tag#5253 CDB[20]: ba [ 905.637184][ C1] sd 0:0:1:0: tag#5254 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 905.647116][ C1] sd 0:0:1:0: tag#5254 CDB: opcode=0xe4 (vendor) 02:21:21 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000500daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:21 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000600daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 905.653446][ C1] sd 0:0:1:0: tag#5254 CDB[00]: e4 9d 02 8c 07 15 e2 0b 51 04 22 69 36 00 59 73 [ 905.662523][ C1] sd 0:0:1:0: tag#5254 CDB[10]: 91 8f e1 59 f8 6d 8e 03 0a cf a7 1b 16 85 31 e9 [ 905.671571][ C1] sd 0:0:1:0: tag#5254 CDB[20]: 7c 8c 98 e7 98 09 7a 3c 82 29 ad 24 d9 cb [ 905.692751][T11636] loop1: detected capacity change from 0 to 4 [ 905.699542][T11636] EXT4-fs (loop1): #clusters per group too big: 32768 [ 905.713485][T11653] loop3: detected capacity change from 0 to 4096 [ 905.720438][T11630] loop2: detected capacity change from 0 to 4096 [ 905.733647][T11675] loop4: detected capacity change from 0 to 4096 [ 905.746696][T11653] EXT4-fs (loop3): inodes count not valid: 7471648 vs 32 [ 905.755563][T11675] EXT4-fs (loop4): Invalid log block size: 46 [ 905.778083][T11630] EXT4-fs (loop2): bad geometry: block count 524 exceeds size of device (512 blocks) 02:21:21 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x97, 0x0, 0x7, 0x0, 0x0, 0x28300, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x418, 0x0, @perf_config_ext={0x4118, 0x100}, 0x800, 0x7, 0x0, 0x8, 0x0, 0xed7, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x3b, 0x5, 0x0, 0x0, 0xcc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xcb8, 0x80}, 0x480, 0xffffffffffffffe0, 0x0, 0x0, 0x20, 0x0, 0x173, 0x0, 0x4bf, 0x0, 0xe408}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000f00)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000004c0)={0x53, 0xffffffffffffffff, 0x2e, 0x6, @scatter={0x2, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000d40)=""/136, 0x88}, {&(0x7f0000000e00)=""/208, 0xd0}]}, &(0x7f00000001c0)="e49d028c0715e20b5104226936005973918fe159f86d8e030acfa71b168531e97c8c98e798097a3c8229ad24d9cb", &(0x7f0000000540)=""/101, 0x15, 0x10000, 0x2, &(0x7f0000000340)}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x10\'\\@$&\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055300)={0x8f7, [{0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r5}, {}, {}, {r3}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {r3}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, r4}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x0, "0d4abfd4b32220"}) r184 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000840)={0x0, 0xfaef, 0xffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r184, 0x0) r185 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r185, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r185, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0xfffffffffffffeff, 0x1) sendto$inet(r185, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b300)={0xffff, [{r72, r60}, {}, {r110}, {r160}, {}, {r171}, {}, {}, {r103}, {}, {r135}, {}, {0x0, r52}, {0x0, r40}, {0x0, r181}, {r127, r14}, {r159, r32}, {r176, r58}, {}, {r13, r175}, {0x0, r179}, {r11}, {r19, r24}, {r28}, {r129}, {0x0, r33}, {}, {}, {}, {r104, r49}, {}, {}, {r47}, {r116, r157}, {0x0, r9}, {r56}, {0x0, r38}, {0x0, r37}, {}, {}, {0x0, r173}, {}, {r104, r32}, {r126}, {r107, r143}, {0x0, r124}, {}, {}, {0x0, r61}, {}, {}, {0x0, r117}, {r116}, {r66}, {r89, r99}, {}, {}, {}, {r167}, {r34}, {r131}, {}, {}, {r72}, {0x0, r96}, {}, {}, {0x0, r80}, {r78, r137}, {r41}, {0x0, r80}, {}, {0x0, r85}, {r55}, {0x0, r50}, {r25, r169}, {r6}, {r62}, {r178, r12}, {r174}, {0x0, r22}, {r17, r173}, {r46}, {}, {r139, r75}, {r36, r31}, {}, {}, {r140, r100}, {0x0, r92}, {r108}, {r69}, {r180}, {}, {}, {r160}, {r172}, {}, {0x0, r112}, {r101, r7}, {0x0, r144}, {r91}, {}, {r93}, {}, {r95}, {0x0, r114}, {0x0, r134}, {r115}, {}, {r23}, {0x0, r68}, {r51}, {0x0, r90}, {0x0, r109}, {r57, r166}, {0x0, r155}, {r15, r29}, {}, {r97}, {r101, r120}, {}, {r83, r117}, {}, {0x0, r102}, {}, {r180}, {}, {}, {}, {r71}, {r154, r149}, {}, {r153, r65}, {}, {r158, r79}, {0x0, r183}, {r138, r54}, {r42}, {}, {}, {0x0, r48}, {r39}, {}, {0x0, r18}, {r138}, {r164}, {r146}, {0x0, r143}, {}, {r70, r122}, {r20, r105}, {r119}, {r182}, {r113, r45}, {}, {}, {0x0, r100}, {r72}, {}, {0x0, r128}, {0x0, r81}, {r141}, {}, {r170, r84}, {r97}, {}, {r10, r38}, {r176}, {}, {r47, r106}, {0x0, r143}, {r113}, {}, {r145}, {r69}, {r57}, {0x0, r161}, {0x0, r35}, {r87}, {0x0, r53}, {}, {r118, r106}, {0x0, r76}, {r123, r150}, {r121}, {}, {}, {r8}, {}, {}, {}, {}, {}, {r151, r130}, {}, {r180, r35}, {r94, r90}, {r82}, {r72}, {r16}, {}, {r135, r44}, {0x0, r88}, {r123}, {r129}, {r98}, {}, {}, {0x0, r163}, {0x0, r27}, {r156}, {0x0, r63}, {0x0, r43}, {0x0, r59}, {0x0, r43}, {0x0, r27}, {r121, r67}, {}, {r86, r43}, {0x0, r165}, {r34}, {0x0, r73}, {r30, r148}, {}, {}, {}, {}, {0x0, r147}, {r56, r31}, {r115}, {r145, r21}, {r64}, {0x0, r142}, {}, {r136}, {}, {r133, r84}, {0x0, r163}, {0x0, r111}, {0x0, r125}, {0x0, r100}, {}, {0x0, r177}, {r16}, {r178, r152}, {}, {r62, r33}, {r162, r168}, {}, {}, {r26}, {0x0, r74}, {r56, r132}, {r77}], 0x0, "e8da0117d3c471"}) 02:21:21 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000700daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:21 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000006400000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000600002000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:21 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200074000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000d02000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 905.991886][T11696] loop1: detected capacity change from 0 to 4 [ 905.999153][T11698] loop3: detected capacity change from 0 to 4096 [ 906.008257][T11696] EXT4-fs (loop1): #clusters per group too big: 32768 [ 906.025086][T11707] loop4: detected capacity change from 0 to 4096 [ 906.031927][T11698] EXT4-fs (loop3): inodes count not valid: 7602208 vs 32 02:21:21 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000800daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 906.035169][T11710] loop2: detected capacity change from 0 to 4096 [ 906.046849][ C1] sd 0:0:1:0: tag#5255 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 906.056688][ C1] sd 0:0:1:0: tag#5255 CDB: opcode=0xe5 (vendor) [ 906.063108][ C1] sd 0:0:1:0: tag#5255 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 906.072162][ C1] sd 0:0:1:0: tag#5255 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 906.081204][ C1] sd 0:0:1:0: tag#5255 CDB[20]: ba 02:21:21 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001001000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:21 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001001800daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 906.087232][ C1] sd 0:0:1:0: tag#5256 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 906.097253][ C1] sd 0:0:1:0: tag#5256 CDB: opcode=0xe4 (vendor) [ 906.103606][ C1] sd 0:0:1:0: tag#5256 CDB[00]: e4 9d 02 8c 07 15 e2 0b 51 04 22 69 36 00 59 73 [ 906.112655][ C1] sd 0:0:1:0: tag#5256 CDB[10]: 91 8f e1 59 f8 6d 8e 03 0a cf a7 1b 16 85 31 e9 [ 906.121794][ C1] sd 0:0:1:0: tag#5256 CDB[20]: 7c 8c 98 e7 98 09 7a 3c 82 29 ad 24 d9 cb [ 906.126503][T11707] EXT4-fs (loop4): Invalid log block size: 100 02:21:21 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001001c00daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:21 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000e01000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 906.130957][T11710] EXT4-fs (loop2): bad geometry: block count 525 exceeds size of device (512 blocks) 02:21:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000e02000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 906.209141][T11735] loop2: detected capacity change from 0 to 4096 [ 906.230379][T11735] EXT4-fs (loop2): bad geometry: block count 526 exceeds size of device (512 blocks) 02:21:22 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x97, 0x0, 0x7, 0x0, 0x0, 0x28300, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x418, 0x0, @perf_config_ext={0x4118, 0x100}, 0x800, 0x7, 0x0, 0x8, 0x0, 0xed7, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x3b, 0x5, 0x0, 0x0, 0xcc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xcb8, 0x80}, 0x480, 0xffffffffffffffe0, 0x0, 0x0, 0x20, 0x0, 0x173, 0x0, 0x4bf, 0x0, 0xe408}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000f00)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000004c0)={0x53, 0xffffffffffffffff, 0x2e, 0x6, @scatter={0x2, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000d40)=""/136, 0x88}, {&(0x7f0000000e00)=""/208, 0xd0}]}, &(0x7f00000001c0)="e49d028c0715e20b5104226936005973918fe159f86d8e030acfa71b168531e97c8c98e798097a3c8229ad24d9cb", &(0x7f0000000540)=""/101, 0x15, 0x10000, 0x2, &(0x7f0000000340)}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x10\'\\@$&\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055300)={0x8f7, [{0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r5}, {}, {}, {r3}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {r3}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, r4}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x0, "0d4abfd4b32220"}) r185 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000840)={0x0, 0xfaef, 0xffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r185, 0x0) r186 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r186, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r186, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0xfffffffffffffeff, 0x1) sendto$inet(r186, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b300)={0xffff, [{r72, r60}, {}, {r110}, {r161}, {}, {r172}, {}, {}, {r103}, {}, {r135}, {}, {0x0, r52}, {0x0, r40}, {0x0, r182}, {r127, r14}, {r160, r32}, {r177, r58}, {}, {r13, r176}, {0x0, r180}, {r11}, {r19, r24}, {r28}, {r129}, {0x0, r33}, {}, {}, {}, {r104, r49}, {}, {}, {r47}, {r116, r158}, {0x0, r9}, {r56}, {0x0, r38}, {0x0, r37}, {}, {}, {0x0, r174}, {}, {r104, r32}, {r126}, {r107, r143}, {0x0, r124}, {}, {}, {0x0, r61}, {}, {}, {0x0, r117}, {r116}, {r66}, {r89, r99}, {}, {}, {}, {r168}, {}, {r131, r152}, {}, {}, {r72}, {0x0, r96}, {}, {}, {0x0, r80}, {r78, r137}, {r41}, {0x0, r80}, {}, {0x0, r85}, {r55}, {0x0, r50}, {r25, r170}, {r6}, {r62}, {r179, r12}, {r175}, {0x0, r22}, {r17, r174}, {r46}, {}, {r139, r75}, {r36, r31}, {}, {}, {r140, r100}, {0x0, r92}, {r108}, {r69}, {r181}, {}, {}, {r161}, {r173}, {}, {0x0, r112}, {r101, r7}, {0x0, r144}, {r91}, {}, {r93}, {}, {r95}, {0x0, r114}, {0x0, r134}, {r115}, {}, {r23}, {0x0, r68}, {r51}, {0x0, r90}, {0x0, r109}, {r57, r167}, {0x0, r156}, {r15, r29}, {}, {r97}, {r101, r120}, {}, {r83, r117}, {}, {0x0, r102}, {}, {r181}, {}, {}, {}, {r71}, {r155, r149}, {}, {r154, r65}, {}, {r159, r79}, {0x0, r184}, {r138, r54}, {r42}, {}, {}, {0x0, r48}, {r39}, {}, {0x0, r18}, {r138}, {r165}, {r146}, {0x0, r143}, {}, {r70, r122}, {r20, r105}, {r119}, {r183}, {r113, r45}, {}, {}, {0x0, r100}, {r72}, {}, {0x0, r128}, {0x0, r81}, {r141}, {}, {r171, r84}, {r97}, {}, {r10, r38}, {r177}, {}, {r47, r106}, {0x0, r143}, {r113}, {}, {r145}, {r69}, {r57}, {0x0, r162}, {0x0, r35}, {r87}, {0x0, r53}, {}, {r118, r106}, {0x0, r76}, {r123, r150}, {r121}, {}, {}, {r8}, {}, {}, {}, {}, {}, {r151, r130}, {}, {r181, r35}, {r94, r90}, {r82}, {r72}, {r16}, {}, {r135, r44}, {0x0, r88}, {r123}, {r129}, {r98}, {}, {}, {0x0, r164}, {0x0, r27}, {r157}, {0x0, r63}, {0x0, r43}, {0x0, r59}, {0x0, r43}, {0x0, r27}, {r121, r67}, {}, {r86, r43}, {0x0, r166}, {r34}, {0x0, r73}, {r30, r148}, {}, {}, {}, {}, {0x0, r147}, {r56, r31}, {r115}, {r145, r21}, {r64}, {0x0, r142}, {}, {r136}, {}, {r133, r84}, {0x0, r164}, {0x0, r111}, {0x0, r125}, {0x0, r100}, {}, {0x0, r178}, {r16}, {r179, r153}, {}, {r62, r33}, {r163, r169}, {}, {}, {r26}, {0x0, r74}, {r56, r132}, {r77}], 0x0, "e8da0117d3c471"}) 02:21:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000680002000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:22 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200378000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:22 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f00000000000000c404000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000f02000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:22 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001002600daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 906.891438][T11753] loop3: detected capacity change from 0 to 4096 [ 906.898820][T11754] loop4: detected capacity change from 0 to 4096 [ 906.899950][T11755] loop2: detected capacity change from 0 to 4096 [ 906.912307][T11759] loop1: detected capacity change from 0 to 4 [ 906.925836][T11753] EXT4-fs (loop3): inodes count not valid: 7865120 vs 32 02:21:22 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000005000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 906.929561][ C0] sd 0:0:1:0: tag#5268 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 906.934369][T11754] EXT4-fs (loop4): Invalid log block size: 1220 [ 906.943150][ C0] sd 0:0:1:0: tag#5268 CDB: opcode=0xe5 (vendor) [ 906.955702][ C0] sd 0:0:1:0: tag#5268 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 906.964769][ C0] sd 0:0:1:0: tag#5268 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 906.973816][ C0] sd 0:0:1:0: tag#5268 CDB[20]: ba 02:21:22 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef01000100fe00daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:22 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000006000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 906.985426][ C1] sd 0:0:1:0: tag#5269 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 906.995284][ C1] sd 0:0:1:0: tag#5269 CDB: opcode=0xe4 (vendor) [ 907.001629][ C1] sd 0:0:1:0: tag#5269 CDB[00]: e4 9d 02 8c 07 15 e2 0b 51 04 22 69 36 00 59 73 [ 907.010686][ C1] sd 0:0:1:0: tag#5269 CDB[10]: 91 8f e1 59 f8 6d 8e 03 0a cf a7 1b 16 85 31 e9 [ 907.019994][ C1] sd 0:0:1:0: tag#5269 CDB[20]: 7c 8c 98 e7 98 09 7a 3c 82 29 ad 24 d9 cb [ 907.033978][T11759] EXT4-fs (loop1): #clusters per group too big: 32768 02:21:22 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200379000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 907.064085][T11755] EXT4-fs (loop2): bad geometry: block count 527 exceeds size of device (512 blocks) [ 907.080076][T11759] loop1: detected capacity change from 0 to 4 [ 907.085979][T11784] loop4: detected capacity change from 0 to 4096 [ 907.101007][T11784] EXT4-fs (loop4): Invalid log block size: 1536 [ 907.102089][T11759] EXT4-fs (loop1): #clusters per group too big: 32768 02:21:22 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000402daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000006c0002000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 907.114674][T11788] loop3: detected capacity change from 0 to 4096 [ 907.134227][T11788] EXT4-fs (loop3): inodes count not valid: 7930656 vs 32 [ 907.146572][T11755] loop2: detected capacity change from 0 to 4096 [ 907.164537][T11805] loop1: detected capacity change from 0 to 4 [ 907.176899][T11755] EXT4-fs (loop2): bad geometry: block count 527 exceeds size of device (512 blocks) [ 907.186959][T11805] EXT4-fs (loop1): #clusters per group too big: 32768 [ 907.227445][T11805] loop1: detected capacity change from 0 to 4 [ 907.239968][T11805] EXT4-fs (loop1): #clusters per group too big: 32768 02:21:23 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x97, 0x0, 0x7, 0x0, 0x0, 0x28300, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x418, 0x0, @perf_config_ext={0x4118, 0x100}, 0x800, 0x7, 0x0, 0x8, 0x0, 0xed7, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x3b, 0x5, 0x0, 0x0, 0xcc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xcb8, 0x80}, 0x480, 0xffffffffffffffe0, 0x0, 0x0, 0x20, 0x0, 0x173, 0x0, 0x4bf, 0x0, 0xe408}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000f00)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000004c0)={0x53, 0xffffffffffffffff, 0x2e, 0x6, @scatter={0x2, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000d40)=""/136, 0x88}, {&(0x7f0000000e00)=""/208, 0xd0}]}, &(0x7f00000001c0)="e49d028c0715e20b5104226936005973918fe159f86d8e030acfa71b168531e97c8c98e798097a3c8229ad24d9cb", &(0x7f0000000540)=""/101, 0x15, 0x10000, 0x2, &(0x7f0000000340)}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x10\'\\@$&\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055300)={0x8f7, [{0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r5}, {}, {}, {r3}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {r3}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, r4}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x0, "0d4abfd4b32220"}) r185 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000840)={0x0, 0xfaef, 0xffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r185, 0x0) r186 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r186, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r186, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0xfffffffffffffeff, 0x1) sendto$inet(r186, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b300)={0xffff, [{r72, r60}, {}, {r110}, {r161}, {}, {r172}, {}, {}, {r103}, {}, {r135}, {}, {0x0, r52}, {0x0, r40}, {0x0, r182}, {r127, r14}, {r160, r32}, {r177, r58}, {}, {r13, r176}, {0x0, r180}, {r11}, {r19, r24}, {r28}, {r129}, {0x0, r33}, {}, {}, {}, {r104, r49}, {}, {}, {r47}, {r116, r158}, {0x0, r9}, {r56}, {0x0, r38}, {0x0, r37}, {}, {}, {0x0, r174}, {}, {r104, r32}, {r126}, {r107, r143}, {0x0, r124}, {}, {}, {0x0, r61}, {}, {}, {0x0, r117}, {r116}, {r66}, {r89, r99}, {}, {}, {}, {r168}, {}, {r131, r152}, {}, {}, {r72}, {0x0, r96}, {}, {}, {0x0, r80}, {r78, r137}, {r41}, {0x0, r80}, {}, {0x0, r85}, {r55}, {0x0, r50}, {r25, r170}, {r6}, {r62}, {r179, r12}, {r175}, {0x0, r22}, {r17, r174}, {r46}, {}, {r139, r75}, {r36, r31}, {}, {}, {r140, r100}, {0x0, r92}, {r108}, {r69}, {r181}, {}, {}, {r161}, {r173}, {}, {0x0, r112}, {r101, r7}, {0x0, r144}, {r91}, {}, {r93}, {}, {r95}, {0x0, r114}, {0x0, r134}, {r115}, {}, {r23}, {0x0, r68}, {r51}, {0x0, r90}, {0x0, r109}, {r57, r167}, {0x0, r156}, {r15, r29}, {}, {r97}, {r101, r120}, {}, {r83, r117}, {}, {0x0, r102}, {}, {r181}, {}, {}, {}, {r71}, {r155, r149}, {}, {r154, r65}, {}, {r159, r79}, {0x0, r184}, {r138, r54}, {r42}, {}, {}, {0x0, r48}, {r39}, {}, {0x0, r18}, {r138}, {r165}, {r146}, {0x0, r143}, {}, {r70, r122}, {r20, r105}, {r119}, {r183}, {r113, r45}, {}, {}, {0x0, r100}, {r72}, {}, {0x0, r128}, {0x0, r81}, {r141}, {}, {r171, r84}, {r97}, {}, {r10, r38}, {r177}, {}, {r47, r106}, {0x0, r143}, {r113}, {}, {r145}, {r69}, {r57}, {0x0, r162}, {0x0, r35}, {r87}, {0x0, r53}, {}, {r118, r106}, {0x0, r76}, {r123, r150}, {r121}, {}, {}, {r8}, {}, {}, {}, {}, {}, {r151, r130}, {}, {r181, r35}, {r94, r90}, {r82}, {r72}, {r16}, {}, {r135, r44}, {0x0, r88}, {r123}, {r129}, {r98}, {}, {}, {0x0, r164}, {0x0, r27}, {r157}, {0x0, r63}, {0x0, r43}, {0x0, r59}, {0x0, r43}, {0x0, r27}, {r121, r67}, {}, {r86, r43}, {0x0, r166}, {r34}, {0x0, r73}, {r30, r148}, {}, {}, {}, {}, {0x0, r147}, {r56, r31}, {r115}, {r145, r21}, {r64}, {0x0, r142}, {}, {r136}, {}, {r133, r84}, {0x0, r164}, {0x0, r111}, {0x0, r125}, {0x0, r100}, {}, {0x0, r178}, {r16}, {r179, r153}, {}, {r62, r33}, {r163, r169}, {}, {}, {r26}, {0x0, r74}, {r56, r132}, {r77}], 0x0, "e8da0117d3c471"}) 02:21:23 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000007000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:23 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000003daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:23 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20007a000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000001002000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000740002000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:23 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000204daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 907.794162][T11833] loop2: detected capacity change from 0 to 4096 [ 907.815510][T11838] loop1: detected capacity change from 0 to 4 [ 907.821988][T11841] loop4: detected capacity change from 0 to 4096 [ 907.830893][T11843] loop3: detected capacity change from 0 to 4096 [ 907.837948][T11833] EXT4-fs (loop2): bad geometry: block count 528 exceeds size of device (512 blocks) [ 907.845635][ C1] sd 0:0:1:0: tag#5270 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 907.857490][ C1] sd 0:0:1:0: tag#5270 CDB: opcode=0xe5 (vendor) [ 907.863862][ C1] sd 0:0:1:0: tag#5270 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 907.872988][ C1] sd 0:0:1:0: tag#5270 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 907.873391][T11838] EXT4-fs (loop1): #clusters per group too big: 32768 [ 907.882110][ C1] sd 0:0:1:0: tag#5270 CDB[20]: ba [ 907.900658][T11841] EXT4-fs (loop4): Invalid log block size: 1792 [ 907.909503][ C0] sd 0:0:1:0: tag#5271 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 907.919357][ C0] sd 0:0:1:0: tag#5271 CDB: opcode=0xe4 (vendor) [ 907.925716][ C0] sd 0:0:1:0: tag#5271 CDB[00]: e4 9d 02 8c 07 15 e2 0b 51 04 22 69 36 00 59 73 [ 907.934853][ C0] sd 0:0:1:0: tag#5271 CDB[10]: 91 8f e1 59 f8 6d 8e 03 0a cf a7 1b 16 85 31 e9 [ 907.935787][T11843] EXT4-fs (loop3): inodes count not valid: 7995424 vs 32 02:21:23 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000604daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 907.943887][ C0] sd 0:0:1:0: tag#5271 CDB[20]: 7c 8c 98 e7 98 09 7a 3c 82 29 ad 24 d9 cb [ 907.967747][T11838] loop1: detected capacity change from 0 to 4 [ 907.978116][T11838] EXT4-fs (loop1): #clusters per group too big: 32768 02:21:23 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001008004daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000001102000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:23 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f00000000000000fe0f000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 907.998433][T11843] loop3: detected capacity change from 0 to 4096 02:21:23 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000005daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 908.028626][T11876] loop2: detected capacity change from 0 to 4096 [ 908.038184][T11876] EXT4-fs (loop2): bad geometry: block count 529 exceeds size of device (512 blocks) [ 908.049685][T11880] loop4: detected capacity change from 0 to 4096 [ 908.059412][T11880] EXT4-fs (loop4): Invalid log block size: 4094 [ 908.075974][T11876] loop2: detected capacity change from 0 to 4096 [ 908.083174][T11876] EXT4-fs (loop2): bad geometry: block count 529 exceeds size of device (512 blocks) 02:21:24 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x97, 0x0, 0x7, 0x0, 0x0, 0x28300, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x418, 0x0, @perf_config_ext={0x4118, 0x100}, 0x800, 0x7, 0x0, 0x8, 0x0, 0xed7, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x3b, 0x5, 0x0, 0x0, 0xcc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xcb8, 0x80}, 0x480, 0xffffffffffffffe0, 0x0, 0x0, 0x20, 0x0, 0x173, 0x0, 0x4bf, 0x0, 0xe408}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000f00)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000004c0)={0x53, 0xffffffffffffffff, 0x2e, 0x6, @scatter={0x2, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000d40)=""/136, 0x88}, {&(0x7f0000000e00)=""/208, 0xd0}]}, &(0x7f00000001c0)="e49d028c0715e20b5104226936005973918fe159f86d8e030acfa71b168531e97c8c98e798097a3c8229ad24d9cb", &(0x7f0000000540)=""/101, 0x15, 0x10000, 0x2, &(0x7f0000000340)}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x10\'\\@$&\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055300)={0x8f7, [{0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r5}, {}, {}, {r3}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {r3}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, r4}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x0, "0d4abfd4b32220"}) r185 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000840)={0x0, 0xfaef, 0xffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r185, 0x0) r186 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r186, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r186, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0xfffffffffffffeff, 0x1) sendto$inet(r186, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b300)={0xffff, [{r72, r60}, {}, {r110}, {r161}, {}, {r172}, {}, {}, {r103}, {}, {r135}, {}, {0x0, r52}, {0x0, r40}, {0x0, r182}, {r127, r14}, {r160, r32}, {r177, r58}, {}, {r13, r176}, {0x0, r180}, {r11}, {r19, r24}, {r28}, {r129}, {0x0, r33}, {}, {}, {}, {r104, r49}, {}, {}, {r47}, {r116, r158}, {0x0, r9}, {r56}, {0x0, r38}, {0x0, r37}, {}, {}, {0x0, r174}, {}, {r104, r32}, {r126}, {r107, r143}, {0x0, r124}, {}, {}, {0x0, r61}, {}, {}, {0x0, r117}, {r116}, {r66}, {r89, r99}, {}, {}, {}, {r168}, {}, {r131, r152}, {}, {}, {r72}, {0x0, r96}, {}, {}, {0x0, r80}, {r78, r137}, {r41}, {0x0, r80}, {}, {0x0, r85}, {r55}, {0x0, r50}, {r25, r170}, {r6}, {r62}, {r179, r12}, {r175}, {0x0, r22}, {r17, r174}, {r46}, {}, {r139, r75}, {r36, r31}, {}, {}, {r140, r100}, {0x0, r92}, {r108}, {r69}, {r181}, {}, {}, {r161}, {r173}, {}, {0x0, r112}, {r101, r7}, {0x0, r144}, {r91}, {}, {r93}, {}, {r95}, {0x0, r114}, {0x0, r134}, {r115}, {}, {r23}, {0x0, r68}, {r51}, {0x0, r90}, {0x0, r109}, {r57, r167}, {0x0, r156}, {r15, r29}, {}, {r97}, {r101, r120}, {}, {r83, r117}, {}, {0x0, r102}, {}, {r181}, {}, {}, {}, {r71}, {r155, r149}, {}, {r154, r65}, {}, {r159, r79}, {0x0, r184}, {r138, r54}, {r42}, {}, {}, {0x0, r48}, {r39}, {}, {0x0, r18}, {r138}, {r165}, {r146}, {0x0, r143}, {}, {r70, r122}, {r20, r105}, {r119}, {r183}, {r113, r45}, {}, {}, {0x0, r100}, {r72}, {}, {0x0, r128}, {0x0, r81}, {r141}, {}, {r171, r84}, {r97}, {}, {r10, r38}, {r177}, {}, {r47, r106}, {0x0, r143}, {r113}, {}, {r145}, {r69}, {r57}, {0x0, r162}, {0x0, r35}, {r87}, {0x0, r53}, {}, {r118, r106}, {0x0, r76}, {r123, r150}, {r121}, {}, {}, {r8}, {}, {}, {}, {}, {}, {r151, r130}, {}, {r181, r35}, {r94, r90}, {r82}, {r72}, {r16}, {}, {r135, r44}, {0x0, r88}, {r123}, {r129}, {r98}, {}, {}, {0x0, r164}, {0x0, r27}, {r157}, {0x0, r63}, {0x0, r43}, {0x0, r59}, {0x0, r43}, {0x0, r27}, {r121, r67}, {}, {r86, r43}, {0x0, r166}, {r34}, {0x0, r73}, {r30, r148}, {}, {}, {}, {}, {0x0, r147}, {r56, r31}, {r115}, {r145, r21}, {r64}, {0x0, r142}, {}, {r136}, {}, {r133, r84}, {0x0, r164}, {0x0, r111}, {0x0, r125}, {0x0, r100}, {}, {0x0, r178}, {r16}, {r179, r153}, {}, {r62, r33}, {r163, r169}, {}, {}, {r26}, {0x0, r74}, {r56, r132}, {r77}], 0x0, "e8da0117d3c471"}) 02:21:24 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20007e000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000007a0002000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:24 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001002a05daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:24 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000003af3020006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000001202000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 908.703048][T11913] loop4: detected capacity change from 0 to 4096 [ 908.709839][T11914] loop1: detected capacity change from 0 to 4 [ 908.723231][T11919] loop2: detected capacity change from 0 to 4096 [ 908.737510][T11913] EXT4-fs (loop4): Invalid log block size: 193338 [ 908.743391][T11929] loop3: detected capacity change from 0 to 4096 02:21:24 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000006daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 908.745874][T11914] EXT4-fs (loop1): #clusters per group too big: 32768 [ 908.769955][T11919] EXT4-fs (loop2): bad geometry: block count 530 exceeds size of device (512 blocks) 02:21:24 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f00000000000000ffff070006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:24 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200383000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000002002000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 908.800291][T11929] EXT4-fs (loop3): inodes count not valid: 8257568 vs 32 [ 908.816412][T11914] loop1: detected capacity change from 0 to 4 [ 908.829835][T11914] EXT4-fs (loop1): #clusters per group too big: 32768 02:21:24 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000406daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:24 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000007daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 908.868353][T11948] loop4: detected capacity change from 0 to 4096 [ 908.885179][T11953] loop2: detected capacity change from 0 to 4096 [ 908.899217][T11953] EXT4-fs (loop2): bad geometry: block count 544 exceeds size of device (512 blocks) [ 908.911468][T11948] EXT4-fs (loop4): Invalid log block size: 524287 [ 908.942189][T11966] loop3: detected capacity change from 0 to 4096 [ 908.959902][T11966] EXT4-fs (loop3): inodes count not valid: 8586016 vs 32 [ 908.984037][T11953] loop2: detected capacity change from 0 to 4096 [ 908.993060][T11953] EXT4-fs (loop2): bad geometry: block count 544 exceeds size of device (512 blocks) 02:21:24 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x97, 0x0, 0x7, 0x0, 0x0, 0x28300, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x418, 0x0, @perf_config_ext={0x4118, 0x100}, 0x800, 0x7, 0x0, 0x8, 0x0, 0xed7, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x3b, 0x5, 0x0, 0x0, 0xcc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xcb8, 0x80}, 0x480, 0xffffffffffffffe0, 0x0, 0x0, 0x20, 0x0, 0x173, 0x0, 0x4bf, 0x0, 0xe408}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000f00)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000004c0)={0x53, 0xffffffffffffffff, 0x2e, 0x6, @scatter={0x2, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000d40)=""/136, 0x88}, {&(0x7f0000000e00)=""/208, 0xd0}]}, &(0x7f00000001c0)="e49d028c0715e20b5104226936005973918fe159f86d8e030acfa71b168531e97c8c98e798097a3c8229ad24d9cb", &(0x7f0000000540)=""/101, 0x15, 0x10000, 0x2, &(0x7f0000000340)}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x10\'\\@$&\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055300)={0x8f7, [{0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r5}, {}, {}, {r3}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {r3}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, r4}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x0, "0d4abfd4b32220"}) r184 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000840)={0x0, 0xfaef, 0xffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r184, 0x0) r185 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r185, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r185, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0xfffffffffffffeff, 0x1) sendto$inet(r185, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b300)={0xffff, [{r72, r60}, {}, {r110}, {r161}, {}, {r171}, {}, {}, {r103}, {}, {r135}, {}, {0x0, r52}, {0x0, r40}, {0x0, r181}, {r127, r14}, {r160, r32}, {r176, r58}, {}, {r13, r175}, {0x0, r179}, {r11}, {r19, r24}, {r28}, {r129}, {0x0, r33}, {}, {}, {}, {r104, r49}, {}, {}, {r47}, {r116, r158}, {0x0, r9}, {r56}, {0x0, r38}, {0x0, r37}, {}, {}, {0x0, r173}, {}, {r104, r32}, {r126}, {r107, r143}, {0x0, r124}, {}, {}, {0x0, r61}, {}, {}, {0x0, r117}, {r116}, {r66}, {r89, r99}, {}, {}, {}, {}, {r34}, {r131, r152}, {}, {}, {r72}, {0x0, r96}, {}, {}, {0x0, r80}, {r78, r137}, {r41}, {0x0, r80}, {}, {0x0, r85}, {r55}, {0x0, r50}, {r25, r169}, {r6}, {r62}, {r178, r12}, {r174}, {0x0, r22}, {r17, r173}, {r46}, {}, {r139, r75}, {r36, r31}, {}, {}, {r140, r100}, {0x0, r92}, {r108}, {r69}, {r180}, {}, {}, {r161}, {r172}, {}, {0x0, r112}, {r101, r7}, {0x0, r144}, {r91}, {}, {r93}, {}, {r95}, {0x0, r114}, {0x0, r134}, {r115}, {}, {r23}, {0x0, r68}, {r51}, {0x0, r90}, {0x0, r109}, {r57, r167}, {0x0, r156}, {r15, r29}, {}, {r97}, {r101, r120}, {}, {r83, r117}, {}, {0x0, r102}, {}, {r180}, {}, {}, {}, {r71}, {r155, r149}, {}, {r154, r65}, {}, {r159, r79}, {0x0, r183}, {r138, r54}, {r42}, {}, {}, {0x0, r48}, {r39}, {}, {0x0, r18}, {r138}, {r165}, {r146}, {0x0, r143}, {}, {r70, r122}, {r20, r105}, {r119}, {r182}, {r113, r45}, {}, {}, {0x0, r100}, {r72}, {}, {0x0, r128}, {0x0, r81}, {r141}, {}, {r170, r84}, {r97}, {}, {r10, r38}, {r176}, {}, {r47, r106}, {0x0, r143}, {r113}, {}, {r145}, {r69}, {r57}, {0x0, r162}, {0x0, r35}, {r87}, {0x0, r53}, {}, {r118, r106}, {0x0, r76}, {r123, r150}, {r121}, {}, {}, {r8}, {}, {}, {}, {}, {}, {r151, r130}, {}, {r180, r35}, {r94, r90}, {r82}, {r72}, {r16}, {}, {r135, r44}, {0x0, r88}, {r123}, {r129}, {r98}, {}, {}, {0x0, r164}, {0x0, r27}, {r157}, {0x0, r63}, {0x0, r43}, {0x0, r59}, {0x0, r43}, {0x0, r27}, {r121, r67}, {}, {r86, r43}, {0x0, r166}, {r34}, {0x0, r73}, {r30, r148}, {}, {}, {}, {}, {0x0, r147}, {r56, r31}, {r115}, {r145, r21}, {r64}, {0x0, r142}, {}, {r136}, {}, {r133, r84}, {0x0, r164}, {0x0, r111}, {0x0, r125}, {0x0, r100}, {}, {0x0, r177}, {r16}, {r178, r153}, {}, {r62, r33}, {r163, r168}, {}, {}, {r26}, {0x0, r74}, {r56, r132}, {r77}], 0x0, "e8da0117d3c471"}) 02:21:24 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000018daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000820002000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:24 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200184000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:24 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000080006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000102002000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:25 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef01000100001cdaf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 909.606349][T11990] loop3: detected capacity change from 0 to 4096 [ 909.615996][T11993] loop4: detected capacity change from 0 to 4096 [ 909.620714][T12001] loop1: detected capacity change from 0 to 4 [ 909.627421][T11999] loop2: detected capacity change from 0 to 4096 [ 909.640885][T11993] EXT4-fs (loop4): Invalid log block size: 524288 02:21:25 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000020daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 909.670255][T11990] EXT4-fs (loop3): inodes count not valid: 8651040 vs 32 [ 909.679579][T12001] EXT4-fs (loop1): #clusters per group too big: 32768 [ 909.691234][T11999] EXT4-fs (loop2): bad geometry: block count 544 exceeds size of device (512 blocks) 02:21:25 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200086000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:25 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000200000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 909.716476][T12001] loop1: detected capacity change from 0 to 4 [ 909.735322][T11999] loop2: detected capacity change from 0 to 4096 [ 909.737010][T12001] EXT4-fs (loop1): #clusters per group too big: 32768 [ 909.742966][T11999] EXT4-fs (loop2): bad geometry: block count 544 exceeds size of device (512 blocks) 02:21:25 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200186000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:25 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000026daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 909.770288][T12034] loop3: detected capacity change from 0 to 4096 [ 909.783577][T12038] loop4: detected capacity change from 0 to 4096 [ 909.797513][T12034] EXT4-fs (loop3): inodes count not valid: 8781856 vs 32 [ 909.805808][T12038] EXT4-fs (loop4): Invalid log block size: 33554434 [ 909.861531][T12053] loop3: detected capacity change from 0 to 4096 [ 909.871974][T12053] EXT4-fs (loop3): inodes count not valid: 8782112 vs 32 02:21:25 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x97, 0x0, 0x7, 0x0, 0x0, 0x28300, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x418, 0x0, @perf_config_ext={0x4118, 0x100}, 0x800, 0x7, 0x0, 0x8, 0x0, 0xed7, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x3b, 0x5, 0x0, 0x0, 0xcc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xcb8, 0x80}, 0x480, 0xffffffffffffffe0, 0x0, 0x0, 0x20, 0x0, 0x173, 0x0, 0x4bf, 0x0, 0xe408}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000f00)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000004c0)={0x53, 0xffffffffffffffff, 0x2e, 0x6, @scatter={0x2, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000d40)=""/136, 0x88}, {&(0x7f0000000e00)=""/208, 0xd0}]}, &(0x7f00000001c0)="e49d028c0715e20b5104226936005973918fe159f86d8e030acfa71b168531e97c8c98e798097a3c8229ad24d9cb", &(0x7f0000000540)=""/101, 0x15, 0x10000, 0x2, &(0x7f0000000340)}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x10\'\\@$&\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055300)={0x8f7, [{0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r5}, {}, {}, {r3}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {r3}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, r4}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x0, "0d4abfd4b32220"}) r184 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000840)={0x0, 0xfaef, 0xffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r184, 0x0) r185 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r185, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r185, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0xfffffffffffffeff, 0x1) sendto$inet(r185, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b300)={0xffff, [{r72, r60}, {}, {r110}, {r161}, {}, {r171}, {}, {}, {r103}, {}, {r135}, {}, {0x0, r52}, {0x0, r40}, {0x0, r181}, {r127, r14}, {r160, r32}, {r176, r58}, {}, {r13, r175}, {0x0, r179}, {r11}, {r19, r24}, {r28}, {r129}, {0x0, r33}, {}, {}, {}, {r104, r49}, {}, {}, {r47}, {r116, r158}, {0x0, r9}, {r56}, {0x0, r38}, {0x0, r37}, {}, {}, {0x0, r173}, {}, {r104, r32}, {r126}, {r107, r143}, {0x0, r124}, {}, {}, {0x0, r61}, {}, {}, {0x0, r117}, {r116}, {r66}, {r89, r99}, {}, {}, {}, {}, {r34}, {r131, r152}, {}, {}, {r72}, {0x0, r96}, {}, {}, {0x0, r80}, {r78, r137}, {r41}, {0x0, r80}, {}, {0x0, r85}, {r55}, {0x0, r50}, {r25, r169}, {r6}, {r62}, {r178, r12}, {r174}, {0x0, r22}, {r17, r173}, {r46}, {}, {r139, r75}, {r36, r31}, {}, {}, {r140, r100}, {0x0, r92}, {r108}, {r69}, {r180}, {}, {}, {r161}, {r172}, {}, {0x0, r112}, {r101, r7}, {0x0, r144}, {r91}, {}, {r93}, {}, {r95}, {0x0, r114}, {0x0, r134}, {r115}, {}, {r23}, {0x0, r68}, {r51}, {0x0, r90}, {0x0, r109}, {r57, r167}, {0x0, r156}, {r15, r29}, {}, {r97}, {r101, r120}, {}, {r83, r117}, {}, {0x0, r102}, {}, {r180}, {}, {}, {}, {r71}, {r155, r149}, {}, {r154, r65}, {}, {r159, r79}, {0x0, r183}, {r138, r54}, {r42}, {}, {}, {0x0, r48}, {r39}, {}, {0x0, r18}, {r138}, {r165}, {r146}, {0x0, r143}, {}, {r70, r122}, {r20, r105}, {r119}, {r182}, {r113, r45}, {}, {}, {0x0, r100}, {r72}, {}, {0x0, r128}, {0x0, r81}, {r141}, {}, {r170, r84}, {r97}, {}, {r10, r38}, {r176}, {}, {r47, r106}, {0x0, r143}, {r113}, {}, {r145}, {r69}, {r57}, {0x0, r162}, {0x0, r35}, {r87}, {0x0, r53}, {}, {r118, r106}, {0x0, r76}, {r123, r150}, {r121}, {}, {}, {r8}, {}, {}, {}, {}, {}, {r151, r130}, {}, {r180, r35}, {r94, r90}, {r82}, {r72}, {r16}, {}, {r135, r44}, {0x0, r88}, {r123}, {r129}, {r98}, {}, {}, {0x0, r164}, {0x0, r27}, {r157}, {0x0, r63}, {0x0, r43}, {0x0, r59}, {0x0, r43}, {0x0, r27}, {r121, r67}, {}, {r86, r43}, {0x0, r166}, {r34}, {0x0, r73}, {r30, r148}, {}, {}, {}, {}, {0x0, r147}, {r56, r31}, {r115}, {r145, r21}, {r64}, {0x0, r142}, {}, {r136}, {}, {r133, r84}, {0x0, r164}, {0x0, r111}, {0x0, r125}, {0x0, r100}, {}, {0x0, r177}, {r16}, {r178, r153}, {}, {r62, r33}, {r163, r168}, {}, {}, {r26}, {0x0, r74}, {r56, r132}, {r77}], 0x0, "e8da0117d3c471"}) 02:21:25 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000001000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000830002000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:25 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef01000100052adaf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000002202000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:25 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200087000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:25 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef01000100003fdaf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 910.488065][T12074] loop3: detected capacity change from 0 to 4096 [ 910.494950][T12075] loop1: detected capacity change from 0 to 4 [ 910.506636][T12076] loop2: detected capacity change from 0 to 4096 [ 910.516435][T12075] EXT4-fs (loop1): #clusters per group too big: 32768 [ 910.521087][T12081] loop4: detected capacity change from 0 to 4096 [ 910.530010][T12074] EXT4-fs (loop3): inodes count not valid: 8847392 vs 32 [ 910.538719][ C1] scsi_io_completion_action: 4 callbacks suppressed [ 910.538752][ C1] sd 0:0:1:0: tag#5276 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 910.546935][T12076] EXT4-fs (loop2): bad geometry: block count 546 exceeds size of device (512 blocks) [ 910.555181][ C1] sd 0:0:1:0: tag#5276 CDB: opcode=0xe5 (vendor) [ 910.555205][ C1] sd 0:0:1:0: tag#5276 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 910.555221][ C1] sd 0:0:1:0: tag#5276 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d 02:21:26 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20018d000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:26 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000040daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000002502000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 910.589047][ C1] sd 0:0:1:0: tag#5276 CDB[20]: ba [ 910.606992][T12081] EXT4-fs (loop4): cluster size (2048) smaller than block size (4096) [ 910.612632][ C1] sd 0:0:1:0: tag#5277 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 910.625231][ C1] sd 0:0:1:0: tag#5277 CDB: opcode=0xe4 (vendor) 02:21:26 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000002000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:26 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000480daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 910.631578][ C1] sd 0:0:1:0: tag#5277 CDB[00]: e4 9d 02 8c 07 15 e2 0b 51 04 22 69 36 00 59 73 [ 910.640619][ C1] sd 0:0:1:0: tag#5277 CDB[10]: 91 8f e1 59 f8 6d 8e 03 0a cf a7 1b 16 85 31 e9 [ 910.649678][ C1] sd 0:0:1:0: tag#5277 CDB[20]: 7c 8c 98 e7 98 09 7a 3c 82 29 ad 24 d9 cb [ 910.680645][T12075] loop1: detected capacity change from 0 to 4 [ 910.693815][T12096] loop4: detected capacity change from 0 to 4096 [ 910.699865][T12104] loop3: detected capacity change from 0 to 4096 [ 910.708385][T12075] EXT4-fs (loop1): #clusters per group too big: 32768 [ 910.718525][T12096] EXT4-fs (loop4): blocks per group (524288) and clusters per group (32768) inconsistent [ 910.729014][T12104] EXT4-fs (loop3): inodes count not valid: 9240864 vs 32 [ 910.732332][T12120] loop2: detected capacity change from 0 to 4096 [ 910.776861][T12120] EXT4-fs (loop2): bad geometry: block count 549 exceeds size of device (512 blocks) 02:21:26 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x97, 0x0, 0x7, 0x0, 0x0, 0x28300, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x418, 0x0, @perf_config_ext={0x4118, 0x100}, 0x800, 0x7, 0x0, 0x8, 0x0, 0xed7, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x3b, 0x5, 0x0, 0x0, 0xcc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xcb8, 0x80}, 0x480, 0xffffffffffffffe0, 0x0, 0x0, 0x20, 0x0, 0x173, 0x0, 0x4bf, 0x0, 0xe408}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000f00)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000004c0)={0x53, 0xffffffffffffffff, 0x2e, 0x6, @scatter={0x2, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000d40)=""/136, 0x88}, {&(0x7f0000000e00)=""/208, 0xd0}]}, &(0x7f00000001c0)="e49d028c0715e20b5104226936005973918fe159f86d8e030acfa71b168531e97c8c98e798097a3c8229ad24d9cb", &(0x7f0000000540)=""/101, 0x15, 0x10000, 0x2, &(0x7f0000000340)}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x10\'\\@$&\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055300)={0x8f7, [{0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r5}, {}, {}, {r3}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {r3}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, r4}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x0, "0d4abfd4b32220"}) r184 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000840)={0x0, 0xfaef, 0xffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r184, 0x0) r185 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r185, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r185, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0xfffffffffffffeff, 0x1) sendto$inet(r185, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b300)={0xffff, [{r72, r60}, {}, {r110}, {r161}, {}, {r171}, {}, {}, {r103}, {}, {r135}, {}, {0x0, r52}, {0x0, r40}, {0x0, r181}, {r127, r14}, {r160, r32}, {r176, r58}, {}, {r13, r175}, {0x0, r179}, {r11}, {r19, r24}, {r28}, {r129}, {0x0, r33}, {}, {}, {}, {r104, r49}, {}, {}, {r47}, {r116, r158}, {0x0, r9}, {r56}, {0x0, r38}, {0x0, r37}, {}, {}, {0x0, r173}, {}, {r104, r32}, {r126}, {r107, r143}, {0x0, r124}, {}, {}, {0x0, r61}, {}, {}, {0x0, r117}, {r116}, {r66}, {r89, r99}, {}, {}, {}, {}, {r34}, {r131, r152}, {}, {}, {r72}, {0x0, r96}, {}, {}, {0x0, r80}, {r78, r137}, {r41}, {0x0, r80}, {}, {0x0, r85}, {r55}, {0x0, r50}, {r25, r169}, {r6}, {r62}, {r178, r12}, {r174}, {0x0, r22}, {r17, r173}, {r46}, {}, {r139, r75}, {r36, r31}, {}, {}, {r140, r100}, {0x0, r92}, {r108}, {r69}, {r180}, {}, {}, {r161}, {r172}, {}, {0x0, r112}, {r101, r7}, {0x0, r144}, {r91}, {}, {r93}, {}, {r95}, {0x0, r114}, {0x0, r134}, {r115}, {}, {r23}, {0x0, r68}, {r51}, {0x0, r90}, {0x0, r109}, {r57, r167}, {0x0, r156}, {r15, r29}, {}, {r97}, {r101, r120}, {}, {r83, r117}, {}, {0x0, r102}, {}, {r180}, {}, {}, {}, {r71}, {r155, r149}, {}, {r154, r65}, {}, {r159, r79}, {0x0, r183}, {r138, r54}, {r42}, {}, {}, {0x0, r48}, {r39}, {}, {0x0, r18}, {r138}, {r165}, {r146}, {0x0, r143}, {}, {r70, r122}, {r20, r105}, {r119}, {r182}, {r113, r45}, {}, {}, {0x0, r100}, {r72}, {}, {0x0, r128}, {0x0, r81}, {r141}, {}, {r170, r84}, {r97}, {}, {r10, r38}, {r176}, {}, {r47, r106}, {0x0, r143}, {r113}, {}, {r145}, {r69}, {r57}, {0x0, r162}, {0x0, r35}, {r87}, {0x0, r53}, {}, {r118, r106}, {0x0, r76}, {r123, r150}, {r121}, {}, {}, {r8}, {}, {}, {}, {}, {}, {r151, r130}, {}, {r180, r35}, {r94, r90}, {r82}, {r72}, {r16}, {}, {r135, r44}, {0x0, r88}, {r123}, {r129}, {r98}, {}, {}, {0x0, r164}, {0x0, r27}, {r157}, {0x0, r63}, {0x0, r43}, {0x0, r59}, {0x0, r43}, {0x0, r27}, {r121, r67}, {}, {r86, r43}, {0x0, r166}, {r34}, {0x0, r73}, {r30, r148}, {}, {}, {}, {}, {0x0, r147}, {r56, r31}, {r115}, {r145, r21}, {r64}, {0x0, r142}, {}, {r136}, {}, {r133, r84}, {0x0, r164}, {0x0, r111}, {0x0, r125}, {0x0, r100}, {}, {0x0, r177}, {r16}, {r178, r153}, {}, {r62, r33}, {r163, r168}, {}, {}, {r26}, {0x0, r74}, {r56, r132}, {r77}], 0x0, "e8da0117d3c471"}) 02:21:26 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef01000100fffedaf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000fe0002000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:26 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000004000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:26 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000a0000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000002e02000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 910.965458][T12137] loop2: detected capacity change from 0 to 4096 [ 910.981351][T12137] EXT4-fs (loop2): bad geometry: block count 558 exceeds size of device (512 blocks) [ 910.994211][T12143] loop4: detected capacity change from 0 to 4096 [ 911.001252][T12147] loop3: detected capacity change from 0 to 4096 02:21:26 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef01000100feffdaf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 911.008927][ C1] sd 0:0:1:0: tag#5278 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 911.018800][ C1] sd 0:0:1:0: tag#5278 CDB: opcode=0xe5 (vendor) [ 911.025133][ C1] sd 0:0:1:0: tag#5278 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 911.028169][T12152] loop1: detected capacity change from 0 to 4 [ 911.034175][ C1] sd 0:0:1:0: tag#5278 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 911.049349][ C1] sd 0:0:1:0: tag#5278 CDB[20]: ba 02:21:26 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000002daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003f02000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 911.071382][ C1] sd 0:0:1:0: tag#5279 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 911.081347][ C1] sd 0:0:1:0: tag#5279 CDB: opcode=0xe4 (vendor) [ 911.087812][ C1] sd 0:0:1:0: tag#5279 CDB[00]: e4 9d 02 8c 07 15 e2 0b 51 04 22 69 36 00 59 73 [ 911.096914][ C1] sd 0:0:1:0: tag#5279 CDB[10]: 91 8f e1 59 f8 6d 8e 03 0a cf a7 1b 16 85 31 e9 [ 911.106007][ C1] sd 0:0:1:0: tag#5279 CDB[20]: 7c 8c 98 e7 98 09 7a 3c 82 29 ad 24 d9 cb [ 911.111706][T12152] EXT4-fs (loop1): #clusters per group too big: 32768 02:21:26 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000003daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004002000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 911.124527][T12147] EXT4-fs (loop3): inodes count not valid: 10485792 vs 32 [ 911.160126][T12143] EXT4-fs (loop4): blocks per group (524288) and clusters per group (32768) inconsistent 02:21:26 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000004daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 911.170635][T12152] loop1: detected capacity change from 0 to 4 [ 911.178230][T12152] EXT4-fs (loop1): #clusters per group too big: 32768 [ 911.238866][T12185] loop2: detected capacity change from 0 to 4096 [ 911.261095][T12185] EXT4-fs (loop2): bad geometry: block count 576 exceeds size of device (512 blocks) [ 911.305137][T12185] loop2: detected capacity change from 0 to 4096 [ 911.317825][T12185] EXT4-fs (loop2): bad geometry: block count 576 exceeds size of device (512 blocks) 02:21:27 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000005000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:27 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000aa000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000040202000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:27 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000005daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:27 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x97, 0x0, 0x7, 0x0, 0x0, 0x28300, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x418, 0x0, @perf_config_ext={0x4118, 0x100}, 0x800, 0x7, 0x0, 0x8, 0x0, 0xed7, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x3b, 0x5, 0x0, 0x0, 0xcc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xcb8, 0x80}, 0x480, 0xffffffffffffffe0, 0x0, 0x0, 0x20, 0x0, 0x173, 0x0, 0x4bf, 0x0, 0xe408}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000f00)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000004c0)={0x53, 0xffffffffffffffff, 0x2e, 0x6, @scatter={0x2, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000d40)=""/136, 0x88}, {&(0x7f0000000e00)=""/208, 0xd0}]}, &(0x7f00000001c0)="e49d028c0715e20b5104226936005973918fe159f86d8e030acfa71b168531e97c8c98e798097a3c8229ad24d9cb", &(0x7f0000000540)=""/101, 0x15, 0x10000, 0x2, &(0x7f0000000340)}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x10\'\\@$&\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055300)={0x8f7, [{0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r5}, {}, {}, {r3}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {r3}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, r4}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x0, "0d4abfd4b32220"}) r184 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000840)={0x0, 0xfaef, 0xffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r184, 0x0) r185 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r185, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r185, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0xfffffffffffffeff, 0x1) sendto$inet(r185, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b300)={0xffff, [{r72, r60}, {}, {r109}, {r160}, {}, {r171}, {}, {}, {r102}, {}, {r134}, {}, {0x0, r52}, {0x0, r40}, {0x0, r181}, {r126, r14}, {r159, r32}, {r176, r58}, {}, {r13, r175}, {0x0, r179}, {r11}, {r19, r24}, {r28}, {r128}, {0x0, r33}, {}, {}, {}, {r103, r49}, {}, {}, {r47}, {r115, r157}, {0x0, r9}, {r56}, {0x0, r38}, {0x0, r37}, {}, {}, {0x0, r173}, {}, {r103, r32}, {r125}, {r106, r142}, {0x0, r123}, {}, {}, {0x0, r61}, {}, {}, {0x0, r116}, {r115}, {r66}, {0x0, r98}, {}, {}, {}, {r167}, {r34}, {r130, r151}, {}, {}, {r72}, {0x0, r95}, {}, {}, {0x0, r80}, {r78, r136}, {r41}, {0x0, r80}, {}, {0x0, r85}, {r55}, {0x0, r50}, {r25, r169}, {r6}, {r62}, {r178, r12}, {r174}, {0x0, r22}, {r17, r173}, {r46}, {}, {r138, r75}, {r36, r31}, {}, {}, {r139, r99}, {0x0, r91}, {r107}, {r69}, {r180}, {}, {}, {r160}, {r172}, {}, {0x0, r111}, {r100, r7}, {0x0, r143}, {r90}, {}, {r92}, {}, {r94}, {0x0, r113}, {0x0, r133}, {r114}, {}, {r23}, {0x0, r68}, {r51}, {0x0, r89}, {0x0, r108}, {r57, r166}, {0x0, r155}, {r15, r29}, {}, {r96}, {r100, r119}, {}, {r83, r116}, {}, {0x0, r101}, {}, {r180}, {}, {}, {}, {r71}, {r154, r148}, {}, {r153, r65}, {}, {r158, r79}, {0x0, r183}, {r137, r54}, {r42}, {}, {}, {0x0, r48}, {r39}, {}, {0x0, r18}, {r137}, {r164}, {r145}, {0x0, r142}, {}, {r70, r121}, {r20, r104}, {r118}, {r182}, {r112, r45}, {}, {}, {0x0, r99}, {r72}, {}, {0x0, r127}, {0x0, r81}, {r140}, {}, {r170, r84}, {r96}, {}, {r10, r38}, {r176}, {}, {r47, r105}, {0x0, r142}, {r112}, {}, {r144}, {r69}, {r57}, {0x0, r161}, {0x0, r35}, {r87}, {0x0, r53}, {}, {r117, r105}, {0x0, r76}, {r122, r149}, {r120}, {}, {}, {r8}, {}, {}, {}, {}, {}, {r150, r129}, {}, {r180, r35}, {r93, r89}, {r82}, {r72}, {r16}, {}, {r134, r44}, {0x0, r88}, {r122}, {r128}, {r97}, {}, {}, {0x0, r163}, {0x0, r27}, {r156}, {0x0, r63}, {0x0, r43}, {0x0, r59}, {0x0, r43}, {0x0, r27}, {r120, r67}, {}, {r86, r43}, {0x0, r165}, {r34}, {0x0, r73}, {r30, r147}, {}, {}, {}, {}, {0x0, r146}, {r56, r31}, {r114}, {r144, r21}, {r64}, {0x0, r141}, {}, {r135}, {}, {r132, r84}, {0x0, r163}, {0x0, r110}, {0x0, r124}, {0x0, r99}, {}, {0x0, r177}, {r16}, {r178, r152}, {}, {r62, r33}, {r162, r168}, {}, {}, {r26}, {0x0, r74}, {r56, r131}, {r77}], 0x0, "e8da0117d3c471"}) 02:21:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200008004002000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 911.869305][T12209] loop3: detected capacity change from 0 to 4096 [ 911.873322][T12208] loop1: detected capacity change from 0 to 4 [ 911.876064][T12210] loop2: detected capacity change from 0 to 4096 [ 911.893547][T12218] loop4: detected capacity change from 0 to 4096 [ 911.902165][T12209] EXT4-fs (loop3): inodes count not valid: 11141152 vs 32 [ 911.913925][T12208] EXT4-fs (loop1): #clusters per group too big: 32768 [ 911.922861][ C1] sd 0:0:1:0: tag#5284 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 911.932723][ C1] sd 0:0:1:0: tag#5284 CDB: opcode=0xe5 (vendor) [ 911.933770][T12210] EXT4-fs (loop2): bad geometry: block count 576 exceeds size of device (512 blocks) [ 911.939080][ C1] sd 0:0:1:0: tag#5284 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 911.957539][ C1] sd 0:0:1:0: tag#5284 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d 02:21:27 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000006daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:27 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000ab000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 911.966781][ C1] sd 0:0:1:0: tag#5284 CDB[20]: ba [ 911.980244][ C1] sd 0:0:1:0: tag#5285 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 911.990093][ C1] sd 0:0:1:0: tag#5285 CDB: opcode=0xe4 (vendor) [ 911.996712][ C1] sd 0:0:1:0: tag#5285 CDB[00]: e4 9d 02 8c 07 15 e2 0b 51 04 22 69 36 00 59 73 [ 912.005760][ C1] sd 0:0:1:0: tag#5285 CDB[10]: 91 8f e1 59 f8 6d 8e 03 0a cf a7 1b 16 85 31 e9 02:21:27 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000007daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:27 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000b1000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:27 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000008daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 912.014823][ C1] sd 0:0:1:0: tag#5285 CDB[20]: 7c 8c 98 e7 98 09 7a 3c 82 29 ad 24 d9 cb [ 912.023807][T12218] EXT4-fs (loop4): blocks per group (524288) and clusters per group (32768) inconsistent [ 912.061271][T12208] loop1: detected capacity change from 0 to 4 [ 912.062208][T12210] loop2: detected capacity change from 0 to 4096 [ 912.073095][T12208] EXT4-fs (loop1): #clusters per group too big: 32768 [ 912.096298][T12210] EXT4-fs (loop2): bad geometry: block count 576 exceeds size of device (512 blocks) 02:21:27 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000202000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:27 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000018daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000302000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 912.099218][T12250] loop3: detected capacity change from 0 to 4096 [ 912.123759][T12255] loop4: detected capacity change from 0 to 4096 [ 912.130549][T12250] EXT4-fs (loop3): inodes count not valid: 11599904 vs 32 02:21:27 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef01000100001cdaf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004802000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 912.157927][T12255] EXT4-fs (loop4): Invalid log block size: 514 [ 912.201981][T12269] loop1: detected capacity change from 0 to 4 [ 912.207894][T12274] loop2: detected capacity change from 0 to 4096 [ 912.215723][T12269] EXT4-fs (loop1): #clusters per group too big: 32768 [ 912.222607][T12274] EXT4-fs (loop2): bad geometry: block count 584 exceeds size of device (512 blocks) [ 912.273741][T12269] loop1: detected capacity change from 0 to 4 [ 912.286858][T12269] EXT4-fs (loop1): #clusters per group too big: 32768 02:21:28 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x97, 0x0, 0x7, 0x0, 0x0, 0x28300, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x418, 0x0, @perf_config_ext={0x4118, 0x100}, 0x800, 0x7, 0x0, 0x8, 0x0, 0xed7, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x3b, 0x5, 0x0, 0x0, 0xcc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xcb8, 0x80}, 0x480, 0xffffffffffffffe0, 0x0, 0x0, 0x20, 0x0, 0x173, 0x0, 0x4bf, 0x0, 0xe408}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000f00)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000004c0)={0x53, 0xffffffffffffffff, 0x2e, 0x6, @scatter={0x2, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000d40)=""/136, 0x88}, {&(0x7f0000000e00)=""/208, 0xd0}]}, &(0x7f00000001c0)="e49d028c0715e20b5104226936005973918fe159f86d8e030acfa71b168531e97c8c98e798097a3c8229ad24d9cb", &(0x7f0000000540)=""/101, 0x15, 0x10000, 0x2, &(0x7f0000000340)}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x10\'\\@$&\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055300)={0x8f7, [{0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r5}, {}, {}, {r3}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {r3}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, r4}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x0, "0d4abfd4b32220"}) r184 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000840)={0x0, 0xfaef, 0xffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r184, 0x0) r185 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r185, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r185, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0xfffffffffffffeff, 0x1) sendto$inet(r185, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b300)={0xffff, [{r72, r60}, {}, {r109}, {r160}, {}, {r171}, {}, {}, {r102}, {}, {r134}, {}, {0x0, r52}, {0x0, r40}, {0x0, r181}, {r126, r14}, {r159, r32}, {r176, r58}, {}, {r13, r175}, {0x0, r179}, {r11}, {r19, r24}, {r28}, {r128}, {0x0, r33}, {}, {}, {}, {r103, r49}, {}, {}, {r47}, {r115, r157}, {0x0, r9}, {r56}, {0x0, r38}, {0x0, r37}, {}, {}, {0x0, r173}, {}, {r103, r32}, {r125}, {r106, r142}, {0x0, r123}, {}, {}, {0x0, r61}, {}, {}, {0x0, r116}, {r115}, {r66}, {0x0, r98}, {}, {}, {}, {r167}, {r34}, {r130, r151}, {}, {}, {r72}, {0x0, r95}, {}, {}, {0x0, r80}, {r78, r136}, {r41}, {0x0, r80}, {}, {0x0, r85}, {r55}, {0x0, r50}, {r25, r169}, {r6}, {r62}, {r178, r12}, {r174}, {0x0, r22}, {r17, r173}, {r46}, {}, {r138, r75}, {r36, r31}, {}, {}, {r139, r99}, {0x0, r91}, {r107}, {r69}, {r180}, {}, {}, {r160}, {r172}, {}, {0x0, r111}, {r100, r7}, {0x0, r143}, {r90}, {}, {r92}, {}, {r94}, {0x0, r113}, {0x0, r133}, {r114}, {}, {r23}, {0x0, r68}, {r51}, {0x0, r89}, {0x0, r108}, {r57, r166}, {0x0, r155}, {r15, r29}, {}, {r96}, {r100, r119}, {}, {r83, r116}, {}, {0x0, r101}, {}, {r180}, {}, {}, {}, {r71}, {r154, r148}, {}, {r153, r65}, {}, {r158, r79}, {0x0, r183}, {r137, r54}, {r42}, {}, {}, {0x0, r48}, {r39}, {}, {0x0, r18}, {r137}, {r164}, {r145}, {0x0, r142}, {}, {r70, r121}, {r20, r104}, {r118}, {r182}, {r112, r45}, {}, {}, {0x0, r99}, {r72}, {}, {0x0, r127}, {0x0, r81}, {r140}, {}, {r170, r84}, {r96}, {}, {r10, r38}, {r176}, {}, {r47, r105}, {0x0, r142}, {r112}, {}, {r144}, {r69}, {r57}, {0x0, r161}, {0x0, r35}, {r87}, {0x0, r53}, {}, {r117, r105}, {0x0, r76}, {r122, r149}, {r120}, {}, {}, {r8}, {}, {}, {}, {}, {}, {r150, r129}, {}, {r180, r35}, {r93, r89}, {r82}, {r72}, {r16}, {}, {r134, r44}, {0x0, r88}, {r122}, {r128}, {r97}, {}, {}, {0x0, r163}, {0x0, r27}, {r156}, {0x0, r63}, {0x0, r43}, {0x0, r59}, {0x0, r43}, {0x0, r27}, {r120, r67}, {}, {r86, r43}, {0x0, r165}, {r34}, {0x0, r73}, {r30, r147}, {}, {}, {}, {}, {0x0, r146}, {r56, r31}, {r114}, {r144, r21}, {r64}, {0x0, r141}, {}, {r135}, {}, {r132, r84}, {0x0, r163}, {0x0, r110}, {0x0, r124}, {0x0, r99}, {}, {0x0, r177}, {r16}, {r178, r152}, {}, {r62, r33}, {r162, r168}, {}, {}, {r26}, {0x0, r74}, {r56, r131}, {r77}], 0x0, "e8da0117d3c471"}) 02:21:28 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000026daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:28 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2003c1000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004c02000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:28 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000203000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000007c0302000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 912.791773][T12298] loop3: detected capacity change from 0 to 4096 [ 912.802125][T12302] loop1: detected capacity change from 0 to 4 [ 912.809159][T12307] loop2: detected capacity change from 0 to 4096 [ 912.812196][T12306] loop4: detected capacity change from 0 to 4096 [ 912.819547][ C0] sd 0:0:1:0: tag#5286 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 912.831728][ C0] sd 0:0:1:0: tag#5286 CDB: opcode=0xe5 (vendor) [ 912.838072][ C0] sd 0:0:1:0: tag#5286 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 912.838545][T12306] EXT4-fs (loop4): Invalid log block size: 770 [ 912.847097][ C0] sd 0:0:1:0: tag#5286 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 912.847114][ C0] sd 0:0:1:0: tag#5286 CDB[20]: ba [ 912.877046][ C0] sd 0:0:1:0: tag#5287 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s 02:21:28 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef0100010000fedaf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 912.886922][ C0] sd 0:0:1:0: tag#5287 CDB: opcode=0xe4 (vendor) [ 912.886997][T12307] EXT4-fs (loop2): bad geometry: block count 588 exceeds size of device (512 blocks) [ 912.893282][ C0] sd 0:0:1:0: tag#5287 CDB[00]: e4 9d 02 8c 07 15 e2 0b 51 04 22 69 36 00 59 73 [ 912.912147][ C0] sd 0:0:1:0: tag#5287 CDB[10]: 91 8f e1 59 f8 6d 8e 03 0a cf a7 1b 16 85 31 e9 [ 912.921238][ C0] sd 0:0:1:0: tag#5287 CDB[20]: 7c 8c 98 e7 98 09 7a 3c 82 29 ad 24 d9 cb [ 912.931772][T12302] EXT4-fs (loop1): #clusters per group too big: 32768 02:21:28 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4795f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 912.938782][T12298] EXT4-fs (loop3): inodes count not valid: 12649248 vs 32 02:21:28 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf46506000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:28 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2001d4000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:28 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000204000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 912.984677][T12302] loop1: detected capacity change from 0 to 4 [ 912.991466][T12302] EXT4-fs (loop1): #clusters per group too big: 32768 [ 913.006152][T12307] loop2: detected capacity change from 0 to 4096 [ 913.024399][T12307] EXT4-fs (loop2): bad geometry: block count 588 exceeds size of device (512 blocks) 02:21:28 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f020000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 913.082621][T12346] loop3: detected capacity change from 0 to 4096 [ 913.091266][T12347] loop4: detected capacity change from 0 to 4096 [ 913.105522][T12346] EXT4-fs (loop3): inodes count not valid: 13893920 vs 32 [ 913.114658][T12347] EXT4-fs (loop4): Invalid log block size: 1026 02:21:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000007d0302000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000034e02000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:29 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20c0ed000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:29 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000205000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:29 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x97, 0x0, 0x7, 0x0, 0x0, 0x28300, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x418, 0x0, @perf_config_ext={0x4118, 0x100}, 0x800, 0x7, 0x0, 0x8, 0x0, 0xed7, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x3b, 0x5, 0x0, 0x0, 0xcc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xcb8, 0x80}, 0x480, 0xffffffffffffffe0, 0x0, 0x0, 0x20, 0x0, 0x173, 0x0, 0x4bf, 0x0, 0xe408}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000f00)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000004c0)={0x53, 0xffffffffffffffff, 0x2e, 0x6, @scatter={0x2, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000d40)=""/136, 0x88}, {&(0x7f0000000e00)=""/208, 0xd0}]}, &(0x7f00000001c0)="e49d028c0715e20b5104226936005973918fe159f86d8e030acfa71b168531e97c8c98e798097a3c8229ad24d9cb", &(0x7f0000000540)=""/101, 0x15, 0x10000, 0x2, &(0x7f0000000340)}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x10\'\\@$&\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055300)={0x8f7, [{0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r5}, {}, {}, {r3}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {r3}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, r4}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x0, "0d4abfd4b32220"}) r184 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000840)={0x0, 0xfaef, 0xffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r184, 0x0) r185 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r185, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r185, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0xfffffffffffffeff, 0x1) sendto$inet(r185, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b300)={0xffff, [{r72, r60}, {}, {r109}, {r160}, {}, {r171}, {}, {}, {r102}, {}, {r134}, {}, {0x0, r52}, {0x0, r40}, {0x0, r181}, {r126, r14}, {r159, r32}, {r176, r58}, {}, {r13, r175}, {0x0, r179}, {r11}, {r19, r24}, {r28}, {r128}, {0x0, r33}, {}, {}, {}, {r103, r49}, {}, {}, {r47}, {r115, r157}, {0x0, r9}, {r56}, {0x0, r38}, {0x0, r37}, {}, {}, {0x0, r173}, {}, {r103, r32}, {r125}, {r106, r142}, {0x0, r123}, {}, {}, {0x0, r61}, {}, {}, {0x0, r116}, {r115}, {r66}, {0x0, r98}, {}, {}, {}, {r167}, {r34}, {r130, r151}, {}, {}, {r72}, {0x0, r95}, {}, {}, {0x0, r80}, {r78, r136}, {r41}, {0x0, r80}, {}, {0x0, r85}, {r55}, {0x0, r50}, {r25, r169}, {r6}, {r62}, {r178, r12}, {r174}, {0x0, r22}, {r17, r173}, {r46}, {}, {r138, r75}, {r36, r31}, {}, {}, {r139, r99}, {0x0, r91}, {r107}, {r69}, {r180}, {}, {}, {r160}, {r172}, {}, {0x0, r111}, {r100, r7}, {0x0, r143}, {r90}, {}, {r92}, {}, {r94}, {0x0, r113}, {0x0, r133}, {r114}, {}, {r23}, {0x0, r68}, {r51}, {0x0, r89}, {0x0, r108}, {r57, r166}, {0x0, r155}, {r15, r29}, {}, {r96}, {r100, r119}, {}, {r83, r116}, {}, {0x0, r101}, {}, {r180}, {}, {}, {}, {r71}, {r154, r148}, {}, {r153, r65}, {}, {r158, r79}, {0x0, r183}, {r137, r54}, {r42}, {}, {}, {0x0, r48}, {r39}, {}, {0x0, r18}, {r137}, {r164}, {r145}, {0x0, r142}, {}, {r70, r121}, {r20, r104}, {r118}, {r182}, {r112, r45}, {}, {}, {0x0, r99}, {r72}, {}, {0x0, r127}, {0x0, r81}, {r140}, {}, {r170, r84}, {r96}, {}, {r10, r38}, {r176}, {}, {r47, r105}, {0x0, r142}, {r112}, {}, {r144}, {r69}, {r57}, {0x0, r161}, {0x0, r35}, {r87}, {0x0, r53}, {}, {r117, r105}, {0x0, r76}, {r122, r149}, {r120}, {}, {}, {r8}, {}, {}, {}, {}, {}, {r150, r129}, {}, {r180, r35}, {r93, r89}, {r82}, {r72}, {r16}, {}, {r134, r44}, {0x0, r88}, {r122}, {r128}, {r97}, {}, {}, {0x0, r163}, {0x0, r27}, {r156}, {0x0, r63}, {0x0, r43}, {0x0, r59}, {0x0, r43}, {0x0, r27}, {r120, r67}, {}, {r86, r43}, {0x0, r165}, {r34}, {0x0, r73}, {r30, r147}, {}, {}, {}, {}, {0x0, r146}, {r56, r31}, {r114}, {r144, r21}, {r64}, {0x0, r141}, {}, {r135}, {}, {r132, r84}, {0x0, r163}, {0x0, r110}, {0x0, r124}, {0x0, r99}, {}, {0x0, r177}, {r16}, {r178, r152}, {}, {r62, r33}, {r162, r168}, {}, {}, {r26}, {0x0, r74}, {r56, r131}, {r77}], 0x0, "e8da0117d3c471"}) 02:21:29 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f030000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 913.661768][ C1] sd 0:0:1:0: tag#5288 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 913.671723][ C1] sd 0:0:1:0: tag#5288 CDB: opcode=0xe5 (vendor) [ 913.678089][ C1] sd 0:0:1:0: tag#5288 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 913.687136][ C1] sd 0:0:1:0: tag#5288 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 913.696063][T12373] loop2: detected capacity change from 0 to 4096 [ 913.696255][ C1] sd 0:0:1:0: tag#5288 CDB[20]: ba [ 913.704324][T12374] loop1: detected capacity change from 0 to 4 [ 913.726464][T12375] loop3: detected capacity change from 0 to 4096 [ 913.735116][T12382] loop4: detected capacity change from 0 to 4096 [ 913.742228][T12373] EXT4-fs (loop2): bad geometry: block count 590 exceeds size of device (512 blocks) [ 913.747553][ C1] sd 0:0:1:0: tag#5289 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 913.761789][ C1] sd 0:0:1:0: tag#5289 CDB: opcode=0xe4 (vendor) [ 913.768162][ C1] sd 0:0:1:0: tag#5289 CDB[00]: e4 9d 02 8c 07 15 e2 0b 51 04 22 69 36 00 59 73 [ 913.769640][T12374] EXT4-fs (loop1): #clusters per group too big: 32768 [ 913.777220][ C1] sd 0:0:1:0: tag#5289 CDB[10]: 91 8f e1 59 f8 6d 8e 03 0a cf a7 1b 16 85 31 e9 [ 913.777238][ C1] sd 0:0:1:0: tag#5289 CDB[20]: 7c 8c 98 e7 98 09 7a 3c 82 29 ad 24 d9 cb [ 913.785064][T12375] EXT4-fs (loop3): inodes count not valid: 15581216 vs 32 02:21:29 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f040000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 913.810000][T12382] EXT4-fs (loop4): Invalid log block size: 1282 02:21:29 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000206000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:29 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2003f0000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:29 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f050000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 913.840072][T12373] loop2: detected capacity change from 0 to 4096 [ 913.851971][T12374] loop1: detected capacity change from 0 to 4 [ 913.870251][T12373] EXT4-fs (loop2): bad geometry: block count 590 exceeds size of device (512 blocks) [ 913.880331][T12374] EXT4-fs (loop1): #clusters per group too big: 32768 02:21:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000007e0302000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006002000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 913.922731][T12411] loop4: detected capacity change from 0 to 4096 [ 913.933479][T12416] loop3: detected capacity change from 0 to 4096 [ 913.947871][T12411] EXT4-fs (loop4): Invalid log block size: 1538 02:21:29 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f060000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 913.992887][T12416] EXT4-fs (loop3): inodes count not valid: 15729440 vs 32 [ 914.011321][T12431] loop2: detected capacity change from 0 to 4096 [ 914.030418][T12431] EXT4-fs (loop2): bad geometry: block count 608 exceeds size of device (512 blocks) 02:21:29 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000207000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 914.031306][T12432] loop1: detected capacity change from 0 to 4 02:21:29 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2003f1000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 914.066115][T12440] loop4: detected capacity change from 0 to 4096 [ 914.078077][T12440] EXT4-fs (loop4): Invalid log block size: 1794 02:21:29 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f070000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 914.107911][T12432] EXT4-fs (loop1): #clusters per group too big: 32768 [ 914.153663][T12456] loop3: detected capacity change from 0 to 4096 [ 914.162629][T12456] EXT4-fs (loop3): inodes count not valid: 15794976 vs 32 [ 914.174590][T12432] loop1: detected capacity change from 0 to 4 [ 914.184160][T12432] EXT4-fs (loop1): #clusters per group too big: 32768 02:21:29 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x97, 0x0, 0x7, 0x0, 0x0, 0x28300, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x418, 0x0, @perf_config_ext={0x4118, 0x100}, 0x800, 0x7, 0x0, 0x8, 0x0, 0xed7, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x3b, 0x5, 0x0, 0x0, 0xcc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xcb8, 0x80}, 0x480, 0xffffffffffffffe0, 0x0, 0x0, 0x20, 0x0, 0x173, 0x0, 0x4bf, 0x0, 0xe408}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000f00)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000004c0)={0x53, 0xffffffffffffffff, 0x2e, 0x6, @scatter={0x2, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000d40)=""/136, 0x88}, {&(0x7f0000000e00)=""/208, 0xd0}]}, &(0x7f00000001c0)="e49d028c0715e20b5104226936005973918fe159f86d8e030acfa71b168531e97c8c98e798097a3c8229ad24d9cb", &(0x7f0000000540)=""/101, 0x15, 0x10000, 0x2, &(0x7f0000000340)}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x10\'\\@$&\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055300)={0x8f7, [{0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r5}, {}, {}, {r3}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {r3}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, r4}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x0, "0d4abfd4b32220"}) r184 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000840)={0x0, 0xfaef, 0xffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r184, 0x0) r185 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r185, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r185, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0xfffffffffffffeff, 0x1) sendto$inet(r185, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b300)={0xffff, [{r72, r60}, {}, {r109}, {r160}, {}, {r171}, {}, {}, {r102}, {}, {r134}, {}, {0x0, r52}, {0x0, r40}, {0x0, r181}, {r126, r14}, {r159, r32}, {r176, r58}, {}, {r13, r175}, {0x0, r179}, {r11}, {r19, r24}, {r28}, {r128}, {0x0, r33}, {}, {}, {}, {r103, r49}, {}, {}, {r47}, {r115, r157}, {0x0, r9}, {r56}, {0x0, r38}, {0x0, r37}, {}, {}, {0x0, r173}, {}, {r103, r32}, {r125}, {r106, r142}, {0x0, r123}, {}, {}, {0x0, r61}, {}, {}, {0x0, r116}, {r115}, {r66}, {r89}, {}, {}, {}, {r167}, {r34}, {r130, r151}, {}, {}, {r72}, {0x0, r96}, {}, {}, {0x0, r80}, {r78, r136}, {r41}, {0x0, r80}, {}, {0x0, r85}, {r55}, {0x0, r50}, {r25, r169}, {r6}, {r62}, {r178, r12}, {r174}, {0x0, r22}, {r17, r173}, {r46}, {}, {r138, r75}, {r36, r31}, {}, {}, {r139, r99}, {0x0, r92}, {r107}, {r69}, {r180}, {}, {}, {r160}, {r172}, {}, {0x0, r111}, {r100, r7}, {0x0, r143}, {r91}, {}, {r93}, {}, {r95}, {0x0, r113}, {0x0, r133}, {r114}, {}, {r23}, {0x0, r68}, {r51}, {0x0, r90}, {0x0, r108}, {r57, r166}, {0x0, r155}, {r15, r29}, {}, {r97}, {r100, r119}, {}, {r83, r116}, {}, {0x0, r101}, {}, {r180}, {}, {}, {}, {r71}, {r154, r148}, {}, {r153, r65}, {}, {r158, r79}, {0x0, r183}, {r137, r54}, {r42}, {}, {}, {0x0, r48}, {r39}, {}, {0x0, r18}, {r137}, {r164}, {r145}, {0x0, r142}, {}, {r70, r121}, {r20, r104}, {r118}, {r182}, {r112, r45}, {}, {}, {0x0, r99}, {r72}, {}, {0x0, r127}, {0x0, r81}, {r140}, {}, {r170, r84}, {r97}, {}, {r10, r38}, {r176}, {}, {r47, r105}, {0x0, r142}, {r112}, {}, {r144}, {r69}, {r57}, {0x0, r161}, {0x0, r35}, {r87}, {0x0, r53}, {}, {r117, r105}, {0x0, r76}, {r122, r149}, {r120}, {}, {}, {r8}, {}, {}, {}, {}, {}, {r150, r129}, {}, {r180, r35}, {r94, r90}, {r82}, {r72}, {r16}, {}, {r134, r44}, {0x0, r88}, {r122}, {r128}, {r98}, {}, {}, {0x0, r163}, {0x0, r27}, {r156}, {0x0, r63}, {0x0, r43}, {0x0, r59}, {0x0, r43}, {0x0, r27}, {r120, r67}, {}, {r86, r43}, {0x0, r165}, {r34}, {0x0, r73}, {r30, r147}, {}, {}, {}, {}, {0x0, r146}, {r56, r31}, {r114}, {r144, r21}, {r64}, {0x0, r141}, {}, {r135}, {}, {r132, r84}, {0x0, r163}, {0x0, r110}, {0x0, r124}, {0x0, r99}, {}, {0x0, r177}, {r16}, {r178, r152}, {}, {r62, r33}, {r162, r168}, {}, {}, {r26}, {0x0, r74}, {r56, r131}, {r77}], 0x0, "e8da0117d3c471"}) 02:21:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006802000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:29 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f080000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:29 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000208000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:29 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200ff8000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000c10302000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 914.512366][T12477] loop2: detected capacity change from 0 to 4096 [ 914.537537][T12477] EXT4-fs (loop2): bad geometry: block count 616 exceeds size of device (512 blocks) [ 914.548145][T12485] loop4: detected capacity change from 0 to 4096 [ 914.554858][T12483] loop1: detected capacity change from 0 to 4 02:21:30 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f100000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006c02000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 914.572603][T12488] loop3: detected capacity change from 0 to 4096 [ 914.585609][T12483] EXT4-fs (loop1): #clusters per group too big: 32768 [ 914.598350][T12485] EXT4-fs (loop4): Invalid log block size: 2050 [ 914.609430][T12488] EXT4-fs (loop3): inodes count not valid: 16256800 vs 32 02:21:30 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000209000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:30 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20fffe000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 914.646126][T12483] loop1: detected capacity change from 0 to 4 [ 914.684343][T12483] EXT4-fs (loop1): #clusters per group too big: 32768 02:21:30 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f180000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:30 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f00000000000000020a000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 914.693303][T12519] loop4: detected capacity change from 0 to 4096 [ 914.703205][T12521] loop2: detected capacity change from 0 to 4096 [ 914.710173][T12519] EXT4-fs (loop4): Invalid log block size: 2306 [ 914.710676][T12520] loop3: detected capacity change from 0 to 4096 [ 914.745888][T12520] EXT4-fs (loop3): inodes count not valid: 16711456 vs 32 [ 914.774697][T12521] EXT4-fs (loop2): bad geometry: block count 620 exceeds size of device (512 blocks) [ 914.788059][T12534] loop4: detected capacity change from 0 to 4096 [ 914.807522][T12534] EXT4-fs (loop4): Invalid log block size: 2562 [ 914.816453][T12521] loop2: detected capacity change from 0 to 4096 [ 914.823478][T12521] EXT4-fs (loop2): bad geometry: block count 620 exceeds size of device (512 blocks) 02:21:30 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x97, 0x0, 0x7, 0x0, 0x0, 0x28300, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x418, 0x0, @perf_config_ext={0x4118, 0x100}, 0x800, 0x7, 0x0, 0x8, 0x0, 0xed7, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x3b, 0x5, 0x0, 0x0, 0xcc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xcb8, 0x80}, 0x480, 0xffffffffffffffe0, 0x0, 0x0, 0x20, 0x0, 0x173, 0x0, 0x4bf, 0x0, 0xe408}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000f00)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000004c0)={0x53, 0xffffffffffffffff, 0x2e, 0x6, @scatter={0x2, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000d40)=""/136, 0x88}, {&(0x7f0000000e00)=""/208, 0xd0}]}, &(0x7f00000001c0)="e49d028c0715e20b5104226936005973918fe159f86d8e030acfa71b168531e97c8c98e798097a3c8229ad24d9cb", &(0x7f0000000540)=""/101, 0x15, 0x10000, 0x2, &(0x7f0000000340)}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x10\'\\@$&\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055300)={0x8f7, [{0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r5}, {}, {}, {r3}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {r3}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, r4}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x0, "0d4abfd4b32220"}) r184 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000840)={0x0, 0xfaef, 0xffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r184, 0x0) r185 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r185, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r185, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0xfffffffffffffeff, 0x1) sendto$inet(r185, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b300)={0xffff, [{r72, r60}, {}, {r109}, {r160}, {}, {r171}, {}, {}, {r102}, {}, {r134}, {}, {0x0, r52}, {0x0, r40}, {0x0, r181}, {r126, r14}, {r159, r32}, {r176, r58}, {}, {r13, r175}, {0x0, r179}, {r11}, {r19, r24}, {r28}, {r128}, {0x0, r33}, {}, {}, {}, {r103, r49}, {}, {}, {r47}, {r115, r157}, {0x0, r9}, {r56}, {0x0, r38}, {0x0, r37}, {}, {}, {0x0, r173}, {}, {r103, r32}, {r125}, {r106, r142}, {0x0, r123}, {}, {}, {0x0, r61}, {}, {}, {0x0, r116}, {r115}, {r66}, {r89}, {}, {}, {}, {r167}, {r34}, {r130, r151}, {}, {}, {r72}, {0x0, r96}, {}, {}, {0x0, r80}, {r78, r136}, {r41}, {0x0, r80}, {}, {0x0, r85}, {r55}, {0x0, r50}, {r25, r169}, {r6}, {r62}, {r178, r12}, {r174}, {0x0, r22}, {r17, r173}, {r46}, {}, {r138, r75}, {r36, r31}, {}, {}, {r139, r99}, {0x0, r92}, {r107}, {r69}, {r180}, {}, {}, {r160}, {r172}, {}, {0x0, r111}, {r100, r7}, {0x0, r143}, {r91}, {}, {r93}, {}, {r95}, {0x0, r113}, {0x0, r133}, {r114}, {}, {r23}, {0x0, r68}, {r51}, {0x0, r90}, {0x0, r108}, {r57, r166}, {0x0, r155}, {r15, r29}, {}, {r97}, {r100, r119}, {}, {r83, r116}, {}, {0x0, r101}, {}, {r180}, {}, {}, {}, {r71}, {r154, r148}, {}, {r153, r65}, {}, {r158, r79}, {0x0, r183}, {r137, r54}, {r42}, {}, {}, {0x0, r48}, {r39}, {}, {0x0, r18}, {r137}, {r164}, {r145}, {0x0, r142}, {}, {r70, r121}, {r20, r104}, {r118}, {r182}, {r112, r45}, {}, {}, {0x0, r99}, {r72}, {}, {0x0, r127}, {0x0, r81}, {r140}, {}, {r170, r84}, {r97}, {}, {r10, r38}, {r176}, {}, {r47, r105}, {0x0, r142}, {r112}, {}, {r144}, {r69}, {r57}, {0x0, r161}, {0x0, r35}, {r87}, {0x0, r53}, {}, {r117, r105}, {0x0, r76}, {r122, r149}, {r120}, {}, {}, {r8}, {}, {}, {}, {}, {}, {r150, r129}, {}, {r180, r35}, {r94, r90}, {r82}, {r72}, {r16}, {}, {r134, r44}, {0x0, r88}, {r122}, {r128}, {r98}, {}, {}, {0x0, r163}, {0x0, r27}, {r156}, {0x0, r63}, {0x0, r43}, {0x0, r59}, {0x0, r43}, {0x0, r27}, {r120, r67}, {}, {r86, r43}, {0x0, r165}, {r34}, {0x0, r73}, {r30, r147}, {}, {}, {}, {}, {0x0, r146}, {r56, r31}, {r114}, {r144, r21}, {r64}, {0x0, r141}, {}, {r135}, {}, {r132, r84}, {0x0, r163}, {0x0, r110}, {0x0, r124}, {0x0, r99}, {}, {0x0, r177}, {r16}, {r178, r152}, {}, {r62, r33}, {r162, r168}, {}, {}, {r26}, {0x0, r74}, {r56, r131}, {r77}], 0x0, "e8da0117d3c471"}) 02:21:30 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f1c0000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000020402000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:30 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2001ff000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000027202000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:30 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f00000000000000020b000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 915.446271][T12563] loop1: detected capacity change from 0 to 4 [ 915.448770][T12565] loop3: detected capacity change from 0 to 4096 [ 915.458455][T12567] loop2: detected capacity change from 0 to 4096 [ 915.460607][T12566] loop4: detected capacity change from 0 to 4096 [ 915.486778][T12566] EXT4-fs (loop4): Invalid log block size: 2818 02:21:30 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f260000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:30 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f00000000000000020c000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:30 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200fff000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:30 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655ffe0000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 915.500669][T12565] EXT4-fs (loop3): inodes count not valid: 16711968 vs 32 [ 915.504292][T12563] EXT4-fs (loop1): #clusters per group too big: 32768 [ 915.528029][T12567] EXT4-fs (loop2): bad geometry: block count 626 exceeds size of device (512 blocks) 02:21:30 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x97, 0x0, 0x7, 0x0, 0x0, 0x28300, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x418, 0x0, @perf_config_ext={0x4118, 0x100}, 0x800, 0x7, 0x0, 0x8, 0x0, 0xed7, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x3b, 0x5, 0x0, 0x0, 0xcc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xcb8, 0x80}, 0x480, 0xffffffffffffffe0, 0x0, 0x0, 0x20, 0x0, 0x173, 0x0, 0x4bf, 0x0, 0xe408}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000f00)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000004c0)={0x53, 0xffffffffffffffff, 0x2e, 0x6, @scatter={0x2, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000d40)=""/136, 0x88}, {&(0x7f0000000e00)=""/208, 0xd0}]}, &(0x7f00000001c0)="e49d028c0715e20b5104226936005973918fe159f86d8e030acfa71b168531e97c8c98e798097a3c8229ad24d9cb", &(0x7f0000000540)=""/101, 0x15, 0x10000, 0x2, &(0x7f0000000340)}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x10\'\\@$&\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055300)={0x8f7, [{0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r5}, {}, {}, {r3}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {r3}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, r4}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x0, "0d4abfd4b32220"}) r184 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000840)={0x0, 0xfaef, 0xffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r184, 0x0) r185 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r185, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r185, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0xfffffffffffffeff, 0x1) sendto$inet(r185, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b300)={0xffff, [{r72, r60}, {}, {r109}, {r160}, {}, {r171}, {}, {}, {r102}, {}, {r134}, {}, {0x0, r52}, {0x0, r40}, {0x0, r181}, {r126, r14}, {r159, r32}, {r176, r58}, {}, {r13, r175}, {0x0, r179}, {r11}, {r19, r24}, {r28}, {r128}, {0x0, r33}, {}, {}, {}, {r103, r49}, {}, {}, {r47}, {r115, r157}, {0x0, r9}, {r56}, {0x0, r38}, {0x0, r37}, {}, {}, {0x0, r173}, {}, {r103, r32}, {r125}, {r106, r142}, {0x0, r123}, {}, {}, {0x0, r61}, {}, {}, {0x0, r116}, {r115}, {r66}, {r89}, {}, {}, {}, {r167}, {r34}, {r130, r151}, {}, {}, {r72}, {0x0, r96}, {}, {}, {0x0, r80}, {r78, r136}, {r41}, {0x0, r80}, {}, {0x0, r85}, {r55}, {0x0, r50}, {r25, r169}, {r6}, {r62}, {r178, r12}, {r174}, {0x0, r22}, {r17, r173}, {r46}, {}, {r138, r75}, {r36, r31}, {}, {}, {r139, r99}, {0x0, r92}, {r107}, {r69}, {r180}, {}, {}, {r160}, {r172}, {}, {0x0, r111}, {r100, r7}, {0x0, r143}, {r91}, {}, {r93}, {}, {r95}, {0x0, r113}, {0x0, r133}, {r114}, {}, {r23}, {0x0, r68}, {r51}, {0x0, r90}, {0x0, r108}, {r57, r166}, {0x0, r155}, {r15, r29}, {}, {r97}, {r100, r119}, {}, {r83, r116}, {}, {0x0, r101}, {}, {r180}, {}, {}, {}, {r71}, {r154, r148}, {}, {r153, r65}, {}, {r158, r79}, {0x0, r183}, {r137, r54}, {r42}, {}, {}, {0x0, r48}, {r39}, {}, {0x0, r18}, {r137}, {r164}, {r145}, {0x0, r142}, {}, {r70, r121}, {r20, r104}, {r118}, {r182}, {r112, r45}, {}, {}, {0x0, r99}, {r72}, {}, {0x0, r127}, {0x0, r81}, {r140}, {}, {r170, r84}, {r97}, {}, {r10, r38}, {r176}, {}, {r47, r105}, {0x0, r142}, {r112}, {}, {r144}, {r69}, {r57}, {0x0, r161}, {0x0, r35}, {r87}, {0x0, r53}, {}, {r117, r105}, {0x0, r76}, {r122, r149}, {r120}, {}, {}, {r8}, {}, {}, {}, {}, {}, {r150, r129}, {}, {r180, r35}, {r94, r90}, {r82}, {r72}, {r16}, {}, {r134, r44}, {0x0, r88}, {r122}, {r128}, {r98}, {}, {}, {0x0, r163}, {0x0, r27}, {r156}, {0x0, r63}, {0x0, r43}, {0x0, r59}, {0x0, r43}, {0x0, r27}, {r120, r67}, {}, {r86, r43}, {0x0, r165}, {r34}, {0x0, r73}, {r30, r147}, {}, {}, {}, {}, {0x0, r146}, {r56, r31}, {r114}, {r144, r21}, {r64}, {0x0, r141}, {}, {r135}, {}, {r132, r84}, {0x0, r163}, {0x0, r110}, {0x0, r124}, {0x0, r99}, {}, {0x0, r177}, {r16}, {r178, r152}, {}, {r62, r33}, {r162, r168}, {}, {}, {r26}, {0x0, r74}, {r56, r131}, {r77}], 0x0, "e8da0117d3c471"}) [ 915.593180][T12563] loop1: detected capacity change from 0 to 4 [ 915.599394][T12567] loop2: detected capacity change from 0 to 4096 [ 915.600045][T12600] loop3: detected capacity change from 0 to 4096 [ 915.609146][T12563] EXT4-fs (loop1): #clusters per group too big: 32768 [ 915.620701][T12597] loop4: detected capacity change from 0 to 4096 [ 915.628091][T12567] EXT4-fs (loop2): bad geometry: block count 626 exceeds size of device (512 blocks) 02:21:31 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f040200000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 915.650224][T12597] EXT4-fs (loop4): Invalid log block size: 3074 [ 915.669520][ C0] scsi_io_completion_action: 4 callbacks suppressed [ 915.669552][ C0] sd 0:0:1:0: tag#5294 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 915.686332][ C0] sd 0:0:1:0: tag#5294 CDB: opcode=0xe5 (vendor) [ 915.689731][T12600] EXT4-fs (loop3): inodes count not valid: 16715552 vs 32 02:21:31 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000300000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 915.692846][ C0] sd 0:0:1:0: tag#5294 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 915.692863][ C0] sd 0:0:1:0: tag#5294 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 915.718141][ C0] sd 0:0:1:0: tag#5294 CDB[20]: ba [ 915.722927][ C1] sd 0:0:1:0: tag#5295 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 915.733072][ C1] sd 0:0:1:0: tag#5295 CDB: opcode=0xe4 (vendor) [ 915.739506][ C1] sd 0:0:1:0: tag#5295 CDB[00]: e4 9d 02 8c 07 15 e2 0b 51 04 22 69 36 00 59 73 02:21:31 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f020400000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 915.748646][ C1] sd 0:0:1:0: tag#5295 CDB[10]: 91 8f e1 59 f8 6d 8e 03 0a cf a7 1b 16 85 31 e9 [ 915.757971][ C1] sd 0:0:1:0: tag#5295 CDB[20]: 7c 8c 98 e7 98 09 7a 3c 82 29 ad 24 d9 cb 02:21:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000060402000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000007402000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:31 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f00000000000000020d000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:31 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f060400000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:31 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f800400000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000502000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 915.849677][T12635] loop2: detected capacity change from 0 to 4096 [ 915.851822][T12639] loop1: detected capacity change from 0 to 4 [ 915.862917][T12640] loop4: detected capacity change from 0 to 4096 [ 915.878788][T12639] EXT4-fs (loop1): #clusters per group too big: 32768 [ 915.878974][T12640] EXT4-fs (loop4): Invalid log block size: 3330 02:21:31 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20feff000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:31 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000500000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 915.925323][T12635] EXT4-fs (loop2): bad geometry: block count 628 exceeds size of device (512 blocks) [ 915.957665][T12659] loop3: detected capacity change from 0 to 4096 [ 915.960845][T12660] loop1: detected capacity change from 0 to 4 [ 915.978357][T12660] EXT4-fs (loop1): #clusters per group too big: 32768 [ 915.988382][T12659] EXT4-fs (loop3): inodes count not valid: 16776736 vs 32 [ 916.004611][T12635] loop2: detected capacity change from 0 to 4096 [ 916.012106][T12660] loop1: detected capacity change from 0 to 4 [ 916.018502][T12635] EXT4-fs (loop2): bad geometry: block count 628 exceeds size of device (512 blocks) [ 916.029130][T12660] EXT4-fs (loop1): #clusters per group too big: 32768 02:21:31 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x97, 0x0, 0x7, 0x0, 0x0, 0x28300, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x418, 0x0, @perf_config_ext={0x4118, 0x100}, 0x800, 0x7, 0x0, 0x8, 0x0, 0xed7, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x3b, 0x5, 0x0, 0x0, 0xcc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xcb8, 0x80}, 0x480, 0xffffffffffffffe0, 0x0, 0x0, 0x20, 0x0, 0x173, 0x0, 0x4bf, 0x0, 0xe408}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000f00)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000004c0)={0x53, 0xffffffffffffffff, 0x2e, 0x6, @scatter={0x2, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000d40)=""/136, 0x88}, {&(0x7f0000000e00)=""/208, 0xd0}]}, &(0x7f00000001c0)="e49d028c0715e20b5104226936005973918fe159f86d8e030acfa71b168531e97c8c98e798097a3c8229ad24d9cb", &(0x7f0000000540)=""/101, 0x15, 0x10000, 0x2, &(0x7f0000000340)}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x10\'\\@$&\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055300)={0x8f7, [{0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r5}, {}, {}, {r3}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {r3}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, r4}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x0, "0d4abfd4b32220"}) r184 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000840)={0x0, 0xfaef, 0xffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r184, 0x0) r185 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r185, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r185, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0xfffffffffffffeff, 0x1) sendto$inet(r185, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b300)={0xffff, [{r71, r60}, {}, {r109}, {r160}, {}, {r171}, {}, {}, {r102}, {}, {r134}, {}, {0x0, r52}, {0x0, r40}, {0x0, r181}, {r126, r14}, {r159, r32}, {r176, r58}, {}, {r13, r175}, {0x0, r179}, {r11}, {r19, r24}, {r28}, {r128}, {0x0, r33}, {}, {}, {}, {r103, r49}, {}, {}, {r47}, {r115, r157}, {0x0, r9}, {r56}, {0x0, r38}, {0x0, r37}, {}, {}, {0x0, r173}, {}, {r103, r32}, {r125}, {r106, r142}, {0x0, r123}, {}, {}, {0x0, r61}, {}, {}, {0x0, r116}, {r115}, {}, {r88, r98}, {}, {}, {}, {r167}, {r34}, {r130, r151}, {}, {}, {r71}, {0x0, r95}, {}, {}, {0x0, r79}, {r77, r136}, {r41}, {0x0, r79}, {}, {0x0, r84}, {r55}, {0x0, r50}, {r25, r169}, {r6}, {r62}, {r178, r12}, {r174}, {0x0, r22}, {r17, r173}, {r46}, {}, {r138, r74}, {r36, r31}, {}, {}, {r139, r99}, {0x0, r91}, {r107}, {r68}, {r180}, {}, {}, {r160}, {r172}, {}, {0x0, r111}, {r100, r7}, {0x0, r143}, {r90}, {}, {r92}, {}, {r94}, {0x0, r113}, {0x0, r133}, {r114}, {}, {r23}, {0x0, r67}, {r51}, {0x0, r89}, {0x0, r108}, {r57, r166}, {0x0, r155}, {r15, r29}, {}, {r96}, {r100, r119}, {}, {r82, r116}, {}, {0x0, r101}, {}, {r180}, {}, {}, {}, {r70}, {r154, r148}, {}, {r153, r65}, {}, {r158, r78}, {0x0, r183}, {r137, r54}, {r42}, {}, {}, {0x0, r48}, {r39}, {}, {0x0, r18}, {r137}, {r164}, {r145}, {0x0, r142}, {}, {r69, r121}, {r20, r104}, {r118}, {r182}, {r112, r45}, {}, {}, {0x0, r99}, {r71}, {}, {0x0, r127}, {0x0, r80}, {r140}, {}, {r170, r83}, {r96}, {}, {r10, r38}, {r176}, {}, {r47, r105}, {0x0, r142}, {r112}, {}, {r144}, {r68}, {r57}, {0x0, r161}, {0x0, r35}, {r86}, {0x0, r53}, {}, {r117, r105}, {0x0, r75}, {r122, r149}, {r120}, {}, {}, {r8}, {}, {}, {}, {}, {}, {r150, r129}, {}, {r180, r35}, {r93, r89}, {r81}, {r71}, {r16}, {}, {r134, r44}, {0x0, r87}, {r122}, {r128}, {r97}, {}, {}, {0x0, r163}, {0x0, r27}, {r156}, {0x0, r63}, {0x0, r43}, {0x0, r59}, {0x0, r43}, {0x0, r27}, {r120, r66}, {}, {r85, r43}, {0x0, r165}, {r34}, {0x0, r72}, {r30, r147}, {}, {}, {}, {}, {0x0, r146}, {r56, r31}, {r114}, {r144, r21}, {r64}, {0x0, r141}, {}, {r135}, {}, {r132, r83}, {0x0, r163}, {0x0, r110}, {0x0, r124}, {0x0, r99}, {}, {0x0, r177}, {r16}, {r178, r152}, {}, {r62, r33}, {r162, r168}, {}, {}, {r26}, {0x0, r73}, {r56, r131}, {r76}], 0x0, "e8da0117d3c471"}) 02:21:31 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f00000000000000020e000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:31 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f2a0500000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000007a02000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:31 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000020002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000602000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 916.510364][T12702] loop1: detected capacity change from 0 to 4 [ 916.516687][T12700] loop2: detected capacity change from 0 to 4096 [ 916.527572][T12701] loop4: detected capacity change from 0 to 4096 [ 916.528434][T12702] EXT4-fs (loop1): #clusters per group too big: 32768 [ 916.534602][T12703] loop3: detected capacity change from 0 to 4096 [ 916.549994][ C1] sd 0:0:1:0: tag#5296 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s 02:21:32 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000600000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 916.550092][T12701] EXT4-fs (loop4): Invalid log block size: 3586 [ 916.559846][ C1] sd 0:0:1:0: tag#5296 CDB: opcode=0xe5 (vendor) [ 916.559862][ C1] sd 0:0:1:0: tag#5296 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 916.559879][ C1] sd 0:0:1:0: tag#5296 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 916.559910][ C1] sd 0:0:1:0: tag#5296 CDB[20]: ba [ 916.590993][T12703] EXT4-fs (loop3): inodes count not valid: 33554464 vs 32 02:21:32 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f040600000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 916.604803][T12700] EXT4-fs (loop2): bad geometry: block count 634 exceeds size of device (512 blocks) [ 916.619098][ C0] sd 0:0:1:0: tag#5297 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 916.629004][ C0] sd 0:0:1:0: tag#5297 CDB: opcode=0xe4 (vendor) [ 916.635366][ C0] sd 0:0:1:0: tag#5297 CDB[00]: e4 9d 02 8c 07 15 e2 0b 51 04 22 69 36 00 59 73 [ 916.637013][T12702] loop1: detected capacity change from 0 to 4 [ 916.644419][ C0] sd 0:0:1:0: tag#5297 CDB[10]: 91 8f e1 59 f8 6d 8e 03 0a cf a7 1b 16 85 31 e9 02:21:32 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f00000000000000020f000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:32 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000700000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 916.659591][ C0] sd 0:0:1:0: tag#5297 CDB[20]: 7c 8c 98 e7 98 09 7a 3c 82 29 ad 24 d9 cb [ 916.661176][T12702] EXT4-fs (loop1): #clusters per group too big: 32768 [ 916.693845][T12700] loop2: detected capacity change from 0 to 4096 02:21:32 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20ffff030002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 916.720757][T12700] EXT4-fs (loop2): bad geometry: block count 634 exceeds size of device (512 blocks) [ 916.730169][T12739] loop4: detected capacity change from 0 to 4096 02:21:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000040602000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 916.766386][T12739] EXT4-fs (loop4): Invalid log block size: 3842 [ 916.773019][T12748] loop3: detected capacity change from 0 to 4096 [ 916.801849][T12748] EXT4-fs (loop3): inodes count not valid: 67108640 vs 32 [ 916.838923][T12756] loop1: detected capacity change from 0 to 4 [ 916.851588][T12756] EXT4-fs (loop1): #clusters per group too big: 32768 [ 916.884637][T12756] loop1: detected capacity change from 0 to 4 [ 916.891267][T12756] EXT4-fs (loop1): #clusters per group too big: 32768 02:21:32 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x97, 0x0, 0x7, 0x0, 0x0, 0x28300, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x418, 0x0, @perf_config_ext={0x4118, 0x100}, 0x800, 0x7, 0x0, 0x8, 0x0, 0xed7, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x3b, 0x5, 0x0, 0x0, 0xcc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xcb8, 0x80}, 0x480, 0xffffffffffffffe0, 0x0, 0x0, 0x20, 0x0, 0x173, 0x0, 0x4bf, 0x0, 0xe408}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000f00)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000004c0)={0x53, 0xffffffffffffffff, 0x2e, 0x6, @scatter={0x2, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000d40)=""/136, 0x88}, {&(0x7f0000000e00)=""/208, 0xd0}]}, &(0x7f00000001c0)="e49d028c0715e20b5104226936005973918fe159f86d8e030acfa71b168531e97c8c98e798097a3c8229ad24d9cb", &(0x7f0000000540)=""/101, 0x15, 0x10000, 0x2, &(0x7f0000000340)}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x10\'\\@$&\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055300)={0x8f7, [{0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r5}, {}, {}, {r3}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {r3}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, r4}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x0, "0d4abfd4b32220"}) r184 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000840)={0x0, 0xfaef, 0xffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r184, 0x0) r185 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r185, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r185, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0xfffffffffffffeff, 0x1) sendto$inet(r185, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b300)={0xffff, [{r71, r60}, {}, {r109}, {r160}, {}, {r171}, {}, {}, {r102}, {}, {r134}, {}, {0x0, r52}, {0x0, r40}, {0x0, r181}, {r126, r14}, {r159, r32}, {r176, r58}, {}, {r13, r175}, {0x0, r179}, {r11}, {r19, r24}, {r28}, {r128}, {0x0, r33}, {}, {}, {}, {r103, r49}, {}, {}, {r47}, {r115, r157}, {0x0, r9}, {r56}, {0x0, r38}, {0x0, r37}, {}, {}, {0x0, r173}, {}, {r103, r32}, {r125}, {r106, r142}, {0x0, r123}, {}, {}, {0x0, r61}, {}, {}, {0x0, r116}, {r115}, {}, {r88, r98}, {}, {}, {}, {r167}, {r34}, {r130, r151}, {}, {}, {r71}, {0x0, r95}, {}, {}, {0x0, r79}, {r77, r136}, {r41}, {0x0, r79}, {}, {0x0, r84}, {r55}, {0x0, r50}, {r25, r169}, {r6}, {r62}, {r178, r12}, {r174}, {0x0, r22}, {r17, r173}, {r46}, {}, {r138, r74}, {r36, r31}, {}, {}, {r139, r99}, {0x0, r91}, {r107}, {r68}, {r180}, {}, {}, {r160}, {r172}, {}, {0x0, r111}, {r100, r7}, {0x0, r143}, {r90}, {}, {r92}, {}, {r94}, {0x0, r113}, {0x0, r133}, {r114}, {}, {r23}, {0x0, r67}, {r51}, {0x0, r89}, {0x0, r108}, {r57, r166}, {0x0, r155}, {r15, r29}, {}, {r96}, {r100, r119}, {}, {r82, r116}, {}, {0x0, r101}, {}, {r180}, {}, {}, {}, {r70}, {r154, r148}, {}, {r153, r65}, {}, {r158, r78}, {0x0, r183}, {r137, r54}, {r42}, {}, {}, {0x0, r48}, {r39}, {}, {0x0, r18}, {r137}, {r164}, {r145}, {0x0, r142}, {}, {r69, r121}, {r20, r104}, {r118}, {r182}, {r112, r45}, {}, {}, {0x0, r99}, {r71}, {}, {0x0, r127}, {0x0, r80}, {r140}, {}, {r170, r83}, {r96}, {}, {r10, r38}, {r176}, {}, {r47, r105}, {0x0, r142}, {r112}, {}, {r144}, {r68}, {r57}, {0x0, r161}, {0x0, r35}, {r86}, {0x0, r53}, {}, {r117, r105}, {0x0, r75}, {r122, r149}, {r120}, {}, {}, {r8}, {}, {}, {}, {}, {}, {r150, r129}, {}, {r180, r35}, {r93, r89}, {r81}, {r71}, {r16}, {}, {r134, r44}, {0x0, r87}, {r122}, {r128}, {r97}, {}, {}, {0x0, r163}, {0x0, r27}, {r156}, {0x0, r63}, {0x0, r43}, {0x0, r59}, {0x0, r43}, {0x0, r27}, {r120, r66}, {}, {r85, r43}, {0x0, r165}, {r34}, {0x0, r72}, {r30, r147}, {}, {}, {}, {}, {0x0, r146}, {r56, r31}, {r114}, {r144, r21}, {r64}, {0x0, r141}, {}, {r135}, {}, {r132, r83}, {0x0, r163}, {0x0, r110}, {0x0, r124}, {0x0, r99}, {}, {0x0, r177}, {r16}, {r178, r152}, {}, {r62, r33}, {r162, r168}, {}, {}, {r26}, {0x0, r73}, {r56, r131}, {r76}], 0x0, "e8da0117d3c471"}) 02:21:32 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f001800000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:32 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000210000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000007e02000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:32 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000040002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000702000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 917.376869][T12773] loop2: detected capacity change from 0 to 4096 [ 917.400810][T12782] loop1: detected capacity change from 0 to 4 [ 917.409656][T12783] loop3: detected capacity change from 0 to 4096 [ 917.419406][T12786] loop4: detected capacity change from 0 to 4096 [ 917.419523][ C1] sd 0:0:1:0: tag#5298 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 917.435702][ C1] sd 0:0:1:0: tag#5298 CDB: opcode=0xe5 (vendor) [ 917.442028][ C1] sd 0:0:1:0: tag#5298 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 917.442252][T12773] EXT4-fs (loop2): bad geometry: block count 638 exceeds size of device (512 blocks) [ 917.451074][ C1] sd 0:0:1:0: tag#5298 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 917.469760][ C1] sd 0:0:1:0: tag#5298 CDB[20]: ba 02:21:32 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f001c00000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 917.484275][ C1] sd 0:0:1:0: tag#5299 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 917.494169][ C1] sd 0:0:1:0: tag#5299 CDB: opcode=0xe4 (vendor) [ 917.495810][T12786] EXT4-fs (loop4): Invalid log block size: 4098 [ 917.500505][ C1] sd 0:0:1:0: tag#5299 CDB[00]: e4 9d 02 8c 07 15 e2 0b 51 04 22 69 36 00 59 73 [ 917.500527][ C1] sd 0:0:1:0: tag#5299 CDB[10]: 91 8f e1 59 f8 6d 8e 03 0a cf a7 1b 16 85 31 e9 [ 917.524956][ C1] sd 0:0:1:0: tag#5299 CDB[20]: 7c 8c 98 e7 98 09 7a 3c 82 29 ad 24 d9 cb 02:21:32 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f002000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 917.534415][T12782] EXT4-fs (loop1): #clusters per group too big: 32768 [ 917.544668][T12783] EXT4-fs (loop3): inodes count not valid: 67108896 vs 32 [ 917.561625][T12773] loop2: detected capacity change from 0 to 4096 [ 917.574258][T12786] loop4: detected capacity change from 0 to 4096 02:21:33 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000080002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:33 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f002600000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 917.586392][T12782] loop1: detected capacity change from 0 to 4 [ 917.592719][T12773] EXT4-fs (loop2): bad geometry: block count 638 exceeds size of device (512 blocks) [ 917.602583][T12782] EXT4-fs (loop1): #clusters per group too big: 32768 02:21:33 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000211000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:33 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f052a00000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 917.626838][T12819] loop3: detected capacity change from 0 to 4096 [ 917.635789][T12819] EXT4-fs (loop3): inodes count not valid: 134217760 vs 32 [ 917.713815][T12835] loop4: detected capacity change from 0 to 4096 [ 917.724035][T12835] EXT4-fs (loop4): Invalid log block size: 4354 02:21:33 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x97, 0x0, 0x7, 0x0, 0x0, 0x28300, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x418, 0x0, @perf_config_ext={0x4118, 0x100}, 0x800, 0x7, 0x0, 0x8, 0x0, 0xed7, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x3b, 0x5, 0x0, 0x0, 0xcc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xcb8, 0x80}, 0x480, 0xffffffffffffffe0, 0x0, 0x0, 0x20, 0x0, 0x173, 0x0, 0x4bf, 0x0, 0xe408}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000f00)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000004c0)={0x53, 0xffffffffffffffff, 0x2e, 0x6, @scatter={0x2, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000d40)=""/136, 0x88}, {&(0x7f0000000e00)=""/208, 0xd0}]}, &(0x7f00000001c0)="e49d028c0715e20b5104226936005973918fe159f86d8e030acfa71b168531e97c8c98e798097a3c8229ad24d9cb", &(0x7f0000000540)=""/101, 0x15, 0x10000, 0x2, &(0x7f0000000340)}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x10\'\\@$&\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055300)={0x8f7, [{0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r5}, {}, {}, {r3}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {r3}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, r4}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x0, "0d4abfd4b32220"}) r184 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000840)={0x0, 0xfaef, 0xffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r184, 0x0) r185 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r185, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r185, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0xfffffffffffffeff, 0x1) sendto$inet(r185, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b300)={0xffff, [{r71, r60}, {}, {r109}, {r160}, {}, {r171}, {}, {}, {r102}, {}, {r134}, {}, {0x0, r52}, {0x0, r40}, {0x0, r181}, {r126, r14}, {r159, r32}, {r176, r58}, {}, {r13, r175}, {0x0, r179}, {r11}, {r19, r24}, {r28}, {r128}, {0x0, r33}, {}, {}, {}, {r103, r49}, {}, {}, {r47}, {r115, r157}, {0x0, r9}, {r56}, {0x0, r38}, {0x0, r37}, {}, {}, {0x0, r173}, {}, {r103, r32}, {r125}, {r106, r142}, {0x0, r123}, {}, {}, {0x0, r61}, {}, {}, {0x0, r116}, {r115}, {}, {r88, r98}, {}, {}, {}, {r167}, {r34}, {r130, r151}, {}, {}, {r71}, {0x0, r95}, {}, {}, {0x0, r79}, {r77, r136}, {r41}, {0x0, r79}, {}, {0x0, r84}, {r55}, {0x0, r50}, {r25, r169}, {r6}, {r62}, {r178, r12}, {r174}, {0x0, r22}, {r17, r173}, {r46}, {}, {r138, r74}, {r36, r31}, {}, {}, {r139, r99}, {0x0, r91}, {r107}, {r68}, {r180}, {}, {}, {r160}, {r172}, {}, {0x0, r111}, {r100, r7}, {0x0, r143}, {r90}, {}, {r92}, {}, {r94}, {0x0, r113}, {0x0, r133}, {r114}, {}, {r23}, {0x0, r67}, {r51}, {0x0, r89}, {0x0, r108}, {r57, r166}, {0x0, r155}, {r15, r29}, {}, {r96}, {r100, r119}, {}, {r82, r116}, {}, {0x0, r101}, {}, {r180}, {}, {}, {}, {r70}, {r154, r148}, {}, {r153, r65}, {}, {r158, r78}, {0x0, r183}, {r137, r54}, {r42}, {}, {}, {0x0, r48}, {r39}, {}, {0x0, r18}, {r137}, {r164}, {r145}, {0x0, r142}, {}, {r69, r121}, {r20, r104}, {r118}, {r182}, {r112, r45}, {}, {}, {0x0, r99}, {r71}, {}, {0x0, r127}, {0x0, r80}, {r140}, {}, {r170, r83}, {r96}, {}, {r10, r38}, {r176}, {}, {r47, r105}, {0x0, r142}, {r112}, {}, {r144}, {r68}, {r57}, {0x0, r161}, {0x0, r35}, {r86}, {0x0, r53}, {}, {r117, r105}, {0x0, r75}, {r122, r149}, {r120}, {}, {}, {r8}, {}, {}, {}, {}, {}, {r150, r129}, {}, {r180, r35}, {r93, r89}, {r81}, {r71}, {r16}, {}, {r134, r44}, {0x0, r87}, {r122}, {r128}, {r97}, {}, {}, {0x0, r163}, {0x0, r27}, {r156}, {0x0, r63}, {0x0, r43}, {0x0, r59}, {0x0, r43}, {0x0, r27}, {r120, r66}, {}, {r85, r43}, {0x0, r165}, {r34}, {0x0, r72}, {r30, r147}, {}, {}, {}, {}, {0x0, r146}, {r56, r31}, {r114}, {r144, r21}, {r64}, {0x0, r141}, {}, {r135}, {}, {r132, r83}, {0x0, r163}, {0x0, r110}, {0x0, r124}, {0x0, r99}, {}, {0x0, r177}, {r16}, {r178, r152}, {}, {r62, r33}, {r162, r168}, {}, {}, {r26}, {0x0, r73}, {r56, r131}, {r76}], 0x0, "e8da0117d3c471"}) 02:21:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000902000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:33 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="204000080002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000018402000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:33 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f003f00000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:33 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000212000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 918.269977][T12849] loop1: detected capacity change from 0 to 4 [ 918.284008][T12849] EXT4-fs (loop1): #clusters per group too big: 32768 [ 918.286099][T12851] loop4: detected capacity change from 0 to 4096 [ 918.305230][T12858] loop3: detected capacity change from 0 to 4096 [ 918.308641][T12860] loop2: detected capacity change from 0 to 4096 02:21:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000a02000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:33 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f004000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 918.316558][ C1] sd 0:0:1:0: tag#5300 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 918.327769][ C1] sd 0:0:1:0: tag#5300 CDB: opcode=0xe5 (vendor) [ 918.334128][ C1] sd 0:0:1:0: tag#5300 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 918.343146][ C1] sd 0:0:1:0: tag#5300 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 918.352291][ C1] sd 0:0:1:0: tag#5300 CDB[20]: ba 02:21:33 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f048000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:33 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655ffffe00000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 918.369712][T12872] loop1: detected capacity change from 0 to 4 [ 918.378259][ C1] sd 0:0:1:0: tag#5301 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 918.388114][ C1] sd 0:0:1:0: tag#5301 CDB: opcode=0xe4 (vendor) [ 918.394649][ C1] sd 0:0:1:0: tag#5301 CDB[00]: e4 9d 02 8c 07 15 e2 0b 51 04 22 69 36 00 59 73 [ 918.403726][ C1] sd 0:0:1:0: tag#5301 CDB[10]: 91 8f e1 59 f8 6d 8e 03 0a cf a7 1b 16 85 31 e9 [ 918.412760][ C1] sd 0:0:1:0: tag#5301 CDB[20]: 7c 8c 98 e7 98 09 7a 3c 82 29 ad 24 d9 cb [ 918.417995][T12851] EXT4-fs (loop4): Invalid log block size: 4610 [ 918.433522][T12872] EXT4-fs (loop1): #clusters per group too big: 32768 [ 918.435212][T12858] EXT4-fs (loop3): inodes count not valid: 134234144 vs 32 [ 918.448212][T12860] EXT4-fs (loop2): bad geometry: block count 644 exceeds size of device (512 blocks) 02:21:33 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000218000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:33 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655ffeff00000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 918.472995][T12872] loop1: detected capacity change from 0 to 4 [ 918.490811][T12872] EXT4-fs (loop1): #clusters per group too big: 32768 [ 918.515848][T12888] loop4: detected capacity change from 0 to 4096 [ 918.549170][T12888] EXT4-fs (loop4): Invalid log block size: 6146 02:21:34 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x97, 0x0, 0x7, 0x0, 0x0, 0x28300, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x418, 0x0, @perf_config_ext={0x4118, 0x100}, 0x800, 0x7, 0x0, 0x8, 0x0, 0xed7, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x3b, 0x5, 0x0, 0x0, 0xcc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xcb8, 0x80}, 0x480, 0xffffffffffffffe0, 0x0, 0x0, 0x20, 0x0, 0x173, 0x0, 0x4bf, 0x0, 0xe408}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000f00)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000004c0)={0x53, 0xffffffffffffffff, 0x2e, 0x6, @scatter={0x2, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000d40)=""/136, 0x88}, {&(0x7f0000000e00)=""/208, 0xd0}]}, &(0x7f00000001c0)="e49d028c0715e20b5104226936005973918fe159f86d8e030acfa71b168531e97c8c98e798097a3c8229ad24d9cb", &(0x7f0000000540)=""/101, 0x15, 0x10000, 0x2, &(0x7f0000000340)}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x10\'\\@$&\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055300)={0x8f7, [{0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r5}, {}, {}, {r3}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {r3}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, r4}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x0, "0d4abfd4b32220"}) r185 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000840)={0x0, 0xfaef, 0xffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r185, 0x0) r186 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r186, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r186, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0xfffffffffffffeff, 0x1) sendto$inet(r186, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b300)={0xffff, [{r72, r60}, {}, {r110}, {r161}, {}, {r172}, {}, {}, {r103}, {}, {r135}, {}, {0x0, r52}, {0x0, r40}, {0x0, r182}, {r127, r14}, {r160, r32}, {r177, r58}, {}, {r13, r176}, {0x0, r180}, {r11}, {r19, r24}, {r28}, {r129}, {0x0, r33}, {}, {}, {}, {r104, r49}, {}, {}, {r47}, {r116, r158}, {0x0, r9}, {r56}, {0x0, r38}, {0x0, r37}, {}, {}, {0x0, r174}, {}, {r104, r32}, {r126}, {r107, r143}, {0x0, r124}, {}, {}, {0x0, r61}, {}, {}, {0x0, r117}, {}, {r66}, {r89, r99}, {}, {}, {}, {r168}, {r34}, {r131, r152}, {}, {}, {r72}, {0x0, r96}, {}, {}, {0x0, r80}, {r78, r137}, {r41}, {0x0, r80}, {}, {0x0, r85}, {r55}, {0x0, r50}, {r25, r170}, {r6}, {r62}, {r179, r12}, {r175}, {0x0, r22}, {r17, r174}, {r46}, {}, {r139, r75}, {r36, r31}, {}, {}, {r140, r100}, {0x0, r92}, {r108}, {r69}, {r181}, {}, {}, {r161}, {r173}, {}, {0x0, r112}, {r101, r7}, {0x0, r144}, {r91}, {}, {r93}, {}, {r95}, {0x0, r114}, {0x0, r134}, {r115}, {}, {r23}, {0x0, r68}, {r51}, {0x0, r90}, {0x0, r109}, {r57, r167}, {0x0, r156}, {r15, r29}, {}, {r97}, {r101, r120}, {}, {r83, r117}, {}, {0x0, r102}, {}, {r181}, {}, {}, {}, {r71}, {r155, r149}, {}, {r154, r65}, {}, {r159, r79}, {0x0, r184}, {r138, r54}, {r42}, {}, {}, {0x0, r48}, {r39}, {}, {0x0, r18}, {r138}, {r165}, {r146}, {0x0, r143}, {}, {r70, r122}, {r20, r105}, {r119}, {r183}, {r113, r45}, {}, {}, {0x0, r100}, {r72}, {}, {0x0, r128}, {0x0, r81}, {r141}, {}, {r171, r84}, {r97}, {}, {r10, r38}, {r177}, {}, {r47, r106}, {0x0, r143}, {r113}, {}, {r145}, {r69}, {r57}, {0x0, r162}, {0x0, r35}, {r87}, {0x0, r53}, {}, {r118, r106}, {0x0, r76}, {r123, r150}, {r121}, {}, {}, {r8}, {}, {}, {}, {}, {}, {r151, r130}, {}, {r181, r35}, {r94, r90}, {r82}, {r72}, {r16}, {}, {r135, r44}, {0x0, r88}, {r123}, {r129}, {r98}, {}, {}, {0x0, r164}, {0x0, r27}, {r157}, {0x0, r63}, {0x0, r43}, {0x0, r59}, {0x0, r43}, {0x0, r27}, {r121, r67}, {}, {r86, r43}, {0x0, r166}, {r34}, {0x0, r73}, {r30, r148}, {}, {}, {}, {}, {0x0, r147}, {r56, r31}, {r115}, {r145, r21}, {r64}, {0x0, r142}, {}, {r136}, {}, {r133, r84}, {0x0, r164}, {0x0, r111}, {0x0, r125}, {0x0, r100}, {}, {0x0, r178}, {r16}, {r179, r153}, {}, {r62, r33}, {r163, r169}, {}, {}, {r26}, {0x0, r74}, {r56, r132}, {r77}], 0x0, "e8da0117d3c471"}) 02:21:34 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000c0002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20ffffff8502000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:34 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000008000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000b02000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:34 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000219000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 919.176788][ C1] sd 0:0:1:0: tag#5302 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 919.186738][ C1] sd 0:0:1:0: tag#5302 CDB: opcode=0xe5 (vendor) [ 919.190888][T12917] loop2: detected capacity change from 0 to 4096 [ 919.193061][ C1] sd 0:0:1:0: tag#5302 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 919.206503][T12919] loop3: detected capacity change from 0 to 4096 [ 919.208434][ C1] sd 0:0:1:0: tag#5302 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d 02:21:34 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f400008000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 919.224244][ C1] sd 0:0:1:0: tag#5302 CDB[20]: ba [ 919.232126][T12928] loop4: detected capacity change from 0 to 4096 [ 919.237457][T12918] loop1: detected capacity change from 0 to 4 [ 919.254264][ C1] sd 0:0:1:0: tag#5303 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 919.264117][ C1] sd 0:0:1:0: tag#5303 CDB: opcode=0xe4 (vendor) 02:21:34 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000010000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:34 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000020000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 919.270560][ C1] sd 0:0:1:0: tag#5303 CDB[00]: e4 9d 02 8c 07 15 e2 0b 51 04 22 69 36 00 59 73 [ 919.279610][ C1] sd 0:0:1:0: tag#5303 CDB[10]: 91 8f e1 59 f8 6d 8e 03 0a cf a7 1b 16 85 31 e9 [ 919.288777][ C1] sd 0:0:1:0: tag#5303 CDB[20]: 7c 8c 98 e7 98 09 7a 3c 82 29 ad 24 d9 cb [ 919.288787][T12919] EXT4-fs (loop3): inodes count not valid: 201326624 vs 32 [ 919.304849][T12918] EXT4-fs (loop1): #clusters per group too big: 32768 [ 919.308504][T12917] EXT4-fs (loop2): bad geometry: block count 645 exceeds size of device (512 blocks) [ 919.321245][T12928] EXT4-fs (loop4): Invalid log block size: 6402 02:21:34 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000222000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:34 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000010000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 919.354059][T12917] loop2: detected capacity change from 0 to 4096 [ 919.368803][T12918] loop1: detected capacity change from 0 to 4 [ 919.378397][T12919] loop3: detected capacity change from 0 to 4096 [ 919.387480][T12917] EXT4-fs (loop2): bad geometry: block count 645 exceeds size of device (512 blocks) 02:21:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000018602000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 919.415356][T12918] EXT4-fs (loop1): #clusters per group too big: 32768 [ 919.434861][T12959] loop4: detected capacity change from 0 to 4096 [ 919.446147][T12959] EXT4-fs (loop4): Invalid log block size: 8706 [ 919.504341][T12972] loop2: detected capacity change from 0 to 4096 [ 919.517289][T12972] EXT4-fs (loop2): bad geometry: block count 646 exceeds size of device (512 blocks) 02:21:35 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x97, 0x0, 0x7, 0x0, 0x0, 0x28300, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x418, 0x0, @perf_config_ext={0x4118, 0x100}, 0x800, 0x7, 0x0, 0x8, 0x0, 0xed7, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x3b, 0x5, 0x0, 0x0, 0xcc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xcb8, 0x80}, 0x480, 0xffffffffffffffe0, 0x0, 0x0, 0x20, 0x0, 0x173, 0x0, 0x4bf, 0x0, 0xe408}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000f00)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000004c0)={0x53, 0xffffffffffffffff, 0x2e, 0x6, @scatter={0x2, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000d40)=""/136, 0x88}, {&(0x7f0000000e00)=""/208, 0xd0}]}, &(0x7f00000001c0)="e49d028c0715e20b5104226936005973918fe159f86d8e030acfa71b168531e97c8c98e798097a3c8229ad24d9cb", &(0x7f0000000540)=""/101, 0x15, 0x10000, 0x2, &(0x7f0000000340)}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x10\'\\@$&\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055300)={0x8f7, [{0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r5}, {}, {}, {r3}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {r3}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, r4}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x0, "0d4abfd4b32220"}) r185 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000840)={0x0, 0xfaef, 0xffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r185, 0x0) r186 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r186, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r186, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0xfffffffffffffeff, 0x1) sendto$inet(r186, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b300)={0xffff, [{r72, r60}, {}, {r110}, {r161}, {}, {r172}, {}, {}, {r103}, {}, {r135}, {}, {0x0, r52}, {0x0, r40}, {0x0, r182}, {r127, r14}, {r160, r32}, {r177, r58}, {}, {r13, r176}, {0x0, r180}, {r11}, {r19, r24}, {r28}, {r129}, {0x0, r33}, {}, {}, {}, {r104, r49}, {}, {}, {r47}, {r116, r158}, {0x0, r9}, {r56}, {0x0, r38}, {0x0, r37}, {}, {}, {0x0, r174}, {}, {r104, r32}, {r126}, {r107, r143}, {0x0, r124}, {}, {}, {0x0, r61}, {}, {}, {0x0, r117}, {}, {r66}, {r89, r99}, {}, {}, {}, {r168}, {r34}, {r131, r152}, {}, {}, {r72}, {0x0, r96}, {}, {}, {0x0, r80}, {r78, r137}, {r41}, {0x0, r80}, {}, {0x0, r85}, {r55}, {0x0, r50}, {r25, r170}, {r6}, {r62}, {r179, r12}, {r175}, {0x0, r22}, {r17, r174}, {r46}, {}, {r139, r75}, {r36, r31}, {}, {}, {r140, r100}, {0x0, r92}, {r108}, {r69}, {r181}, {}, {}, {r161}, {r173}, {}, {0x0, r112}, {r101, r7}, {0x0, r144}, {r91}, {}, {r93}, {}, {r95}, {0x0, r114}, {0x0, r134}, {r115}, {}, {r23}, {0x0, r68}, {r51}, {0x0, r90}, {0x0, r109}, {r57, r167}, {0x0, r156}, {r15, r29}, {}, {r97}, {r101, r120}, {}, {r83, r117}, {}, {0x0, r102}, {}, {r181}, {}, {}, {}, {r71}, {r155, r149}, {}, {r154, r65}, {}, {r159, r79}, {0x0, r184}, {r138, r54}, {r42}, {}, {}, {0x0, r48}, {r39}, {}, {0x0, r18}, {r138}, {r165}, {r146}, {0x0, r143}, {}, {r70, r122}, {r20, r105}, {r119}, {r183}, {r113, r45}, {}, {}, {0x0, r100}, {r72}, {}, {0x0, r128}, {0x0, r81}, {r141}, {}, {r171, r84}, {r97}, {}, {r10, r38}, {r177}, {}, {r47, r106}, {0x0, r143}, {r113}, {}, {r145}, {r69}, {r57}, {0x0, r162}, {0x0, r35}, {r87}, {0x0, r53}, {}, {r118, r106}, {0x0, r76}, {r123, r150}, {r121}, {}, {}, {r8}, {}, {}, {}, {}, {}, {r151, r130}, {}, {r181, r35}, {r94, r90}, {r82}, {r72}, {r16}, {}, {r135, r44}, {0x0, r88}, {r123}, {r129}, {r98}, {}, {}, {0x0, r164}, {0x0, r27}, {r157}, {0x0, r63}, {0x0, r43}, {0x0, r59}, {0x0, r43}, {0x0, r27}, {r121, r67}, {}, {r86, r43}, {0x0, r166}, {r34}, {0x0, r73}, {r30, r148}, {}, {}, {}, {}, {0x0, r147}, {r56, r31}, {r115}, {r145, r21}, {r64}, {0x0, r142}, {}, {r136}, {}, {r133, r84}, {0x0, r164}, {0x0, r111}, {0x0, r125}, {0x0, r100}, {}, {0x0, r178}, {r16}, {r179, r153}, {}, {r62, r33}, {r163, r169}, {}, {}, {r26}, {0x0, r74}, {r56, r132}, {r77}], 0x0, "e8da0117d3c471"}) 02:21:35 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000020000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000c02000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:35 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000100002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:35 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000225000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000018902000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:35 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000004020000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 920.045084][T12989] loop4: detected capacity change from 0 to 4096 [ 920.067629][T12996] loop1: detected capacity change from 0 to 4 [ 920.073913][T12989] EXT4-fs (loop4): Invalid log block size: 9474 [ 920.076698][T12994] loop2: detected capacity change from 0 to 4096 [ 920.081056][T12995] loop3: detected capacity change from 0 to 4096 02:21:35 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f00000000000000022e000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 920.118335][T12996] EXT4-fs (loop1): #clusters per group too big: 32768 [ 920.136908][T12994] EXT4-fs (loop2): bad geometry: block count 649 exceeds size of device (512 blocks) [ 920.151090][T12995] EXT4-fs (loop3): inodes count not valid: 268435488 vs 32 02:21:35 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x97, 0x0, 0x7, 0x0, 0x0, 0x28300, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x418, 0x0, @perf_config_ext={0x4118, 0x100}, 0x800, 0x7, 0x0, 0x8, 0x0, 0xed7, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x3b, 0x5, 0x0, 0x0, 0xcc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xcb8, 0x80}, 0x480, 0xffffffffffffffe0, 0x0, 0x0, 0x20, 0x0, 0x173, 0x0, 0x4bf, 0x0, 0xe408}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000f00)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000004c0)={0x53, 0xffffffffffffffff, 0x2e, 0x6, @scatter={0x2, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000d40)=""/136, 0x88}, {&(0x7f0000000e00)=""/208, 0xd0}]}, &(0x7f00000001c0)="e49d028c0715e20b5104226936005973918fe159f86d8e030acfa71b168531e97c8c98e798097a3c8229ad24d9cb", &(0x7f0000000540)=""/101, 0x15, 0x10000, 0x2, &(0x7f0000000340)}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x10\'\\@$&\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055300)={0x8f7, [{0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r5}, {}, {}, {r3}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {r3}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, r4}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x0, "0d4abfd4b32220"}) r185 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000840)={0x0, 0xfaef, 0xffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r185, 0x0) r186 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r186, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r186, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0xfffffffffffffeff, 0x1) sendto$inet(r186, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b300)={0xffff, [{r72, r60}, {}, {r110}, {r161}, {}, {r172}, {}, {}, {r103}, {}, {r135}, {}, {0x0, r52}, {0x0, r40}, {0x0, r182}, {r127, r14}, {r160, r32}, {r177, r58}, {}, {r13, r176}, {0x0, r180}, {r11}, {r19, r24}, {r28}, {r129}, {0x0, r33}, {}, {}, {}, {r104, r49}, {}, {}, {r47}, {r116, r158}, {0x0, r9}, {r56}, {0x0, r38}, {0x0, r37}, {}, {}, {0x0, r174}, {}, {r104, r32}, {r126}, {r107, r143}, {0x0, r124}, {}, {}, {0x0, r61}, {}, {}, {0x0, r117}, {}, {r66}, {r89, r99}, {}, {}, {}, {r168}, {r34}, {r131, r152}, {}, {}, {r72}, {0x0, r96}, {}, {}, {0x0, r80}, {r78, r137}, {r41}, {0x0, r80}, {}, {0x0, r85}, {r55}, {0x0, r50}, {r25, r170}, {r6}, {r62}, {r179, r12}, {r175}, {0x0, r22}, {r17, r174}, {r46}, {}, {r139, r75}, {r36, r31}, {}, {}, {r140, r100}, {0x0, r92}, {r108}, {r69}, {r181}, {}, {}, {r161}, {r173}, {}, {0x0, r112}, {r101, r7}, {0x0, r144}, {r91}, {}, {r93}, {}, {r95}, {0x0, r114}, {0x0, r134}, {r115}, {}, {r23}, {0x0, r68}, {r51}, {0x0, r90}, {0x0, r109}, {r57, r167}, {0x0, r156}, {r15, r29}, {}, {r97}, {r101, r120}, {}, {r83, r117}, {}, {0x0, r102}, {}, {r181}, {}, {}, {}, {r71}, {r155, r149}, {}, {r154, r65}, {}, {r159, r79}, {0x0, r184}, {r138, r54}, {r42}, {}, {}, {0x0, r48}, {r39}, {}, {0x0, r18}, {r138}, {r165}, {r146}, {0x0, r143}, {}, {r70, r122}, {r20, r105}, {r119}, {r183}, {r113, r45}, {}, {}, {0x0, r100}, {r72}, {}, {0x0, r128}, {0x0, r81}, {r141}, {}, {r171, r84}, {r97}, {}, {r10, r38}, {r177}, {}, {r47, r106}, {0x0, r143}, {r113}, {}, {r145}, {r69}, {r57}, {0x0, r162}, {0x0, r35}, {r87}, {0x0, r53}, {}, {r118, r106}, {0x0, r76}, {r123, r150}, {r121}, {}, {}, {r8}, {}, {}, {}, {}, {}, {r151, r130}, {}, {r181, r35}, {r94, r90}, {r82}, {r72}, {r16}, {}, {r135, r44}, {0x0, r88}, {r123}, {r129}, {r98}, {}, {}, {0x0, r164}, {0x0, r27}, {r157}, {0x0, r63}, {0x0, r43}, {0x0, r59}, {0x0, r43}, {0x0, r27}, {r121, r67}, {}, {r86, r43}, {0x0, r166}, {r34}, {0x0, r73}, {r30, r148}, {}, {}, {}, {}, {0x0, r147}, {r56, r31}, {r115}, {r145, r21}, {r64}, {0x0, r142}, {}, {r136}, {}, {r133, r84}, {0x0, r164}, {0x0, r111}, {0x0, r125}, {0x0, r100}, {}, {0x0, r178}, {r16}, {r179, r153}, {}, {r62, r33}, {r163, r169}, {}, {}, {r26}, {0x0, r74}, {r56, r132}, {r77}], 0x0, "e8da0117d3c471"}) 02:21:35 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000030000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 920.175657][T12996] loop1: detected capacity change from 0 to 4 [ 920.181939][T13018] loop4: detected capacity change from 0 to 4096 [ 920.198071][T12996] EXT4-fs (loop1): #clusters per group too big: 32768 [ 920.205959][T13018] EXT4-fs (loop4): Invalid log block size: 11778 02:21:35 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000040000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:35 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000180002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 920.224937][T12994] loop2: detected capacity change from 0 to 4096 [ 920.234855][T12994] EXT4-fs (loop2): bad geometry: block count 649 exceeds size of device (512 blocks) 02:21:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000d02000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:35 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000232000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20ffffff8c02000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:35 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000050000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 920.314047][T13049] loop3: detected capacity change from 0 to 4096 02:21:35 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000060000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 920.366607][T13049] EXT4-fs (loop3): inodes count not valid: 402653216 vs 32 [ 920.374534][T13057] loop1: detected capacity change from 0 to 4 [ 920.377615][T13061] loop2: detected capacity change from 0 to 4096 [ 920.384923][T13060] loop4: detected capacity change from 0 to 4096 [ 920.403515][T13061] EXT4-fs (loop2): bad geometry: block count 652 exceeds size of device (512 blocks) 02:21:35 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000102000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:35 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000004060000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 920.426734][T13057] EXT4-fs (loop1): #clusters per group too big: 32768 [ 920.438842][T13060] EXT4-fs (loop4): Invalid log block size: 12802 02:21:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000018d02000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 920.486895][T13057] loop1: detected capacity change from 0 to 4 [ 920.502507][T13057] EXT4-fs (loop1): #clusters per group too big: 32768 [ 920.514281][T13084] loop3: detected capacity change from 0 to 4096 [ 920.521120][T13088] loop2: detected capacity change from 0 to 4096 [ 920.537927][T13088] EXT4-fs (loop2): bad geometry: block count 653 exceeds size of device (512 blocks) [ 920.552027][T13084] EXT4-fs (loop3): bad geometry: block count 513 exceeds size of device (512 blocks) [ 920.578208][T13088] loop2: detected capacity change from 0 to 4096 [ 920.585218][T13088] EXT4-fs (loop2): bad geometry: block count 653 exceeds size of device (512 blocks) 02:21:36 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000248000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000e02000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:36 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000070000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:36 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000202000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:36 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x97, 0x0, 0x7, 0x0, 0x0, 0x28300, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x418, 0x0, @perf_config_ext={0x4118, 0x100}, 0x800, 0x7, 0x0, 0x8, 0x0, 0xed7, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x3b, 0x5, 0x0, 0x0, 0xcc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xcb8, 0x80}, 0x480, 0xffffffffffffffe0, 0x0, 0x0, 0x20, 0x0, 0x173, 0x0, 0x4bf, 0x0, 0xe408}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000f00)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000004c0)={0x53, 0xffffffffffffffff, 0x2e, 0x6, @scatter={0x2, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000d40)=""/136, 0x88}, {&(0x7f0000000e00)=""/208, 0xd0}]}, &(0x7f00000001c0)="e49d028c0715e20b5104226936005973918fe159f86d8e030acfa71b168531e97c8c98e798097a3c8229ad24d9cb", &(0x7f0000000540)=""/101, 0x15, 0x10000, 0x2, &(0x7f0000000340)}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x10\'\\@$&\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055300)={0x8f7, [{0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r5}, {}, {}, {r3}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {r3}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, r4}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x0, "0d4abfd4b32220"}) r185 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000840)={0x0, 0xfaef, 0xffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r185, 0x0) r186 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r186, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r186, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0xfffffffffffffeff, 0x1) sendto$inet(r186, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b300)={0xffff, [{r72, r60}, {}, {r110}, {r161}, {}, {r172}, {}, {}, {r103}, {}, {r135}, {}, {0x0, r52}, {0x0, r40}, {0x0, r182}, {r127, r14}, {r160, r32}, {r177, r58}, {}, {r13, r176}, {0x0, r180}, {r11}, {r19, r24}, {r28}, {r129}, {0x0, r33}, {}, {}, {}, {r104, r49}, {}, {}, {r47}, {r116, r158}, {0x0, r9}, {r56}, {0x0, r38}, {0x0, r37}, {}, {}, {0x0, r174}, {}, {r104, r32}, {r126}, {r107, r143}, {0x0, r124}, {}, {}, {0x0, r61}, {}, {}, {}, {r116}, {r66}, {r89, r99}, {}, {}, {}, {r168}, {r34}, {r131, r152}, {}, {}, {r72}, {0x0, r96}, {}, {}, {0x0, r80}, {r78, r137}, {r41}, {0x0, r80}, {}, {0x0, r85}, {r55}, {0x0, r50}, {r25, r170}, {r6}, {r62}, {r179, r12}, {r175}, {0x0, r22}, {r17, r174}, {r46}, {}, {r139, r75}, {r36, r31}, {}, {}, {r140, r100}, {0x0, r92}, {r108}, {r69}, {r181}, {}, {}, {r161}, {r173}, {}, {0x0, r112}, {r101, r7}, {0x0, r144}, {r91}, {}, {r93}, {}, {r95}, {0x0, r114}, {0x0, r134}, {r115}, {}, {r23}, {0x0, r68}, {r51}, {0x0, r90}, {0x0, r109}, {r57, r167}, {0x0, r156}, {r15, r29}, {}, {r97}, {r101, r120}, {}, {r83, r117}, {}, {0x0, r102}, {}, {r181}, {}, {}, {}, {r71}, {r155, r149}, {}, {r154, r65}, {}, {r159, r79}, {0x0, r184}, {r138, r54}, {r42}, {}, {}, {0x0, r48}, {r39}, {}, {0x0, r18}, {r138}, {r165}, {r146}, {0x0, r143}, {}, {r70, r122}, {r20, r105}, {r119}, {r183}, {r113, r45}, {}, {}, {0x0, r100}, {r72}, {}, {0x0, r128}, {0x0, r81}, {r141}, {}, {r171, r84}, {r97}, {}, {r10, r38}, {r177}, {}, {r47, r106}, {0x0, r143}, {r113}, {}, {r145}, {r69}, {r57}, {0x0, r162}, {0x0, r35}, {r87}, {0x0, r53}, {}, {r118, r106}, {0x0, r76}, {r123, r150}, {r121}, {}, {}, {r8}, {}, {}, {}, {}, {}, {r151, r130}, {}, {r181, r35}, {r94, r90}, {r82}, {r72}, {r16}, {}, {r135, r44}, {0x0, r88}, {r123}, {r129}, {r98}, {}, {}, {0x0, r164}, {0x0, r27}, {r157}, {0x0, r63}, {0x0, r43}, {0x0, r59}, {0x0, r43}, {0x0, r27}, {r121, r67}, {}, {r86, r43}, {0x0, r166}, {r34}, {0x0, r73}, {r30, r148}, {}, {}, {}, {}, {0x0, r147}, {r56, r31}, {r115}, {r145, r21}, {r64}, {0x0, r142}, {}, {r136}, {}, {r133, r84}, {0x0, r164}, {0x0, r111}, {0x0, r125}, {0x0, r100}, {}, {0x0, r178}, {r16}, {r179, r153}, {}, {r62, r33}, {r163, r169}, {}, {}, {r26}, {0x0, r74}, {r56, r132}, {r77}], 0x0, "e8da0117d3c471"}) 02:21:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20ffffff9702000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 921.094941][T13110] loop4: detected capacity change from 0 to 4096 [ 921.101724][T13111] loop1: detected capacity change from 0 to 4 [ 921.126049][T13110] EXT4-fs (loop4): Invalid log block size: 18434 02:21:36 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000080000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 921.138867][T13111] EXT4-fs (loop1): #clusters per group too big: 32768 [ 921.160452][T13121] loop3: detected capacity change from 0 to 4096 [ 921.174167][T13121] EXT4-fs (loop3): bad geometry: block count 514 exceeds size of device (512 blocks) [ 921.177077][T13122] loop2: detected capacity change from 0 to 4096 02:21:36 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f00000000000000024c000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 921.203888][T13111] loop1: detected capacity change from 0 to 4 [ 921.221902][T13111] EXT4-fs (loop1): #clusters per group too big: 32768 [ 921.223210][ C1] scsi_io_completion_action: 4 callbacks suppressed [ 921.223233][ C1] sd 0:0:1:0: tag#5309 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 921.245372][ C1] sd 0:0:1:0: tag#5309 CDB: opcode=0xe5 (vendor) 02:21:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000f02000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 921.251712][ C1] sd 0:0:1:0: tag#5309 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 921.259497][T13145] loop4: detected capacity change from 0 to 4096 [ 921.260790][ C1] sd 0:0:1:0: tag#5309 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 921.260806][ C1] sd 0:0:1:0: tag#5309 CDB[20]: ba [ 921.269403][ C1] sd 0:0:1:0: tag#5310 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 921.291289][ C1] sd 0:0:1:0: tag#5310 CDB: opcode=0xe4 (vendor) 02:21:36 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000180000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:36 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000001c0000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:36 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000260000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 921.297650][ C1] sd 0:0:1:0: tag#5310 CDB[00]: e4 9d 02 8c 07 15 e2 0b 51 04 22 69 36 00 59 73 [ 921.306786][ C1] sd 0:0:1:0: tag#5310 CDB[10]: 91 8f e1 59 f8 6d 8e 03 0a cf a7 1b 16 85 31 e9 [ 921.315832][ C1] sd 0:0:1:0: tag#5310 CDB[20]: 7c 8c 98 e7 98 09 7a 3c 82 29 ad 24 d9 cb [ 921.323892][T13122] EXT4-fs (loop2): bad geometry: block count 663 exceeds size of device (512 blocks) [ 921.334639][T13145] EXT4-fs (loop4): Invalid log block size: 19458 02:21:36 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000040202000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000b102000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000201002000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:36 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000260000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 921.424935][T13168] loop4: detected capacity change from 0 to 4096 [ 921.434195][T13171] loop2: detected capacity change from 0 to 4096 [ 921.444286][T13172] loop3: detected capacity change from 0 to 4096 [ 921.453545][T13168] EXT4-fs (loop4): Invalid log block size: 24578 [ 921.466815][T13177] loop1: detected capacity change from 0 to 4 [ 921.473284][T13172] EXT4-fs (loop3): bad geometry: block count 514 exceeds size of device (512 blocks) [ 921.512701][T13171] EXT4-fs (loop2): bad geometry: block count 689 exceeds size of device (512 blocks) [ 921.528163][T13177] EXT4-fs (loop1): #clusters per group too big: 32768 [ 921.544613][T13171] loop2: detected capacity change from 0 to 4096 [ 921.551253][T13177] loop1: detected capacity change from 0 to 4 [ 921.559295][T13171] EXT4-fs (loop2): bad geometry: block count 689 exceeds size of device (512 blocks) [ 921.567027][T13177] EXT4-fs (loop1): #clusters per group too big: 32768 02:21:37 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x97, 0x0, 0x7, 0x0, 0x0, 0x28300, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x418, 0x0, @perf_config_ext={0x4118, 0x100}, 0x800, 0x7, 0x0, 0x8, 0x0, 0xed7, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x3b, 0x5, 0x0, 0x0, 0xcc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xcb8, 0x80}, 0x480, 0xffffffffffffffe0, 0x0, 0x0, 0x20, 0x0, 0x173, 0x0, 0x4bf, 0x0, 0xe408}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000f00)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000004c0)={0x53, 0xffffffffffffffff, 0x2e, 0x6, @scatter={0x2, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000d40)=""/136, 0x88}, {&(0x7f0000000e00)=""/208, 0xd0}]}, &(0x7f00000001c0)="e49d028c0715e20b5104226936005973918fe159f86d8e030acfa71b168531e97c8c98e798097a3c8229ad24d9cb", &(0x7f0000000540)=""/101, 0x15, 0x10000, 0x2, &(0x7f0000000340)}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x10\'\\@$&\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055300)={0x8f7, [{0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r5}, {}, {}, {r3}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {r3}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, r4}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x0, "0d4abfd4b32220"}) r185 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000840)={0x0, 0xfaef, 0xffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r185, 0x0) r186 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r186, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r186, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0xfffffffffffffeff, 0x1) sendto$inet(r186, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b300)={0xffff, [{r72, r60}, {}, {r110}, {r161}, {}, {r172}, {}, {}, {r103}, {}, {r135}, {}, {0x0, r52}, {0x0, r40}, {0x0, r182}, {r127, r14}, {r160, r32}, {r177, r58}, {}, {r13, r176}, {0x0, r180}, {r11}, {r19, r24}, {r28}, {r129}, {0x0, r33}, {}, {}, {}, {r104, r49}, {}, {}, {r47}, {r116, r158}, {0x0, r9}, {r56}, {0x0, r38}, {0x0, r37}, {}, {}, {0x0, r174}, {}, {r104, r32}, {r126}, {r107, r143}, {0x0, r124}, {}, {}, {0x0, r61}, {}, {}, {}, {r116}, {r66}, {r89, r99}, {}, {}, {}, {r168}, {r34}, {r131, r152}, {}, {}, {r72}, {0x0, r96}, {}, {}, {0x0, r80}, {r78, r137}, {r41}, {0x0, r80}, {}, {0x0, r85}, {r55}, {0x0, r50}, {r25, r170}, {r6}, {r62}, {r179, r12}, {r175}, {0x0, r22}, {r17, r174}, {r46}, {}, {r139, r75}, {r36, r31}, {}, {}, {r140, r100}, {0x0, r92}, {r108}, {r69}, {r181}, {}, {}, {r161}, {r173}, {}, {0x0, r112}, {r101, r7}, {0x0, r144}, {r91}, {}, {r93}, {}, {r95}, {0x0, r114}, {0x0, r134}, {r115}, {}, {r23}, {0x0, r68}, {r51}, {0x0, r90}, {0x0, r109}, {r57, r167}, {0x0, r156}, {r15, r29}, {}, {r97}, {r101, r120}, {}, {r83, r117}, {}, {0x0, r102}, {}, {r181}, {}, {}, {}, {r71}, {r155, r149}, {}, {r154, r65}, {}, {r159, r79}, {0x0, r184}, {r138, r54}, {r42}, {}, {}, {0x0, r48}, {r39}, {}, {0x0, r18}, {r138}, {r165}, {r146}, {0x0, r143}, {}, {r70, r122}, {r20, r105}, {r119}, {r183}, {r113, r45}, {}, {}, {0x0, r100}, {r72}, {}, {0x0, r128}, {0x0, r81}, {r141}, {}, {r171, r84}, {r97}, {}, {r10, r38}, {r177}, {}, {r47, r106}, {0x0, r143}, {r113}, {}, {r145}, {r69}, {r57}, {0x0, r162}, {0x0, r35}, {r87}, {0x0, r53}, {}, {r118, r106}, {0x0, r76}, {r123, r150}, {r121}, {}, {}, {r8}, {}, {}, {}, {}, {}, {r151, r130}, {}, {r181, r35}, {r94, r90}, {r82}, {r72}, {r16}, {}, {r135, r44}, {0x0, r88}, {r123}, {r129}, {r98}, {}, {}, {0x0, r164}, {0x0, r27}, {r157}, {0x0, r63}, {0x0, r43}, {0x0, r59}, {0x0, r43}, {0x0, r27}, {r121, r67}, {}, {r86, r43}, {0x0, r166}, {r34}, {0x0, r73}, {r30, r148}, {}, {}, {}, {}, {0x0, r147}, {r56, r31}, {r115}, {r145, r21}, {r64}, {0x0, r142}, {}, {r136}, {}, {r133, r84}, {0x0, r164}, {0x0, r111}, {0x0, r125}, {0x0, r100}, {}, {0x0, r178}, {r16}, {r179, r153}, {}, {r62, r33}, {r163, r169}, {}, {}, {r26}, {0x0, r74}, {r56, r132}, {r77}], 0x0, "e8da0117d3c471"}) 02:21:37 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000268000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:37 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000052a0000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:37 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20f18cf60202000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000edc002000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000001102000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 921.687141][T13213] loop2: detected capacity change from 0 to 4096 [ 921.695019][ C1] sd 0:0:1:0: tag#5311 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 921.704871][ C1] sd 0:0:1:0: tag#5311 CDB: opcode=0xe5 (vendor) [ 921.708427][T13220] loop4: detected capacity change from 0 to 4096 [ 921.711195][ C1] sd 0:0:1:0: tag#5311 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 921.718863][T13221] loop1: detected capacity change from 0 to 4 [ 921.726556][ C1] sd 0:0:1:0: tag#5311 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 921.741629][ C1] sd 0:0:1:0: tag#5311 CDB[20]: ba [ 921.754653][ C1] sd 0:0:1:0: tag#5248 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 921.764517][ C1] sd 0:0:1:0: tag#5248 CDB: opcode=0xe4 (vendor) [ 921.770878][ C1] sd 0:0:1:0: tag#5248 CDB[00]: e4 9d 02 8c 07 15 e2 0b 51 04 22 69 36 00 59 73 [ 921.779924][ C1] sd 0:0:1:0: tag#5248 CDB[10]: 91 8f e1 59 f8 6d 8e 03 0a cf a7 1b 16 85 31 e9 [ 921.788974][ C1] sd 0:0:1:0: tag#5248 CDB[20]: 7c 8c 98 e7 98 09 7a 3c 82 29 ad 24 d9 cb [ 921.790302][T13220] EXT4-fs (loop4): Invalid log block size: 26626 [ 921.809636][T13228] loop3: detected capacity change from 0 to 4096 [ 921.821134][T13221] EXT4-fs (loop1): #clusters per group too big: 32768 [ 921.828374][T13228] EXT4-fs (loop3): bad geometry: block count 514 exceeds size of device (512 blocks) 02:21:37 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000003f0000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:37 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000302000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:37 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f00000000000000026c000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:37 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000400000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 921.828702][T13213] EXT4-fs (loop2): bad geometry: block count 704 exceeds size of device (512 blocks) [ 921.861544][T13220] loop4: detected capacity change from 0 to 4096 02:21:37 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000800400000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 921.904301][T13221] loop1: detected capacity change from 0 to 4 [ 921.913167][T13213] loop2: detected capacity change from 0 to 4096 [ 921.924376][T13252] loop3: detected capacity change from 0 to 4096 [ 921.924405][T13221] EXT4-fs (loop1): #clusters per group too big: 32768 [ 921.941507][T13252] EXT4-fs (loop3): bad geometry: block count 515 exceeds size of device (512 blocks) 02:21:37 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000004800000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 921.952781][T13213] EXT4-fs (loop2): bad geometry: block count 704 exceeds size of device (512 blocks) [ 921.986015][T13268] loop4: detected capacity change from 0 to 4096 [ 921.995408][T13268] EXT4-fs (loop4): Invalid log block size: 27650 02:21:37 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x97, 0x0, 0x7, 0x0, 0x0, 0x28300, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x418, 0x0, @perf_config_ext={0x4118, 0x100}, 0x800, 0x7, 0x0, 0x8, 0x0, 0xed7, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x3b, 0x5, 0x0, 0x0, 0xcc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xcb8, 0x80}, 0x480, 0xffffffffffffffe0, 0x0, 0x0, 0x20, 0x0, 0x173, 0x0, 0x4bf, 0x0, 0xe408}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000f00)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000004c0)={0x53, 0xffffffffffffffff, 0x2e, 0x6, @scatter={0x2, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000d40)=""/136, 0x88}, {&(0x7f0000000e00)=""/208, 0xd0}]}, &(0x7f00000001c0)="e49d028c0715e20b5104226936005973918fe159f86d8e030acfa71b168531e97c8c98e798097a3c8229ad24d9cb", &(0x7f0000000540)=""/101, 0x15, 0x10000, 0x2, &(0x7f0000000340)}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x10\'\\@$&\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055300)={0x8f7, [{0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r5}, {}, {}, {r3}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {r3}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, r4}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x0, "0d4abfd4b32220"}) r185 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000840)={0x0, 0xfaef, 0xffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r185, 0x0) r186 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r186, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r186, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0xfffffffffffffeff, 0x1) sendto$inet(r186, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b300)={0xffff, [{r72, r60}, {}, {r110}, {r161}, {}, {r172}, {}, {}, {r103}, {}, {r135}, {}, {0x0, r52}, {0x0, r40}, {0x0, r182}, {r127, r14}, {r160, r32}, {r177, r58}, {}, {r13, r176}, {0x0, r180}, {r11}, {r19, r24}, {r28}, {r129}, {0x0, r33}, {}, {}, {}, {r104, r49}, {}, {}, {r47}, {r116, r158}, {0x0, r9}, {r56}, {0x0, r38}, {0x0, r37}, {}, {}, {0x0, r174}, {}, {r104, r32}, {r126}, {r107, r143}, {0x0, r124}, {}, {}, {0x0, r61}, {}, {}, {}, {r116}, {r66}, {r89, r99}, {}, {}, {}, {r168}, {r34}, {r131, r152}, {}, {}, {r72}, {0x0, r96}, {}, {}, {0x0, r80}, {r78, r137}, {r41}, {0x0, r80}, {}, {0x0, r85}, {r55}, {0x0, r50}, {r25, r170}, {r6}, {r62}, {r179, r12}, {r175}, {0x0, r22}, {r17, r174}, {r46}, {}, {r139, r75}, {r36, r31}, {}, {}, {r140, r100}, {0x0, r92}, {r108}, {r69}, {r181}, {}, {}, {r161}, {r173}, {}, {0x0, r112}, {r101, r7}, {0x0, r144}, {r91}, {}, {r93}, {}, {r95}, {0x0, r114}, {0x0, r134}, {r115}, {}, {r23}, {0x0, r68}, {r51}, {0x0, r90}, {0x0, r109}, {r57, r167}, {0x0, r156}, {r15, r29}, {}, {r97}, {r101, r120}, {}, {r83, r117}, {}, {0x0, r102}, {}, {r181}, {}, {}, {}, {r71}, {r155, r149}, {}, {r154, r65}, {}, {r159, r79}, {0x0, r184}, {r138, r54}, {r42}, {}, {}, {0x0, r48}, {r39}, {}, {0x0, r18}, {r138}, {r165}, {r146}, {0x0, r143}, {}, {r70, r122}, {r20, r105}, {r119}, {r183}, {r113, r45}, {}, {}, {0x0, r100}, {r72}, {}, {0x0, r128}, {0x0, r81}, {r141}, {}, {r171, r84}, {r97}, {}, {r10, r38}, {r177}, {}, {r47, r106}, {0x0, r143}, {r113}, {}, {r145}, {r69}, {r57}, {0x0, r162}, {0x0, r35}, {r87}, {0x0, r53}, {}, {r118, r106}, {0x0, r76}, {r123, r150}, {r121}, {}, {}, {r8}, {}, {}, {}, {}, {}, {r151, r130}, {}, {r181, r35}, {r94, r90}, {r82}, {r72}, {r16}, {}, {r135, r44}, {0x0, r88}, {r123}, {r129}, {r98}, {}, {}, {0x0, r164}, {0x0, r27}, {r157}, {0x0, r63}, {0x0, r43}, {0x0, r59}, {0x0, r43}, {0x0, r27}, {r121, r67}, {}, {r86, r43}, {0x0, r166}, {r34}, {0x0, r73}, {r30, r148}, {}, {}, {}, {}, {0x0, r147}, {r56, r31}, {r115}, {r145, r21}, {r64}, {0x0, r142}, {}, {r136}, {}, {r133, r84}, {0x0, r164}, {0x0, r111}, {0x0, r125}, {0x0, r100}, {}, {0x0, r178}, {r16}, {r179, r153}, {}, {r62, r33}, {r163, r169}, {}, {}, {r26}, {0x0, r74}, {r56, r132}, {r77}], 0x0, "e8da0117d3c471"}) 02:21:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000003c102000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000001202000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:37 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000274000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:37 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000402000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:37 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655ffffffff60000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 922.542112][T13290] loop3: detected capacity change from 0 to 4096 [ 922.558752][T13290] EXT4-fs (loop3): bad geometry: block count 516 exceeds size of device (512 blocks) [ 922.569178][T13291] loop2: detected capacity change from 0 to 4096 [ 922.575830][T13296] loop4: detected capacity change from 0 to 4096 02:21:38 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655ffffffffe0000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:38 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000502000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 922.590213][T13300] loop1: detected capacity change from 0 to 4 [ 922.598633][T13296] EXT4-fs (loop4): Invalid log block size: 29698 [ 922.607226][ C0] sd 0:0:1:0: tag#5249 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 922.617200][ C0] sd 0:0:1:0: tag#5249 CDB: opcode=0xe5 (vendor) [ 922.623574][ C0] sd 0:0:1:0: tag#5249 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 922.632610][ C0] sd 0:0:1:0: tag#5249 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d 02:21:38 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f00000000000000027a000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 922.641766][ C0] sd 0:0:1:0: tag#5249 CDB[20]: ba [ 922.649310][T13300] EXT4-fs (loop1): #clusters per group too big: 32768 [ 922.658197][ C1] sd 0:0:1:0: tag#5250 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 922.668048][ C1] sd 0:0:1:0: tag#5250 CDB: opcode=0xe4 (vendor) [ 922.674388][ C1] sd 0:0:1:0: tag#5250 CDB[00]: e4 9d 02 8c 07 15 e2 0b 51 04 22 69 36 00 59 73 [ 922.683433][ C1] sd 0:0:1:0: tag#5250 CDB[10]: 91 8f e1 59 f8 6d 8e 03 0a cf a7 1b 16 85 31 e9 02:21:38 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655ff6ffffff0000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:38 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655ffeffffff0000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 922.692450][ C1] sd 0:0:1:0: tag#5250 CDB[20]: 7c 8c 98 e7 98 09 7a 3c 82 29 ad 24 d9 cb [ 922.698591][T13291] EXT4-fs (loop2): bad geometry: block count 705 exceeds size of device (512 blocks) [ 922.727670][T13317] loop3: detected capacity change from 0 to 4096 [ 922.739044][T13317] EXT4-fs (loop3): bad geometry: block count 517 exceeds size of device (512 blocks) [ 922.762664][T13300] loop1: detected capacity change from 0 to 4 [ 922.762713][T13291] loop2: detected capacity change from 0 to 4096 [ 922.776377][T13291] EXT4-fs (loop2): bad geometry: block count 705 exceeds size of device (512 blocks) [ 922.776659][T13330] loop4: detected capacity change from 0 to 4096 02:21:38 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000001000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 922.799235][T13300] EXT4-fs (loop1): #clusters per group too big: 32768 [ 922.810673][T13330] EXT4-fs (loop4): Invalid log block size: 31234 02:21:38 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x97, 0x0, 0x7, 0x0, 0x0, 0x28300, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x418, 0x0, @perf_config_ext={0x4118, 0x100}, 0x800, 0x7, 0x0, 0x8, 0x0, 0xed7, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x3b, 0x5, 0x0, 0x0, 0xcc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xcb8, 0x80}, 0x480, 0xffffffffffffffe0, 0x0, 0x0, 0x20, 0x0, 0x173, 0x0, 0x4bf, 0x0, 0xe408}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000f00)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000004c0)={0x53, 0xffffffffffffffff, 0x2e, 0x6, @scatter={0x2, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000d40)=""/136, 0x88}, {&(0x7f0000000e00)=""/208, 0xd0}]}, &(0x7f00000001c0)="e49d028c0715e20b5104226936005973918fe159f86d8e030acfa71b168531e97c8c98e798097a3c8229ad24d9cb", &(0x7f0000000540)=""/101, 0x15, 0x10000, 0x2, &(0x7f0000000340)}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x10\'\\@$&\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055300)={0x8f7, [{0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r5}, {}, {}, {r3}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {r3}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, r4}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x0, "0d4abfd4b32220"}) r184 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000840)={0x0, 0xfaef, 0xffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r184, 0x0) r185 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r185, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r185, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0xfffffffffffffeff, 0x1) sendto$inet(r185, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b300)={0xffff, [{r71, r60}, {}, {r109}, {r160}, {}, {r171}, {}, {}, {r102}, {}, {r134}, {}, {0x0, r52}, {0x0, r40}, {0x0, r181}, {r126, r14}, {r159, r32}, {r176, r58}, {}, {r13, r175}, {0x0, r179}, {r11}, {r19, r24}, {r28}, {r128}, {0x0, r33}, {}, {}, {}, {r103, r49}, {}, {}, {r47}, {r115, r157}, {0x0, r9}, {r56}, {0x0, r38}, {0x0, r37}, {}, {}, {0x0, r173}, {}, {r103, r32}, {r125}, {r106, r142}, {0x0, r123}, {}, {}, {}, {}, {}, {0x0, r116}, {r115}, {r65}, {r88, r98}, {}, {}, {}, {r167}, {r34}, {r130, r151}, {}, {}, {r71}, {0x0, r95}, {}, {}, {0x0, r79}, {r77, r136}, {r41}, {0x0, r79}, {}, {0x0, r84}, {r55}, {0x0, r50}, {r25, r169}, {r6}, {r61}, {r178, r12}, {r174}, {0x0, r22}, {r17, r173}, {r46}, {}, {r138, r74}, {r36, r31}, {}, {}, {r139, r99}, {0x0, r91}, {r107}, {r68}, {r180}, {}, {}, {r160}, {r172}, {}, {0x0, r111}, {r100, r7}, {0x0, r143}, {r90}, {}, {r92}, {}, {r94}, {0x0, r113}, {0x0, r133}, {r114}, {}, {r23}, {0x0, r67}, {r51}, {0x0, r89}, {0x0, r108}, {r57, r166}, {0x0, r155}, {r15, r29}, {}, {r96}, {r100, r119}, {}, {r82, r116}, {}, {0x0, r101}, {}, {r180}, {}, {}, {}, {r70}, {r154, r148}, {}, {r153, r64}, {}, {r158, r78}, {0x0, r183}, {r137, r54}, {r42}, {}, {}, {0x0, r48}, {r39}, {}, {0x0, r18}, {r137}, {r164}, {r145}, {0x0, r142}, {}, {r69, r121}, {r20, r104}, {r118}, {r182}, {r112, r45}, {}, {}, {0x0, r99}, {r71}, {}, {0x0, r127}, {0x0, r80}, {r140}, {}, {r170, r83}, {r96}, {}, {r10, r38}, {r176}, {}, {r47, r105}, {0x0, r142}, {r112}, {}, {r144}, {r68}, {r57}, {0x0, r161}, {0x0, r35}, {r86}, {0x0, r53}, {}, {r117, r105}, {0x0, r75}, {r122, r149}, {r120}, {}, {}, {r8}, {}, {}, {}, {}, {}, {r150, r129}, {}, {r180, r35}, {r93, r89}, {r81}, {r71}, {r16}, {}, {r134, r44}, {0x0, r87}, {r122}, {r128}, {r97}, {}, {}, {0x0, r163}, {0x0, r27}, {r156}, {0x0, r62}, {0x0, r43}, {0x0, r59}, {0x0, r43}, {0x0, r27}, {r120, r66}, {}, {r85, r43}, {0x0, r165}, {r34}, {0x0, r72}, {r30, r147}, {}, {}, {}, {}, {0x0, r146}, {r56, r31}, {r114}, {r144, r21}, {r63}, {0x0, r141}, {}, {r135}, {}, {r132, r83}, {0x0, r163}, {0x0, r110}, {0x0, r124}, {0x0, r99}, {}, {0x0, r177}, {r16}, {r178, r152}, {}, {r61, r33}, {r162, r168}, {}, {}, {r26}, {0x0, r73}, {r56, r131}, {r76}], 0x0, "e8da0117d3c471"}) 02:21:38 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000008000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:38 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000602000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20ffffffda02000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000002002000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:38 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000283000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 923.019873][T13363] loop1: detected capacity change from 0 to 4 [ 923.026569][T13364] loop4: detected capacity change from 0 to 4096 [ 923.033557][T13365] loop2: detected capacity change from 0 to 4096 [ 923.054161][ C0] sd 0:0:1:0: tag#5251 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 923.064042][ C0] sd 0:0:1:0: tag#5251 CDB: opcode=0xe5 (vendor) [ 923.065323][T13365] EXT4-fs (loop2): bad geometry: block count 730 exceeds size of device (512 blocks) [ 923.070368][ C0] sd 0:0:1:0: tag#5251 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 923.084191][T13364] EXT4-fs (loop4): Invalid log block size: 33538 [ 923.088851][ C0] sd 0:0:1:0: tag#5251 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 923.096862][T13363] EXT4-fs (loop1): #clusters per group too big: 32768 [ 923.104181][ C0] sd 0:0:1:0: tag#5251 CDB[20]: ba 02:21:38 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000020000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2002f68cf102000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 923.117908][ C0] sd 0:0:1:0: tag#5252 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 923.118254][T13373] loop3: detected capacity change from 0 to 4096 [ 923.127842][ C0] sd 0:0:1:0: tag#5252 CDB: opcode=0xe4 (vendor) [ 923.140564][ C0] sd 0:0:1:0: tag#5252 CDB[00]: e4 9d 02 8c 07 15 e2 0b 51 04 22 69 36 00 59 73 [ 923.149632][ C0] sd 0:0:1:0: tag#5252 CDB[10]: 91 8f e1 59 f8 6d 8e 03 0a cf a7 1b 16 85 31 e9 [ 923.158705][ C0] sd 0:0:1:0: tag#5252 CDB[20]: 7c 8c 98 e7 98 09 7a 3c 82 29 ad 24 d9 cb 02:21:38 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000286000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20fffffff602000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 923.178905][T13373] EXT4-fs (loop3): bad geometry: block count 518 exceeds size of device (512 blocks) [ 923.214595][T13363] loop1: detected capacity change from 0 to 4 02:21:38 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000020602000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:38 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000010001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 923.241182][T13363] EXT4-fs (loop1): #clusters per group too big: 32768 [ 923.274307][T13403] loop3: detected capacity change from 0 to 4096 [ 923.289940][T13402] loop2: detected capacity change from 0 to 4096 [ 923.300330][T13407] loop4: detected capacity change from 0 to 4096 [ 923.308215][T13403] EXT4-fs (loop3): bad geometry: block count 518 exceeds size of device (512 blocks) [ 923.320707][T13402] EXT4-fs (loop2): bad geometry: block count 758 exceeds size of device (512 blocks) [ 923.340689][T13407] EXT4-fs (loop4): Invalid log block size: 34306 [ 923.369521][T13402] loop2: detected capacity change from 0 to 4096 [ 923.394712][T13402] EXT4-fs (loop2): bad geometry: block count 758 exceeds size of device (512 blocks) 02:21:39 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x97, 0x0, 0x7, 0x0, 0x0, 0x28300, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x418, 0x0, @perf_config_ext={0x4118, 0x100}, 0x800, 0x7, 0x0, 0x8, 0x0, 0xed7, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x3b, 0x5, 0x0, 0x0, 0xcc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xcb8, 0x80}, 0x480, 0xffffffffffffffe0, 0x0, 0x0, 0x20, 0x0, 0x173, 0x0, 0x4bf, 0x0, 0xe408}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000f00)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000004c0)={0x53, 0xffffffffffffffff, 0x2e, 0x6, @scatter={0x2, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000d40)=""/136, 0x88}, {&(0x7f0000000e00)=""/208, 0xd0}]}, &(0x7f00000001c0)="e49d028c0715e20b5104226936005973918fe159f86d8e030acfa71b168531e97c8c98e798097a3c8229ad24d9cb", &(0x7f0000000540)=""/101, 0x15, 0x10000, 0x2, &(0x7f0000000340)}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x10\'\\@$&\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055300)={0x8f7, [{0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r5}, {}, {}, {r3}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {r3}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, r4}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x0, "0d4abfd4b32220"}) r184 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000840)={0x0, 0xfaef, 0xffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r184, 0x0) r185 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r185, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r185, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0xfffffffffffffeff, 0x1) sendto$inet(r185, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b300)={0xffff, [{r71, r60}, {}, {r109}, {r160}, {}, {r171}, {}, {}, {r102}, {}, {r134}, {}, {0x0, r52}, {0x0, r40}, {0x0, r181}, {r126, r14}, {r159, r32}, {r176, r58}, {}, {r13, r175}, {0x0, r179}, {r11}, {r19, r24}, {r28}, {r128}, {0x0, r33}, {}, {}, {}, {r103, r49}, {}, {}, {r47}, {r115, r157}, {0x0, r9}, {r56}, {0x0, r38}, {0x0, r37}, {}, {}, {0x0, r173}, {}, {r103, r32}, {r125}, {r106, r142}, {0x0, r123}, {}, {}, {}, {}, {}, {0x0, r116}, {r115}, {r65}, {r88, r98}, {}, {}, {}, {r167}, {r34}, {r130, r151}, {}, {}, {r71}, {0x0, r95}, {}, {}, {0x0, r79}, {r77, r136}, {r41}, {0x0, r79}, {}, {0x0, r84}, {r55}, {0x0, r50}, {r25, r169}, {r6}, {r61}, {r178, r12}, {r174}, {0x0, r22}, {r17, r173}, {r46}, {}, {r138, r74}, {r36, r31}, {}, {}, {r139, r99}, {0x0, r91}, {r107}, {r68}, {r180}, {}, {}, {r160}, {r172}, {}, {0x0, r111}, {r100, r7}, {0x0, r143}, {r90}, {}, {r92}, {}, {r94}, {0x0, r113}, {0x0, r133}, {r114}, {}, {r23}, {0x0, r67}, {r51}, {0x0, r89}, {0x0, r108}, {r57, r166}, {0x0, r155}, {r15, r29}, {}, {r96}, {r100, r119}, {}, {r82, r116}, {}, {0x0, r101}, {}, {r180}, {}, {}, {}, {r70}, {r154, r148}, {}, {r153, r64}, {}, {r158, r78}, {0x0, r183}, {r137, r54}, {r42}, {}, {}, {0x0, r48}, {r39}, {}, {0x0, r18}, {r137}, {r164}, {r145}, {0x0, r142}, {}, {r69, r121}, {r20, r104}, {r118}, {r182}, {r112, r45}, {}, {}, {0x0, r99}, {r71}, {}, {0x0, r127}, {0x0, r80}, {r140}, {}, {r170, r83}, {r96}, {}, {r10, r38}, {r176}, {}, {r47, r105}, {0x0, r142}, {r112}, {}, {r144}, {r68}, {r57}, {0x0, r161}, {0x0, r35}, {r86}, {0x0, r53}, {}, {r117, r105}, {0x0, r75}, {r122, r149}, {r120}, {}, {}, {r8}, {}, {}, {}, {}, {}, {r150, r129}, {}, {r180, r35}, {r93, r89}, {r81}, {r71}, {r16}, {}, {r134, r44}, {0x0, r87}, {r122}, {r128}, {r97}, {}, {}, {0x0, r163}, {0x0, r27}, {r156}, {0x0, r62}, {0x0, r43}, {0x0, r59}, {0x0, r43}, {0x0, r27}, {r120, r66}, {}, {r85, r43}, {0x0, r165}, {r34}, {0x0, r72}, {r30, r147}, {}, {}, {}, {}, {0x0, r146}, {r56, r31}, {r114}, {r144, r21}, {r63}, {0x0, r141}, {}, {r135}, {}, {r132, r83}, {0x0, r163}, {0x0, r110}, {0x0, r124}, {0x0, r99}, {}, {0x0, r177}, {r16}, {r178, r152}, {}, {r61, r33}, {r162, r168}, {}, {}, {r26}, {0x0, r73}, {r56, r131}, {r76}], 0x0, "e8da0117d3c471"}) 02:21:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000102002000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:39 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655fffffffffffff070001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:39 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000040602000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:39 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000287000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000ff802000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 923.897792][T13438] loop1: detected capacity change from 0 to 4 02:21:39 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000100001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 923.943198][T13447] loop2: detected capacity change from 0 to 4096 [ 923.945044][T13448] loop4: detected capacity change from 0 to 4096 [ 923.956947][T13438] EXT4-fs (loop1): #clusters per group too big: 32768 [ 923.964765][T13447] EXT4-fs (loop2): bad geometry: block count 760 exceeds size of device (512 blocks) [ 923.974939][T13449] loop3: detected capacity change from 0 to 4096 [ 923.994890][ C0] sd 0:0:1:0: tag#5253 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 924.004757][ C0] sd 0:0:1:0: tag#5253 CDB: opcode=0xe5 (vendor) [ 924.007299][T13449] EXT4-fs (loop3): bad geometry: block count 518 exceeds size of device (512 blocks) [ 924.011121][ C0] sd 0:0:1:0: tag#5253 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 924.022781][T13448] EXT4-fs (loop4): Invalid log block size: 34562 [ 924.029609][ C0] sd 0:0:1:0: tag#5253 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d 02:21:39 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000200001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 924.045079][ C0] sd 0:0:1:0: tag#5253 CDB[20]: ba [ 924.058713][ C0] sd 0:0:1:0: tag#5254 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 924.068647][ C0] sd 0:0:1:0: tag#5254 CDB: opcode=0xe4 (vendor) [ 924.075079][ C0] sd 0:0:1:0: tag#5254 CDB[00]: e4 9d 02 8c 07 15 e2 0b 51 04 22 69 36 00 59 73 [ 924.084134][ C0] sd 0:0:1:0: tag#5254 CDB[10]: 91 8f e1 59 f8 6d 8e 03 0a cf a7 1b 16 85 31 e9 02:21:39 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000101000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 924.093166][ C0] sd 0:0:1:0: tag#5254 CDB[20]: 7c 8c 98 e7 98 09 7a 3c 82 29 ad 24 d9 cb [ 924.110316][T13438] loop1: detected capacity change from 0 to 4 [ 924.125017][T13438] EXT4-fs (loop1): #clusters per group too big: 32768 02:21:39 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f0000000000000002a0000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 924.143838][T13447] loop2: detected capacity change from 0 to 4096 02:21:39 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000702000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000002202000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 924.174209][T13447] EXT4-fs (loop2): bad geometry: block count 760 exceeds size of device (512 blocks) [ 924.217408][T13491] loop4: detected capacity change from 0 to 4096 [ 924.231490][T13495] loop3: detected capacity change from 0 to 4096 [ 924.252485][T13491] EXT4-fs (loop4): Invalid log block size: 40962 [ 924.259240][T13501] loop1: detected capacity change from 0 to 4 [ 924.277397][T13501] EXT4-fs (loop1): #clusters per group too big: 32768 [ 924.284607][T13495] EXT4-fs (loop3): bad geometry: block count 519 exceeds size of device (512 blocks) [ 924.308895][T13501] loop1: detected capacity change from 0 to 4 [ 924.315720][T13501] EXT4-fs (loop1): #clusters per group too big: 32768 02:21:39 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x97, 0x0, 0x7, 0x0, 0x0, 0x28300, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x418, 0x0, @perf_config_ext={0x4118, 0x100}, 0x800, 0x7, 0x0, 0x8, 0x0, 0xed7, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x3b, 0x5, 0x0, 0x0, 0xcc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xcb8, 0x80}, 0x480, 0xffffffffffffffe0, 0x0, 0x0, 0x20, 0x0, 0x173, 0x0, 0x4bf, 0x0, 0xe408}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000f00)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000004c0)={0x53, 0xffffffffffffffff, 0x2e, 0x6, @scatter={0x2, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000d40)=""/136, 0x88}, {&(0x7f0000000e00)=""/208, 0xd0}]}, &(0x7f00000001c0)="e49d028c0715e20b5104226936005973918fe159f86d8e030acfa71b168531e97c8c98e798097a3c8229ad24d9cb", &(0x7f0000000540)=""/101, 0x15, 0x10000, 0x2, &(0x7f0000000340)}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x10\'\\@$&\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055300)={0x8f7, [{0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r5}, {}, {}, {r3}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {r3}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, r4}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x0, "0d4abfd4b32220"}) r184 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000840)={0x0, 0xfaef, 0xffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r184, 0x0) r185 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r185, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r185, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0xfffffffffffffeff, 0x1) sendto$inet(r185, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b300)={0xffff, [{r71, r60}, {}, {r109}, {r160}, {}, {r171}, {}, {}, {r102}, {}, {r134}, {}, {0x0, r52}, {0x0, r40}, {0x0, r181}, {r126, r14}, {r159, r32}, {r176, r58}, {}, {r13, r175}, {0x0, r179}, {r11}, {r19, r24}, {r28}, {r128}, {0x0, r33}, {}, {}, {}, {r103, r49}, {}, {}, {r47}, {r115, r157}, {0x0, r9}, {r56}, {0x0, r38}, {0x0, r37}, {}, {}, {0x0, r173}, {}, {r103, r32}, {r125}, {r106, r142}, {0x0, r123}, {}, {}, {}, {}, {}, {0x0, r116}, {r115}, {r65}, {r88, r98}, {}, {}, {}, {r167}, {r34}, {r130, r151}, {}, {}, {r71}, {0x0, r95}, {}, {}, {0x0, r79}, {r77, r136}, {r41}, {0x0, r79}, {}, {0x0, r84}, {r55}, {0x0, r50}, {r25, r169}, {r6}, {r61}, {r178, r12}, {r174}, {0x0, r22}, {r17, r173}, {r46}, {}, {r138, r74}, {r36, r31}, {}, {}, {r139, r99}, {0x0, r91}, {r107}, {r68}, {r180}, {}, {}, {r160}, {r172}, {}, {0x0, r111}, {r100, r7}, {0x0, r143}, {r90}, {}, {r92}, {}, {r94}, {0x0, r113}, {0x0, r133}, {r114}, {}, {r23}, {0x0, r67}, {r51}, {0x0, r89}, {0x0, r108}, {r57, r166}, {0x0, r155}, {r15, r29}, {}, {r96}, {r100, r119}, {}, {r82, r116}, {}, {0x0, r101}, {}, {r180}, {}, {}, {}, {r70}, {r154, r148}, {}, {r153, r64}, {}, {r158, r78}, {0x0, r183}, {r137, r54}, {r42}, {}, {}, {0x0, r48}, {r39}, {}, {0x0, r18}, {r137}, {r164}, {r145}, {0x0, r142}, {}, {r69, r121}, {r20, r104}, {r118}, {r182}, {r112, r45}, {}, {}, {0x0, r99}, {r71}, {}, {0x0, r127}, {0x0, r80}, {r140}, {}, {r170, r83}, {r96}, {}, {r10, r38}, {r176}, {}, {r47, r105}, {0x0, r142}, {r112}, {}, {r144}, {r68}, {r57}, {0x0, r161}, {0x0, r35}, {r86}, {0x0, r53}, {}, {r117, r105}, {0x0, r75}, {r122, r149}, {r120}, {}, {}, {r8}, {}, {}, {}, {}, {}, {r150, r129}, {}, {r180, r35}, {r93, r89}, {r81}, {r71}, {r16}, {}, {r134, r44}, {0x0, r87}, {r122}, {r128}, {r97}, {}, {}, {0x0, r163}, {0x0, r27}, {r156}, {0x0, r62}, {0x0, r43}, {0x0, r59}, {0x0, r43}, {0x0, r27}, {r120, r66}, {}, {r85, r43}, {0x0, r165}, {r34}, {0x0, r72}, {r30, r147}, {}, {}, {}, {}, {0x0, r146}, {r56, r31}, {r114}, {r144, r21}, {r63}, {0x0, r141}, {}, {r135}, {}, {r132, r83}, {0x0, r163}, {0x0, r110}, {0x0, r124}, {0x0, r99}, {}, {0x0, r177}, {r16}, {r178, r152}, {}, {r61, r33}, {r162, r168}, {}, {}, {r26}, {0x0, r73}, {r56, r131}, {r76}], 0x0, "e8da0117d3c471"}) 02:21:39 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000201000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:39 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f0000000000000002a1000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20fffffdf902000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:39 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000802000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000002502000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:39 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000040201000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 924.462743][T13528] loop4: detected capacity change from 0 to 4096 [ 924.473824][T13530] loop3: detected capacity change from 0 to 4096 [ 924.477291][T13534] loop1: detected capacity change from 0 to 4 [ 924.484425][T13535] loop2: detected capacity change from 0 to 4096 02:21:39 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f0000000000000002a6000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 924.520288][T13534] EXT4-fs (loop1): #clusters per group too big: 32768 [ 924.527930][T13528] EXT4-fs (loop4): Invalid log block size: 41218 [ 924.547828][T13535] EXT4-fs (loop2): bad geometry: block count 761 exceeds size of device (512 blocks) 02:21:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000002e02000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:39 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000301000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20fffffdfd02000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 924.563429][T13530] EXT4-fs (loop3): bad geometry: block count 520 exceeds size of device (512 blocks) 02:21:40 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000401000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 924.619728][T13558] loop4: detected capacity change from 0 to 4096 [ 924.631496][T13558] EXT4-fs (loop4): Invalid log block size: 42498 [ 924.662087][T13568] loop2: detected capacity change from 0 to 4096 [ 924.667516][T13565] loop1: detected capacity change from 0 to 4 [ 924.684378][T13565] EXT4-fs (loop1): #clusters per group too big: 32768 [ 924.691410][T13568] EXT4-fs (loop2): bad geometry: block count 765 exceeds size of device (512 blocks) [ 924.707524][T13565] loop1: detected capacity change from 0 to 4 [ 924.715180][T13568] loop2: detected capacity change from 0 to 4096 [ 924.721935][T13565] EXT4-fs (loop1): #clusters per group too big: 32768 [ 924.731161][T13568] EXT4-fs (loop2): bad geometry: block count 765 exceeds size of device (512 blocks) 02:21:40 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000902000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:40 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f0000000000000002a7000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:40 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000501000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20fffffffd02000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:40 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x97, 0x0, 0x7, 0x0, 0x0, 0x28300, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x418, 0x0, @perf_config_ext={0x4118, 0x100}, 0x800, 0x7, 0x0, 0x8, 0x0, 0xed7, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x3b, 0x5, 0x0, 0x0, 0xcc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xcb8, 0x80}, 0x480, 0xffffffffffffffe0, 0x0, 0x0, 0x20, 0x0, 0x173, 0x0, 0x4bf, 0x0, 0xe408}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000f00)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000004c0)={0x53, 0xffffffffffffffff, 0x2e, 0x6, @scatter={0x2, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000d40)=""/136, 0x88}, {&(0x7f0000000e00)=""/208, 0xd0}]}, &(0x7f00000001c0)="e49d028c0715e20b5104226936005973918fe159f86d8e030acfa71b168531e97c8c98e798097a3c8229ad24d9cb", &(0x7f0000000540)=""/101, 0x15, 0x10000, 0x2, &(0x7f0000000340)}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x10\'\\@$&\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055300)={0x8f7, [{0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r5}, {}, {}, {r3}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {r3}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, r4}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x0, "0d4abfd4b32220"}) r184 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000840)={0x0, 0xfaef, 0xffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r184, 0x0) r185 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r185, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r185, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0xfffffffffffffeff, 0x1) sendto$inet(r185, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b300)={0xffff, [{r72, r60}, {}, {r110}, {r160}, {}, {r171}, {}, {}, {r103}, {}, {r134}, {}, {0x0, r52}, {0x0, r40}, {0x0, r181}, {r126, r14}, {r159, r32}, {r176, r58}, {}, {r13, r175}, {0x0, r179}, {r11}, {r19, r24}, {r28}, {r128}, {0x0, r33}, {}, {}, {}, {r104, r49}, {}, {}, {r47}, {r116, r157}, {0x0, r9}, {r56}, {0x0, r38}, {0x0, r37}, {}, {}, {0x0, r173}, {}, {r104, r32}, {r125}, {r107, r142}, {}, {}, {}, {0x0, r61}, {}, {}, {0x0, r117}, {r116}, {r66}, {r89, r99}, {}, {}, {}, {r167}, {r34}, {r130, r151}, {}, {}, {r72}, {0x0, r96}, {}, {}, {0x0, r80}, {r78, r136}, {r41}, {0x0, r80}, {}, {0x0, r85}, {r55}, {0x0, r50}, {r25, r169}, {r6}, {r62}, {r178, r12}, {r174}, {0x0, r22}, {r17, r173}, {r46}, {}, {r138, r75}, {r36, r31}, {}, {}, {r139, r100}, {0x0, r92}, {r108}, {r69}, {r180}, {}, {}, {r160}, {r172}, {}, {0x0, r112}, {r101, r7}, {0x0, r143}, {r91}, {}, {r93}, {}, {r95}, {0x0, r114}, {0x0, r133}, {r115}, {}, {r23}, {0x0, r68}, {r51}, {0x0, r90}, {0x0, r109}, {r57, r166}, {0x0, r155}, {r15, r29}, {}, {r97}, {r101, r120}, {}, {r83, r117}, {}, {0x0, r102}, {}, {r180}, {}, {}, {}, {r71}, {r154, r148}, {}, {r153, r65}, {}, {r158, r79}, {0x0, r183}, {r137, r54}, {r42}, {}, {}, {0x0, r48}, {r39}, {}, {0x0, r18}, {r137}, {r164}, {r145}, {0x0, r142}, {}, {r70, r122}, {r20, r105}, {r119}, {r182}, {r113, r45}, {}, {}, {0x0, r100}, {r72}, {}, {0x0, r127}, {0x0, r81}, {r140}, {}, {r170, r84}, {r97}, {}, {r10, r38}, {r176}, {}, {r47, r106}, {0x0, r142}, {r113}, {}, {r144}, {r69}, {r57}, {0x0, r161}, {0x0, r35}, {r87}, {0x0, r53}, {}, {r118, r106}, {0x0, r76}, {r123, r149}, {r121}, {}, {}, {r8}, {}, {}, {}, {}, {}, {r150, r129}, {}, {r180, r35}, {r94, r90}, {r82}, {r72}, {r16}, {}, {r134, r44}, {0x0, r88}, {r123}, {r128}, {r98}, {}, {}, {0x0, r163}, {0x0, r27}, {r156}, {0x0, r63}, {0x0, r43}, {0x0, r59}, {0x0, r43}, {0x0, r27}, {r121, r67}, {}, {r86, r43}, {0x0, r165}, {r34}, {0x0, r73}, {r30, r147}, {}, {}, {}, {}, {0x0, r146}, {r56, r31}, {r115}, {r144, r21}, {r64}, {0x0, r141}, {}, {r135}, {}, {r132, r84}, {0x0, r163}, {0x0, r111}, {0x0, r124}, {0x0, r100}, {}, {0x0, r177}, {r16}, {r178, r152}, {}, {r62, r33}, {r162, r168}, {}, {}, {r26}, {0x0, r74}, {r56, r131}, {r77}], 0x0, "e8da0117d3c471"}) 02:21:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003f02000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 925.344864][T13602] loop4: detected capacity change from 0 to 4096 [ 925.351315][T13603] loop1: detected capacity change from 0 to 4 [ 925.362030][T13606] loop2: detected capacity change from 0 to 4096 [ 925.370557][T13614] loop3: detected capacity change from 0 to 4096 [ 925.382363][T13603] EXT4-fs (loop1): #clusters per group too big: 32768 02:21:40 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000601000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20fffffffe02000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:40 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000a02000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:40 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f0000000000000002aa000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 925.396761][T13606] EXT4-fs (loop2): bad geometry: block count 765 exceeds size of device (512 blocks) [ 925.396799][T13602] EXT4-fs (loop4): Invalid log block size: 42754 [ 925.412887][T13614] EXT4-fs (loop3): bad geometry: block count 521 exceeds size of device (512 blocks) 02:21:40 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000040601000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 925.469210][T13603] loop1: detected capacity change from 0 to 4 [ 925.491755][T13603] EXT4-fs (loop1): #clusters per group too big: 32768 [ 925.509062][T13638] loop4: detected capacity change from 0 to 4096 02:21:40 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000701000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 925.528144][T13638] EXT4-fs (loop4): Invalid log block size: 43522 [ 925.529212][T13642] loop2: detected capacity change from 0 to 4096 [ 925.543958][T13644] loop3: detected capacity change from 0 to 4096 [ 925.583807][T13642] EXT4-fs (loop2): bad geometry: block count 766 exceeds size of device (512 blocks) [ 925.593663][T13644] EXT4-fs (loop3): bad geometry: block count 522 exceeds size of device (512 blocks) [ 925.627207][T13642] loop2: detected capacity change from 0 to 4096 [ 925.634454][T13642] EXT4-fs (loop2): bad geometry: block count 766 exceeds size of device (512 blocks) 02:21:41 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x97, 0x0, 0x7, 0x0, 0x0, 0x28300, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x418, 0x0, @perf_config_ext={0x4118, 0x100}, 0x800, 0x7, 0x0, 0x8, 0x0, 0xed7, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x3b, 0x5, 0x0, 0x0, 0xcc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xcb8, 0x80}, 0x480, 0xffffffffffffffe0, 0x0, 0x0, 0x20, 0x0, 0x173, 0x0, 0x4bf, 0x0, 0xe408}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000f00)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000004c0)={0x53, 0xffffffffffffffff, 0x2e, 0x6, @scatter={0x2, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000d40)=""/136, 0x88}, {&(0x7f0000000e00)=""/208, 0xd0}]}, &(0x7f00000001c0)="e49d028c0715e20b5104226936005973918fe159f86d8e030acfa71b168531e97c8c98e798097a3c8229ad24d9cb", &(0x7f0000000540)=""/101, 0x15, 0x10000, 0x2, &(0x7f0000000340)}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x10\'\\@$&\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055300)={0x8f7, [{0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r5}, {}, {}, {r3}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {r3}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, r4}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x0, "0d4abfd4b32220"}) r184 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000840)={0x0, 0xfaef, 0xffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r184, 0x0) r185 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r185, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r185, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0xfffffffffffffeff, 0x1) sendto$inet(r185, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b300)={0xffff, [{r72, r60}, {}, {r110}, {r160}, {}, {r171}, {}, {}, {r103}, {}, {r134}, {}, {0x0, r52}, {0x0, r40}, {0x0, r181}, {r126, r14}, {r159, r32}, {r176, r58}, {}, {r13, r175}, {0x0, r179}, {r11}, {r19, r24}, {r28}, {r128}, {0x0, r33}, {}, {}, {}, {r104, r49}, {}, {}, {r47}, {r116, r157}, {0x0, r9}, {r56}, {0x0, r38}, {0x0, r37}, {}, {}, {0x0, r173}, {}, {r104, r32}, {r125}, {r107, r142}, {}, {}, {}, {0x0, r61}, {}, {}, {0x0, r117}, {r116}, {r66}, {r89, r99}, {}, {}, {}, {r167}, {r34}, {r130, r151}, {}, {}, {r72}, {0x0, r96}, {}, {}, {0x0, r80}, {r78, r136}, {r41}, {0x0, r80}, {}, {0x0, r85}, {r55}, {0x0, r50}, {r25, r169}, {r6}, {r62}, {r178, r12}, {r174}, {0x0, r22}, {r17, r173}, {r46}, {}, {r138, r75}, {r36, r31}, {}, {}, {r139, r100}, {0x0, r92}, {r108}, {r69}, {r180}, {}, {}, {r160}, {r172}, {}, {0x0, r112}, {r101, r7}, {0x0, r143}, {r91}, {}, {r93}, {}, {r95}, {0x0, r114}, {0x0, r133}, {r115}, {}, {r23}, {0x0, r68}, {r51}, {0x0, r90}, {0x0, r109}, {r57, r166}, {0x0, r155}, {r15, r29}, {}, {r97}, {r101, r120}, {}, {r83, r117}, {}, {0x0, r102}, {}, {r180}, {}, {}, {}, {r71}, {r154, r148}, {}, {r153, r65}, {}, {r158, r79}, {0x0, r183}, {r137, r54}, {r42}, {}, {}, {0x0, r48}, {r39}, {}, {0x0, r18}, {r137}, {r164}, {r145}, {0x0, r142}, {}, {r70, r122}, {r20, r105}, {r119}, {r182}, {r113, r45}, {}, {}, {0x0, r100}, {r72}, {}, {0x0, r127}, {0x0, r81}, {r140}, {}, {r170, r84}, {r97}, {}, {r10, r38}, {r176}, {}, {r47, r106}, {0x0, r142}, {r113}, {}, {r144}, {r69}, {r57}, {0x0, r161}, {0x0, r35}, {r87}, {0x0, r53}, {}, {r118, r106}, {0x0, r76}, {r123, r149}, {r121}, {}, {}, {r8}, {}, {}, {}, {}, {}, {r150, r129}, {}, {r180, r35}, {r94, r90}, {r82}, {r72}, {r16}, {}, {r134, r44}, {0x0, r88}, {r123}, {r128}, {r98}, {}, {}, {0x0, r163}, {0x0, r27}, {r156}, {0x0, r63}, {0x0, r43}, {0x0, r59}, {0x0, r43}, {0x0, r27}, {r121, r67}, {}, {r86, r43}, {0x0, r165}, {r34}, {0x0, r73}, {r30, r147}, {}, {}, {}, {}, {0x0, r146}, {r56, r31}, {r115}, {r144, r21}, {r64}, {0x0, r141}, {}, {r135}, {}, {r132, r84}, {0x0, r163}, {0x0, r111}, {0x0, r124}, {0x0, r100}, {}, {0x0, r177}, {r16}, {r178, r152}, {}, {r62, r33}, {r162, r168}, {}, {}, {r26}, {0x0, r74}, {r56, r131}, {r77}], 0x0, "e8da0117d3c471"}) 02:21:41 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000801000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004002000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:41 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f0000000000000002ab000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:41 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000b02000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000fff02000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:41 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000001801000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 926.250496][T13677] loop1: detected capacity change from 0 to 4 [ 926.257017][T13678] loop3: detected capacity change from 0 to 4096 [ 926.267303][T13679] loop2: detected capacity change from 0 to 4096 [ 926.270708][T13677] EXT4-fs (loop1): #clusters per group too big: 32768 [ 926.278172][T13686] loop4: detected capacity change from 0 to 4096 [ 926.292122][ C1] scsi_io_completion_action: 4 callbacks suppressed 02:21:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004802000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:41 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000001c01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 926.292144][ C1] sd 0:0:1:0: tag#5259 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 926.308976][ C1] sd 0:0:1:0: tag#5259 CDB: opcode=0xe5 (vendor) [ 926.315772][ C1] sd 0:0:1:0: tag#5259 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 926.324915][ C1] sd 0:0:1:0: tag#5259 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 926.334065][ C1] sd 0:0:1:0: tag#5259 CDB[20]: ba 02:21:41 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000002601000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 926.355082][ C1] sd 0:0:1:0: tag#5260 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 926.364941][ C1] sd 0:0:1:0: tag#5260 CDB: opcode=0xe4 (vendor) [ 926.371280][ C1] sd 0:0:1:0: tag#5260 CDB[00]: e4 9d 02 8c 07 15 e2 0b 51 04 22 69 36 00 59 73 [ 926.380443][ C1] sd 0:0:1:0: tag#5260 CDB[10]: 91 8f e1 59 f8 6d 8e 03 0a cf a7 1b 16 85 31 e9 [ 926.389484][ C1] sd 0:0:1:0: tag#5260 CDB[20]: 7c 8c 98 e7 98 09 7a 3c 82 29 ad 24 d9 cb [ 926.394695][T13686] EXT4-fs (loop4): Invalid log block size: 43778 [ 926.416407][T13678] EXT4-fs (loop3): bad geometry: block count 523 exceeds size of device (512 blocks) [ 926.429993][T13699] loop1: detected capacity change from 0 to 4 [ 926.437047][T13679] EXT4-fs (loop2): bad geometry: block count 767 exceeds size of device (512 blocks) 02:21:41 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f0000000000000002b1000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:41 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000c02000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 926.463235][T13699] EXT4-fs (loop1): #clusters per group too big: 32768 [ 926.509271][T13699] loop1: detected capacity change from 0 to 4 [ 926.514851][T13722] loop4: detected capacity change from 0 to 4096 [ 926.526278][T13699] EXT4-fs (loop1): #clusters per group too big: 32768 [ 926.526754][T13722] EXT4-fs (loop4): Invalid log block size: 45314 [ 926.541097][T13727] loop3: detected capacity change from 0 to 4096 [ 926.552466][T13727] EXT4-fs (loop3): bad geometry: block count 524 exceeds size of device (512 blocks) 02:21:42 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x97, 0x0, 0x7, 0x0, 0x0, 0x28300, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x418, 0x0, @perf_config_ext={0x4118, 0x100}, 0x800, 0x7, 0x0, 0x8, 0x0, 0xed7, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x3b, 0x5, 0x0, 0x0, 0xcc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xcb8, 0x80}, 0x480, 0xffffffffffffffe0, 0x0, 0x0, 0x20, 0x0, 0x173, 0x0, 0x4bf, 0x0, 0xe408}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000f00)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000004c0)={0x53, 0xffffffffffffffff, 0x2e, 0x6, @scatter={0x2, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000d40)=""/136, 0x88}, {&(0x7f0000000e00)=""/208, 0xd0}]}, &(0x7f00000001c0)="e49d028c0715e20b5104226936005973918fe159f86d8e030acfa71b168531e97c8c98e798097a3c8229ad24d9cb", &(0x7f0000000540)=""/101, 0x15, 0x10000, 0x2, &(0x7f0000000340)}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x10\'\\@$&\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055300)={0x8f7, [{0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r5}, {}, {}, {r3}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {r3}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, r4}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x0, "0d4abfd4b32220"}) r184 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000840)={0x0, 0xfaef, 0xffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r184, 0x0) r185 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r185, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r185, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0xfffffffffffffeff, 0x1) sendto$inet(r185, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b300)={0xffff, [{r72, r60}, {}, {r110}, {r160}, {}, {r171}, {}, {}, {r103}, {}, {r134}, {}, {0x0, r52}, {0x0, r40}, {0x0, r181}, {r126, r14}, {r159, r32}, {r176, r58}, {}, {r13, r175}, {0x0, r179}, {r11}, {r19, r24}, {r28}, {r128}, {0x0, r33}, {}, {}, {}, {r104, r49}, {}, {}, {r47}, {r116, r157}, {0x0, r9}, {r56}, {0x0, r38}, {0x0, r37}, {}, {}, {0x0, r173}, {}, {r104, r32}, {r125}, {r107, r142}, {}, {}, {}, {0x0, r61}, {}, {}, {0x0, r117}, {r116}, {r66}, {r89, r99}, {}, {}, {}, {r167}, {r34}, {r130, r151}, {}, {}, {r72}, {0x0, r96}, {}, {}, {0x0, r80}, {r78, r136}, {r41}, {0x0, r80}, {}, {0x0, r85}, {r55}, {0x0, r50}, {r25, r169}, {r6}, {r62}, {r178, r12}, {r174}, {0x0, r22}, {r17, r173}, {r46}, {}, {r138, r75}, {r36, r31}, {}, {}, {r139, r100}, {0x0, r92}, {r108}, {r69}, {r180}, {}, {}, {r160}, {r172}, {}, {0x0, r112}, {r101, r7}, {0x0, r143}, {r91}, {}, {r93}, {}, {r95}, {0x0, r114}, {0x0, r133}, {r115}, {}, {r23}, {0x0, r68}, {r51}, {0x0, r90}, {0x0, r109}, {r57, r166}, {0x0, r155}, {r15, r29}, {}, {r97}, {r101, r120}, {}, {r83, r117}, {}, {0x0, r102}, {}, {r180}, {}, {}, {}, {r71}, {r154, r148}, {}, {r153, r65}, {}, {r158, r79}, {0x0, r183}, {r137, r54}, {r42}, {}, {}, {0x0, r48}, {r39}, {}, {0x0, r18}, {r137}, {r164}, {r145}, {0x0, r142}, {}, {r70, r122}, {r20, r105}, {r119}, {r182}, {r113, r45}, {}, {}, {0x0, r100}, {r72}, {}, {0x0, r127}, {0x0, r81}, {r140}, {}, {r170, r84}, {r97}, {}, {r10, r38}, {r176}, {}, {r47, r106}, {0x0, r142}, {r113}, {}, {r144}, {r69}, {r57}, {0x0, r161}, {0x0, r35}, {r87}, {0x0, r53}, {}, {r118, r106}, {0x0, r76}, {r123, r149}, {r121}, {}, {}, {r8}, {}, {}, {}, {}, {}, {r150, r129}, {}, {r180, r35}, {r94, r90}, {r82}, {r72}, {r16}, {}, {r134, r44}, {0x0, r88}, {r123}, {r128}, {r98}, {}, {}, {0x0, r163}, {0x0, r27}, {r156}, {0x0, r63}, {0x0, r43}, {0x0, r59}, {0x0, r43}, {0x0, r27}, {r121, r67}, {}, {r86, r43}, {0x0, r165}, {r34}, {0x0, r73}, {r30, r147}, {}, {}, {}, {}, {0x0, r146}, {r56, r31}, {r115}, {r144, r21}, {r64}, {0x0, r141}, {}, {r135}, {}, {r132, r84}, {0x0, r163}, {0x0, r111}, {0x0, r124}, {0x0, r100}, {}, {0x0, r177}, {r16}, {r178, r152}, {}, {r62, r33}, {r162, r168}, {}, {}, {r26}, {0x0, r74}, {r56, r131}, {r77}], 0x0, "e8da0117d3c471"}) 02:21:42 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000052a01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20ffffefff02000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:42 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f0000000000000002fe000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004c02000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:42 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000d02000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:42 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000003f01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 927.178042][T13752] loop1: detected capacity change from 0 to 4 [ 927.182281][T13751] loop4: detected capacity change from 0 to 4096 [ 927.184466][T13753] loop3: detected capacity change from 0 to 4096 [ 927.195035][T13751] EXT4-fs (loop4): Invalid log block size: 65026 [ 927.206718][T13750] loop2: detected capacity change from 0 to 4096 [ 927.218475][ C0] sd 0:0:1:0: tag#5261 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 927.228425][ C0] sd 0:0:1:0: tag#5261 CDB: opcode=0xe5 (vendor) [ 927.234793][ C0] sd 0:0:1:0: tag#5261 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 927.237215][T13752] EXT4-fs (loop1): #clusters per group too big: 32768 [ 927.243862][ C0] sd 0:0:1:0: tag#5261 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 927.259658][ C0] sd 0:0:1:0: tag#5261 CDB[20]: ba [ 927.276837][ C0] sd 0:0:1:0: tag#5262 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 927.281906][T13753] EXT4-fs (loop3): bad geometry: block count 525 exceeds size of device (512 blocks) [ 927.287239][ C0] sd 0:0:1:0: tag#5262 CDB: opcode=0xe4 (vendor) [ 927.301590][T13750] EXT4-fs (loop2): bad geometry: block count 767 exceeds size of device (512 blocks) [ 927.303107][ C0] sd 0:0:1:0: tag#5262 CDB[00]: e4 9d 02 8c 07 15 e2 0b 51 04 22 69 36 00 59 73 02:21:42 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000004001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:42 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000008004001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 927.321617][ C0] sd 0:0:1:0: tag#5262 CDB[10]: 91 8f e1 59 f8 6d 8e 03 0a cf a7 1b 16 85 31 e9 [ 927.330675][ C0] sd 0:0:1:0: tag#5262 CDB[20]: 7c 8c 98 e7 98 09 7a 3c 82 29 ad 24 d9 cb 02:21:42 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000048001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:42 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000e02000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 927.377350][T13752] loop1: detected capacity change from 0 to 4 [ 927.385928][T13750] loop2: detected capacity change from 0 to 4096 02:21:42 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f00000000000000022a010006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 927.419610][T13750] EXT4-fs (loop2): bad geometry: block count 767 exceeds size of device (512 blocks) [ 927.437299][T13752] EXT4-fs (loop1): #clusters per group too big: 32768 [ 927.479876][T13800] loop4: detected capacity change from 0 to 4096 [ 927.483974][T13799] loop3: detected capacity change from 0 to 4096 [ 927.491743][T13800] EXT4-fs (loop4): Invalid log block size: 76290 [ 927.503258][T13799] EXT4-fs (loop3): bad geometry: block count 526 exceeds size of device (512 blocks) 02:21:43 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000fffffff601000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20fffffbff02000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006002000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:43 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000f02000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:43 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x97, 0x0, 0x7, 0x0, 0x0, 0x28300, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x418, 0x0, @perf_config_ext={0x4118, 0x100}, 0x800, 0x7, 0x0, 0x8, 0x0, 0xed7, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x3b, 0x5, 0x0, 0x0, 0xcc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xcb8, 0x80}, 0x480, 0xffffffffffffffe0, 0x0, 0x0, 0x20, 0x0, 0x173, 0x0, 0x4bf, 0x0, 0xe408}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000f00)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000004c0)={0x53, 0xffffffffffffffff, 0x2e, 0x6, @scatter={0x2, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000d40)=""/136, 0x88}, {&(0x7f0000000e00)=""/208, 0xd0}]}, &(0x7f00000001c0)="e49d028c0715e20b5104226936005973918fe159f86d8e030acfa71b168531e97c8c98e798097a3c8229ad24d9cb", &(0x7f0000000540)=""/101, 0x15, 0x10000, 0x2, &(0x7f0000000340)}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x10\'\\@$&\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055300)={0x8f7, [{0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r5}, {}, {}, {r3}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {r3}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, r4}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x0, "0d4abfd4b32220"}) r184 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000840)={0x0, 0xfaef, 0xffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r184, 0x0) r185 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r185, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r185, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0xfffffffffffffeff, 0x1) sendto$inet(r185, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b300)={0xffff, [{r72, r60}, {}, {r109}, {r160}, {}, {r171}, {}, {}, {r103}, {}, {r134}, {}, {0x0, r52}, {0x0, r40}, {0x0, r181}, {r126, r14}, {r159, r32}, {r176, r58}, {}, {r13, r175}, {0x0, r179}, {r11}, {r19, r24}, {r28}, {r128}, {0x0, r33}, {}, {}, {}, {r104, r49}, {}, {}, {r47}, {r115, r157}, {0x0, r9}, {r56}, {0x0, r38}, {0x0, r37}, {}, {}, {0x0, r173}, {}, {r104, r32}, {r125}, {0x0, r142}, {0x0, r123}, {}, {}, {0x0, r61}, {}, {}, {0x0, r116}, {r115}, {r66}, {r89, r99}, {}, {}, {}, {r167}, {r34}, {r130, r151}, {}, {}, {r72}, {0x0, r96}, {}, {}, {0x0, r80}, {r78, r136}, {r41}, {0x0, r80}, {}, {0x0, r85}, {r55}, {0x0, r50}, {r25, r169}, {r6}, {r62}, {r178, r12}, {r174}, {0x0, r22}, {r17, r173}, {r46}, {}, {r138, r75}, {r36, r31}, {}, {}, {r139, r100}, {0x0, r92}, {r107}, {r69}, {r180}, {}, {}, {r160}, {r172}, {}, {0x0, r111}, {r101, r7}, {0x0, r143}, {r91}, {}, {r93}, {}, {r95}, {0x0, r113}, {0x0, r133}, {r114}, {}, {r23}, {0x0, r68}, {r51}, {0x0, r90}, {0x0, r108}, {r57, r166}, {0x0, r155}, {r15, r29}, {}, {r97}, {r101, r119}, {}, {r83, r116}, {}, {0x0, r102}, {}, {r180}, {}, {}, {}, {r71}, {r154, r148}, {}, {r153, r65}, {}, {r158, r79}, {0x0, r183}, {r137, r54}, {r42}, {}, {}, {0x0, r48}, {r39}, {}, {0x0, r18}, {r137}, {r164}, {r145}, {0x0, r142}, {}, {r70, r121}, {r20, r105}, {r118}, {r182}, {r112, r45}, {}, {}, {0x0, r100}, {r72}, {}, {0x0, r127}, {0x0, r81}, {r140}, {}, {r170, r84}, {r97}, {}, {r10, r38}, {r176}, {}, {r47, r106}, {0x0, r142}, {r112}, {}, {r144}, {r69}, {r57}, {0x0, r161}, {0x0, r35}, {r87}, {0x0, r53}, {}, {r117, r106}, {0x0, r76}, {r122, r149}, {r120}, {}, {}, {r8}, {}, {}, {}, {}, {}, {r150, r129}, {}, {r180, r35}, {r94, r90}, {r82}, {r72}, {r16}, {}, {r134, r44}, {0x0, r88}, {r122}, {r128}, {r98}, {}, {}, {0x0, r163}, {0x0, r27}, {r156}, {0x0, r63}, {0x0, r43}, {0x0, r59}, {0x0, r43}, {0x0, r27}, {r120, r67}, {}, {r86, r43}, {0x0, r165}, {r34}, {0x0, r73}, {r30, r147}, {}, {}, {}, {}, {0x0, r146}, {r56, r31}, {r114}, {r144, r21}, {r64}, {0x0, r141}, {}, {r135}, {}, {r132, r84}, {0x0, r163}, {0x0, r110}, {0x0, r124}, {0x0, r100}, {}, {0x0, r177}, {r16}, {r178, r152}, {}, {r62, r33}, {r162, r168}, {}, {}, {r26}, {0x0, r74}, {r56, r131}, {r77}], 0x0, "e8da0117d3c471"}) 02:21:43 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f0000000000000002f6010006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 928.088723][ C1] sd 0:0:1:0: tag#5263 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 928.090527][T13829] loop4: detected capacity change from 0 to 4096 [ 928.098581][ C1] sd 0:0:1:0: tag#5263 CDB: opcode=0xe5 (vendor) [ 928.111245][ C1] sd 0:0:1:0: tag#5263 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 928.120473][ C1] sd 0:0:1:0: tag#5263 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 928.129647][ C1] sd 0:0:1:0: tag#5263 CDB[20]: ba [ 928.134906][T13834] loop3: detected capacity change from 0 to 4096 [ 928.136031][T13826] loop1: detected capacity change from 0 to 4 [ 928.147926][T13830] loop2: detected capacity change from 0 to 4096 [ 928.159408][T13830] EXT4-fs (loop2): bad geometry: block count 767 exceeds size of device (512 blocks) [ 928.174053][ C1] sd 0:0:1:0: tag#5264 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s 02:21:43 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000fffffffe01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 928.183926][ C1] sd 0:0:1:0: tag#5264 CDB: opcode=0xe4 (vendor) [ 928.190268][ C1] sd 0:0:1:0: tag#5264 CDB[00]: e4 9d 02 8c 07 15 e2 0b 51 04 22 69 36 00 59 73 [ 928.199326][ C1] sd 0:0:1:0: tag#5264 CDB[10]: 91 8f e1 59 f8 6d 8e 03 0a cf a7 1b 16 85 31 e9 [ 928.199677][T13834] EXT4-fs (loop3): bad geometry: block count 527 exceeds size of device (512 blocks) [ 928.208397][ C1] sd 0:0:1:0: tag#5264 CDB[20]: 7c 8c 98 e7 98 09 7a 3c 82 29 ad 24 d9 cb [ 928.226494][T13829] EXT4-fs (loop4): Invalid log block size: 128514 02:21:43 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655ffffffffffffffffe01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 928.226639][T13826] EXT4-fs (loop1): #clusters per group too big: 32768 [ 928.256773][T13830] loop2: detected capacity change from 0 to 4096 [ 928.270805][T13830] EXT4-fs (loop2): bad geometry: block count 767 exceeds size of device (512 blocks) 02:21:43 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20ffffff0f02000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:43 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000204020006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20ffefffff02000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 928.292608][T13826] loop1: detected capacity change from 0 to 4 [ 928.314282][T13826] EXT4-fs (loop1): #clusters per group too big: 32768 02:21:43 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000ffffffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006802000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 928.359595][T13873] loop2: detected capacity change from 0 to 4096 [ 928.371690][T13870] loop3: detected capacity change from 0 to 4096 [ 928.381853][T13871] loop4: detected capacity change from 0 to 4096 [ 928.389923][T13873] EXT4-fs (loop2): bad geometry: block count 767 exceeds size of device (512 blocks) 02:21:43 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0007ffffffffffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 928.432252][T13871] EXT4-fs (loop4): Invalid log block size: 132098 [ 928.442225][T13870] EXT4-fs (loop3): bad geometry: block count 527 exceeds size of device (512 blocks) [ 928.456858][T13873] loop2: detected capacity change from 0 to 4096 [ 928.471098][T13892] loop1: detected capacity change from 0 to 4 02:21:43 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000001002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:43 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000208020006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:43 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x97, 0x0, 0x7, 0x0, 0x0, 0x28300, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x418, 0x0, @perf_config_ext={0x4118, 0x100}, 0x800, 0x7, 0x0, 0x8, 0x0, 0xed7, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x3b, 0x5, 0x0, 0x0, 0xcc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xcb8, 0x80}, 0x480, 0xffffffffffffffe0, 0x0, 0x0, 0x20, 0x0, 0x173, 0x0, 0x4bf, 0x0, 0xe408}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000f00)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000004c0)={0x53, 0xffffffffffffffff, 0x2e, 0x6, @scatter={0x2, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000d40)=""/136, 0x88}, {&(0x7f0000000e00)=""/208, 0xd0}]}, &(0x7f00000001c0)="e49d028c0715e20b5104226936005973918fe159f86d8e030acfa71b168531e97c8c98e798097a3c8229ad24d9cb", &(0x7f0000000540)=""/101, 0x15, 0x10000, 0x2, &(0x7f0000000340)}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x10\'\\@$&\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055300)={0x8f7, [{0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r5}, {}, {}, {r3}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {r3}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, r4}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x0, "0d4abfd4b32220"}) r184 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000840)={0x0, 0xfaef, 0xffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r184, 0x0) r185 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r185, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r185, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0xfffffffffffffeff, 0x1) sendto$inet(r185, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b300)={0xffff, [{r72, r60}, {}, {r109}, {r160}, {}, {r171}, {}, {}, {r103}, {}, {r134}, {}, {0x0, r52}, {0x0, r40}, {0x0, r181}, {r126, r14}, {r159, r32}, {r176, r58}, {}, {r13, r175}, {0x0, r179}, {r11}, {r19, r24}, {r28}, {r128}, {0x0, r33}, {}, {}, {}, {r104, r49}, {}, {}, {r47}, {r115, r157}, {0x0, r9}, {r56}, {0x0, r38}, {0x0, r37}, {}, {}, {0x0, r173}, {}, {r104, r32}, {r125}, {0x0, r142}, {0x0, r123}, {}, {}, {0x0, r61}, {}, {}, {0x0, r116}, {r115}, {r66}, {r89, r99}, {}, {}, {}, {r167}, {r34}, {r130, r151}, {}, {}, {r72}, {0x0, r96}, {}, {}, {0x0, r80}, {r78, r136}, {r41}, {0x0, r80}, {}, {0x0, r85}, {r55}, {0x0, r50}, {r25, r169}, {r6}, {r62}, {r178, r12}, {r174}, {0x0, r22}, {r17, r173}, {r46}, {}, {r138, r75}, {r36, r31}, {}, {}, {r139, r100}, {0x0, r92}, {r107}, {r69}, {r180}, {}, {}, {r160}, {r172}, {}, {0x0, r111}, {r101, r7}, {0x0, r143}, {r91}, {}, {r93}, {}, {r95}, {0x0, r113}, {0x0, r133}, {r114}, {}, {r23}, {0x0, r68}, {r51}, {0x0, r90}, {0x0, r108}, {r57, r166}, {0x0, r155}, {r15, r29}, {}, {r97}, {r101, r119}, {}, {r83, r116}, {}, {0x0, r102}, {}, {r180}, {}, {}, {}, {r71}, {r154, r148}, {}, {r153, r65}, {}, {r158, r79}, {0x0, r183}, {r137, r54}, {r42}, {}, {}, {0x0, r48}, {r39}, {}, {0x0, r18}, {r137}, {r164}, {r145}, {0x0, r142}, {}, {r70, r121}, {r20, r105}, {r118}, {r182}, {r112, r45}, {}, {}, {0x0, r100}, {r72}, {}, {0x0, r127}, {0x0, r81}, {r140}, {}, {r170, r84}, {r97}, {}, {r10, r38}, {r176}, {}, {r47, r106}, {0x0, r142}, {r112}, {}, {r144}, {r69}, {r57}, {0x0, r161}, {0x0, r35}, {r87}, {0x0, r53}, {}, {r117, r106}, {0x0, r76}, {r122, r149}, {r120}, {}, {}, {r8}, {}, {}, {}, {}, {}, {r150, r129}, {}, {r180, r35}, {r94, r90}, {r82}, {r72}, {r16}, {}, {r134, r44}, {0x0, r88}, {r122}, {r128}, {r98}, {}, {}, {0x0, r163}, {0x0, r27}, {r156}, {0x0, r63}, {0x0, r43}, {0x0, r59}, {0x0, r43}, {0x0, r27}, {r120, r67}, {}, {r86, r43}, {0x0, r165}, {r34}, {0x0, r73}, {r30, r147}, {}, {}, {}, {}, {0x0, r146}, {r56, r31}, {r114}, {r144, r21}, {r64}, {0x0, r141}, {}, {r135}, {}, {r132, r84}, {0x0, r163}, {0x0, r110}, {0x0, r124}, {0x0, r100}, {}, {0x0, r177}, {r16}, {r178, r152}, {}, {r62, r33}, {r162, r168}, {}, {}, {r26}, {0x0, r74}, {r56, r131}, {r77}], 0x0, "e8da0117d3c471"}) [ 928.478365][T13873] EXT4-fs (loop2): bad geometry: block count 767 exceeds size of device (512 blocks) [ 928.496055][T13892] EXT4-fs (loop1): #clusters per group too big: 32768 02:21:43 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655ffeffffffffffffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20fffbffff02000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 928.537190][T13892] loop1: detected capacity change from 0 to 4 [ 928.562864][T13892] EXT4-fs (loop1): #clusters per group too big: 32768 [ 928.579343][T13914] loop3: detected capacity change from 0 to 4096 [ 928.587355][ C0] sd 0:0:1:0: tag#5265 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 928.597204][ C0] sd 0:0:1:0: tag#5265 CDB: opcode=0xe5 (vendor) [ 928.603541][ C0] sd 0:0:1:0: tag#5265 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 928.612558][ C0] sd 0:0:1:0: tag#5265 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 928.613987][T13920] loop4: detected capacity change from 0 to 4096 [ 928.621595][ C0] sd 0:0:1:0: tag#5265 CDB[20]: ba [ 928.644839][T13922] loop2: detected capacity change from 0 to 4096 [ 928.645281][T13914] EXT4-fs (loop3): bad geometry: block count 528 exceeds size of device (512 blocks) [ 928.662208][ C0] sd 0:0:1:0: tag#5266 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 928.672144][ C0] sd 0:0:1:0: tag#5266 CDB: opcode=0xe4 (vendor) [ 928.678498][ C0] sd 0:0:1:0: tag#5266 CDB[00]: e4 9d 02 8c 07 15 e2 0b 51 04 22 69 36 00 59 73 02:21:44 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655fffffffffffffffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 928.687587][ C0] sd 0:0:1:0: tag#5266 CDB[10]: 91 8f e1 59 f8 6d 8e 03 0a cf a7 1b 16 85 31 e9 [ 928.696629][ C0] sd 0:0:1:0: tag#5266 CDB[20]: 7c 8c 98 e7 98 09 7a 3c 82 29 ad 24 d9 cb [ 928.729004][T13920] EXT4-fs (loop4): Invalid log block size: 133122 02:21:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006c02000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:44 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000200000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:44 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f0000000000000002a4020006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 928.746829][T13922] EXT4-fs (loop2): bad geometry: block count 767 exceeds size of device (512 blocks) 02:21:44 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000001102000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 928.809924][T13922] loop2: detected capacity change from 0 to 4096 [ 928.813752][T13948] loop1: detected capacity change from 0 to 4 [ 928.833272][T13922] EXT4-fs (loop2): bad geometry: block count 767 exceeds size of device (512 blocks) [ 928.846033][T13948] EXT4-fs (loop1): #clusters per group too big: 32768 [ 928.853690][T13955] loop3: detected capacity change from 0 to 4096 02:21:44 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000300000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20f9fdffff02000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 928.871442][T13954] loop4: detected capacity change from 0 to 4096 [ 928.888035][T13955] EXT4-fs (loop3): bad geometry: block count 529 exceeds size of device (512 blocks) [ 928.900643][T13954] EXT4-fs (loop4): Invalid log block size: 173058 02:21:44 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000001202000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000007402000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 928.918356][T13948] loop1: detected capacity change from 0 to 4 [ 928.931173][T13948] EXT4-fs (loop1): #clusters per group too big: 32768 [ 928.951116][T13971] loop2: detected capacity change from 0 to 4096 [ 928.970656][T13971] EXT4-fs (loop2): bad geometry: block count 767 exceeds size of device (512 blocks) [ 929.000673][T13981] loop3: detected capacity change from 0 to 4096 [ 929.020188][T13982] loop1: detected capacity change from 0 to 4 [ 929.021726][T13981] EXT4-fs (loop3): bad geometry: block count 530 exceeds size of device (512 blocks) [ 929.045303][T13982] EXT4-fs (loop1): #clusters per group too big: 32768 [ 929.081373][T13982] loop1: detected capacity change from 0 to 4 [ 929.087794][T13982] EXT4-fs (loop1): #clusters per group too big: 32768 02:21:44 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x97, 0x0, 0x7, 0x0, 0x0, 0x28300, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x418, 0x0, @perf_config_ext={0x4118, 0x100}, 0x800, 0x7, 0x0, 0x8, 0x0, 0xed7, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x3b, 0x5, 0x0, 0x0, 0xcc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xcb8, 0x80}, 0x480, 0xffffffffffffffe0, 0x0, 0x0, 0x20, 0x0, 0x173, 0x0, 0x4bf, 0x0, 0xe408}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000f00)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000004c0)={0x53, 0xffffffffffffffff, 0x2e, 0x6, @scatter={0x2, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000d40)=""/136, 0x88}, {&(0x7f0000000e00)=""/208, 0xd0}]}, &(0x7f00000001c0)="e49d028c0715e20b5104226936005973918fe159f86d8e030acfa71b168531e97c8c98e798097a3c8229ad24d9cb", &(0x7f0000000540)=""/101, 0x15, 0x10000, 0x2, &(0x7f0000000340)}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x10\'\\@$&\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055300)={0x8f7, [{0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r5}, {}, {}, {r3}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {r3}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, r4}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x0, "0d4abfd4b32220"}) r184 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000840)={0x0, 0xfaef, 0xffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r184, 0x0) r185 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r185, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r185, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0xfffffffffffffeff, 0x1) sendto$inet(r185, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b300)={0xffff, [{r72, r60}, {}, {r109}, {r160}, {}, {r171}, {}, {}, {r103}, {}, {r134}, {}, {0x0, r52}, {0x0, r40}, {0x0, r181}, {r126, r14}, {r159, r32}, {r176, r58}, {}, {r13, r175}, {0x0, r179}, {r11}, {r19, r24}, {r28}, {r128}, {0x0, r33}, {}, {}, {}, {r104, r49}, {}, {}, {r47}, {r115, r157}, {0x0, r9}, {r56}, {0x0, r38}, {0x0, r37}, {}, {}, {0x0, r173}, {}, {r104, r32}, {r125}, {0x0, r142}, {0x0, r123}, {}, {}, {0x0, r61}, {}, {}, {0x0, r116}, {r115}, {r66}, {r89, r99}, {}, {}, {}, {r167}, {r34}, {r130, r151}, {}, {}, {r72}, {0x0, r96}, {}, {}, {0x0, r80}, {r78, r136}, {r41}, {0x0, r80}, {}, {0x0, r85}, {r55}, {0x0, r50}, {r25, r169}, {r6}, {r62}, {r178, r12}, {r174}, {0x0, r22}, {r17, r173}, {r46}, {}, {r138, r75}, {r36, r31}, {}, {}, {r139, r100}, {0x0, r92}, {r107}, {r69}, {r180}, {}, {}, {r160}, {r172}, {}, {0x0, r111}, {r101, r7}, {0x0, r143}, {r91}, {}, {r93}, {}, {r95}, {0x0, r113}, {0x0, r133}, {r114}, {}, {r23}, {0x0, r68}, {r51}, {0x0, r90}, {0x0, r108}, {r57, r166}, {0x0, r155}, {r15, r29}, {}, {r97}, {r101, r119}, {}, {r83, r116}, {}, {0x0, r102}, {}, {r180}, {}, {}, {}, {r71}, {r154, r148}, {}, {r153, r65}, {}, {r158, r79}, {0x0, r183}, {r137, r54}, {r42}, {}, {}, {0x0, r48}, {r39}, {}, {0x0, r18}, {r137}, {r164}, {r145}, {0x0, r142}, {}, {r70, r121}, {r20, r105}, {r118}, {r182}, {r112, r45}, {}, {}, {0x0, r100}, {r72}, {}, {0x0, r127}, {0x0, r81}, {r140}, {}, {r170, r84}, {r97}, {}, {r10, r38}, {r176}, {}, {r47, r106}, {0x0, r142}, {r112}, {}, {r144}, {r69}, {r57}, {0x0, r161}, {0x0, r35}, {r87}, {0x0, r53}, {}, {r117, r106}, {0x0, r76}, {r122, r149}, {r120}, {}, {}, {r8}, {}, {}, {}, {}, {}, {r150, r129}, {}, {r180, r35}, {r94, r90}, {r82}, {r72}, {r16}, {}, {r134, r44}, {0x0, r88}, {r122}, {r128}, {r98}, {}, {}, {0x0, r163}, {0x0, r27}, {r156}, {0x0, r63}, {0x0, r43}, {0x0, r59}, {0x0, r43}, {0x0, r27}, {r120, r67}, {}, {r86, r43}, {0x0, r165}, {r34}, {0x0, r73}, {r30, r147}, {}, {}, {}, {}, {0x0, r146}, {r56, r31}, {r114}, {r144, r21}, {r64}, {0x0, r141}, {}, {r135}, {}, {r132, r84}, {0x0, r163}, {0x0, r110}, {0x0, r124}, {0x0, r100}, {}, {0x0, r177}, {r16}, {r178, r152}, {}, {r62, r33}, {r162, r168}, {}, {}, {r26}, {0x0, r74}, {r56, r131}, {r77}], 0x0, "e8da0117d3c471"}) 02:21:44 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200030006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:44 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000400000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20fdfdffff02000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:44 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000001f02000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000007a02000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 929.475532][T14011] loop4: detected capacity change from 0 to 4096 [ 929.484847][T14015] loop3: detected capacity change from 0 to 4096 [ 929.491402][ C0] sd 0:0:1:0: tag#5267 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 929.492173][T14016] loop1: detected capacity change from 0 to 4 [ 929.501243][ C0] sd 0:0:1:0: tag#5267 CDB: opcode=0xe5 (vendor) [ 929.513724][ C0] sd 0:0:1:0: tag#5267 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c 02:21:44 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000500000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 929.517314][T14016] EXT4-fs (loop1): #clusters per group too big: 32768 [ 929.522848][ C0] sd 0:0:1:0: tag#5267 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 929.538714][ C0] sd 0:0:1:0: tag#5267 CDB[20]: ba [ 929.541248][T14019] loop2: detected capacity change from 0 to 4096 [ 929.553411][T14015] EXT4-fs (loop3): bad geometry: block count 543 exceeds size of device (512 blocks) [ 929.563367][ C1] sd 0:0:1:0: tag#5268 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 929.573294][ C1] sd 0:0:1:0: tag#5268 CDB: opcode=0xe4 (vendor) [ 929.579649][ C1] sd 0:0:1:0: tag#5268 CDB[00]: e4 9d 02 8c 07 15 e2 0b 51 04 22 69 36 00 59 73 [ 929.588907][ C1] sd 0:0:1:0: tag#5268 CDB[10]: 91 8f e1 59 f8 6d 8e 03 0a cf a7 1b 16 85 31 e9 [ 929.597957][ C1] sd 0:0:1:0: tag#5268 CDB[20]: 7c 8c 98 e7 98 09 7a 3c 82 29 ad 24 d9 cb [ 929.600117][T14019] EXT4-fs (loop2): bad geometry: block count 767 exceeds size of device (512 blocks) 02:21:45 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000600000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:45 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000002002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 929.623155][T14011] EXT4-fs (loop4): Invalid log block size: 196610 [ 929.643358][T14016] loop1: detected capacity change from 0 to 4 [ 929.662063][T14019] loop2: detected capacity change from 0 to 4096 02:21:45 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000700000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:45 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f00000000000000024e030006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:45 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000102002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 929.670635][T14045] loop3: detected capacity change from 0 to 4096 [ 929.680523][T14045] EXT4-fs (loop3): bad geometry: block count 544 exceeds size of device (512 blocks) [ 929.682148][T14016] EXT4-fs (loop1): #clusters per group too big: 32768 [ 929.706032][T14019] EXT4-fs (loop2): bad geometry: block count 767 exceeds size of device (512 blocks) [ 929.761254][T14060] loop4: detected capacity change from 0 to 4096 [ 929.778710][T14065] loop3: detected capacity change from 0 to 4096 [ 929.787477][T14060] EXT4-fs (loop4): Invalid log block size: 216578 [ 929.804814][T14065] EXT4-fs (loop3): bad geometry: block count 544 exceeds size of device (512 blocks) 02:21:45 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x97, 0x0, 0x7, 0x0, 0x0, 0x28300, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x418, 0x0, @perf_config_ext={0x4118, 0x100}, 0x800, 0x7, 0x0, 0x8, 0x0, 0xed7, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x3b, 0x5, 0x0, 0x0, 0xcc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xcb8, 0x80}, 0x480, 0xffffffffffffffe0, 0x0, 0x0, 0x20, 0x0, 0x173, 0x0, 0x4bf, 0x0, 0xe408}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000f00)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000004c0)={0x53, 0xffffffffffffffff, 0x2e, 0x6, @scatter={0x2, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000d40)=""/136, 0x88}, {&(0x7f0000000e00)=""/208, 0xd0}]}, &(0x7f00000001c0)="e49d028c0715e20b5104226936005973918fe159f86d8e030acfa71b168531e97c8c98e798097a3c8229ad24d9cb", &(0x7f0000000540)=""/101, 0x15, 0x10000, 0x2, &(0x7f0000000340)}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x10\'\\@$&\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055300)={0x8f7, [{0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r5}, {}, {}, {r3}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {r3}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, r4}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x0, "0d4abfd4b32220"}) r185 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000840)={0x0, 0xfaef, 0xffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r185, 0x0) r186 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r186, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r186, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0xfffffffffffffeff, 0x1) sendto$inet(r186, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b300)={0xffff, [{r72, r60}, {}, {r110}, {r161}, {}, {r172}, {}, {}, {r103}, {}, {r135}, {}, {0x0, r52}, {0x0, r40}, {0x0, r182}, {r127, r14}, {r160, r32}, {r177, r58}, {}, {r13, r176}, {0x0, r180}, {r11}, {r19, r24}, {r28}, {r129}, {0x0, r33}, {}, {}, {}, {r104, r49}, {}, {}, {r47}, {r116, r158}, {0x0, r9}, {r56}, {0x0, r38}, {0x0, r37}, {}, {}, {0x0, r174}, {}, {r104, r32}, {r126}, {r107}, {0x0, r124}, {}, {}, {0x0, r61}, {}, {}, {0x0, r117}, {r116}, {r66}, {r89, r99}, {}, {}, {}, {r168}, {r34}, {r131, r152}, {}, {}, {r72}, {0x0, r96}, {}, {}, {0x0, r80}, {r78, r137}, {r41}, {0x0, r80}, {}, {0x0, r85}, {r55}, {0x0, r50}, {r25, r170}, {r6}, {r62}, {r179, r12}, {r175}, {0x0, r22}, {r17, r174}, {r46}, {}, {r139, r75}, {r36, r31}, {}, {}, {r140, r100}, {0x0, r92}, {r108}, {r69}, {r181}, {}, {}, {r161}, {r173}, {}, {0x0, r112}, {r101, r7}, {0x0, r144}, {r91}, {}, {r93}, {}, {r95}, {0x0, r114}, {0x0, r134}, {r115}, {}, {r23}, {0x0, r68}, {r51}, {0x0, r90}, {0x0, r109}, {r57, r167}, {0x0, r156}, {r15, r29}, {}, {r97}, {r101, r120}, {}, {r83, r117}, {}, {0x0, r102}, {}, {r181}, {}, {}, {}, {r71}, {r155, r149}, {}, {r154, r65}, {}, {r159, r79}, {0x0, r184}, {r138, r54}, {r42}, {}, {}, {0x0, r48}, {r39}, {}, {0x0, r18}, {r138}, {r165}, {r146}, {0x0, r143}, {}, {r70, r122}, {r20, r105}, {r119}, {r183}, {r113, r45}, {}, {}, {0x0, r100}, {r72}, {}, {0x0, r128}, {0x0, r81}, {r141}, {}, {r171, r84}, {r97}, {}, {r10, r38}, {r177}, {}, {r47, r106}, {0x0, r143}, {r113}, {}, {r145}, {r69}, {r57}, {0x0, r162}, {0x0, r35}, {r87}, {0x0, r53}, {}, {r118, r106}, {0x0, r76}, {r123, r150}, {r121}, {}, {}, {r8}, {}, {}, {}, {}, {}, {r151, r130}, {}, {r181, r35}, {r94, r90}, {r82}, {r72}, {r16}, {}, {r135, r44}, {0x0, r88}, {r123}, {r129}, {r98}, {}, {}, {0x0, r164}, {0x0, r27}, {r157}, {0x0, r63}, {0x0, r43}, {0x0, r59}, {0x0, r43}, {0x0, r27}, {r121, r67}, {}, {r86, r43}, {0x0, r166}, {r34}, {0x0, r73}, {r30, r148}, {}, {}, {}, {}, {0x0, r147}, {r56, r31}, {r115}, {r145, r21}, {r64}, {0x0, r142}, {}, {r136}, {}, {r133, r84}, {0x0, r164}, {0x0, r111}, {0x0, r125}, {0x0, r100}, {}, {0x0, r178}, {r16}, {r179, r153}, {}, {r62, r33}, {r163, r169}, {}, {}, {r26}, {0x0, r74}, {r56, r132}, {r77}], 0x0, "e8da0117d3c471"}) 02:21:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000037c02000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="207fffffff02000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:45 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000254030006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:45 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000800000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:45 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000002202000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 930.341311][T14081] loop1: detected capacity change from 0 to 4 [ 930.352750][T14088] loop3: detected capacity change from 0 to 4096 [ 930.357509][T14090] loop4: detected capacity change from 0 to 4096 [ 930.366137][T14089] loop2: detected capacity change from 0 to 4096 [ 930.382449][T14081] EXT4-fs (loop1): #clusters per group too big: 32768 02:21:45 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f001000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:45 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000255030006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 930.396688][T14088] EXT4-fs (loop3): bad geometry: block count 546 exceeds size of device (512 blocks) [ 930.414523][T14090] EXT4-fs (loop4): Invalid log block size: 218114 [ 930.430871][T14089] EXT4-fs (loop2): bad geometry: block count 767 exceeds size of device (512 blocks) 02:21:45 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f001800000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:45 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f001c00000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:45 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000002502000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 930.459227][T14081] loop1: detected capacity change from 0 to 4 [ 930.475799][T14089] loop2: detected capacity change from 0 to 4096 [ 930.482446][T14081] EXT4-fs (loop1): #clusters per group too big: 32768 [ 930.486268][T14089] EXT4-fs (loop2): bad geometry: block count 767 exceeds size of device (512 blocks) 02:21:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2085ffffff02000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 930.522795][T14123] loop4: detected capacity change from 0 to 4096 [ 930.545691][T14132] loop3: detected capacity change from 0 to 4096 [ 930.565773][T14132] EXT4-fs (loop3): bad geometry: block count 549 exceeds size of device (512 blocks) [ 930.577442][T14123] EXT4-fs (loop4): Invalid log block size: 218370 [ 930.596364][T14139] loop2: detected capacity change from 0 to 4096 [ 930.605469][T14139] EXT4-fs (loop2): bad geometry: block count 767 exceeds size of device (512 blocks) 02:21:46 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x97, 0x0, 0x7, 0x0, 0x0, 0x28300, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x418, 0x0, @perf_config_ext={0x4118, 0x100}, 0x800, 0x7, 0x0, 0x8, 0x0, 0xed7, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x3b, 0x5, 0x0, 0x0, 0xcc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xcb8, 0x80}, 0x480, 0xffffffffffffffe0, 0x0, 0x0, 0x20, 0x0, 0x173, 0x0, 0x4bf, 0x0, 0xe408}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000f00)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000004c0)={0x53, 0xffffffffffffffff, 0x2e, 0x6, @scatter={0x2, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000d40)=""/136, 0x88}, {&(0x7f0000000e00)=""/208, 0xd0}]}, &(0x7f00000001c0)="e49d028c0715e20b5104226936005973918fe159f86d8e030acfa71b168531e97c8c98e798097a3c8229ad24d9cb", &(0x7f0000000540)=""/101, 0x15, 0x10000, 0x2, &(0x7f0000000340)}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x10\'\\@$&\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055300)={0x8f7, [{0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r5}, {}, {}, {r3}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {r3}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, r4}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x0, "0d4abfd4b32220"}) r185 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000840)={0x0, 0xfaef, 0xffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r185, 0x0) r186 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r186, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r186, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0xfffffffffffffeff, 0x1) sendto$inet(r186, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b300)={0xffff, [{r72, r60}, {}, {r110}, {r161}, {}, {r172}, {}, {}, {r103}, {}, {r135}, {}, {0x0, r52}, {0x0, r40}, {0x0, r182}, {r127, r14}, {r160, r32}, {r177, r58}, {}, {r13, r176}, {0x0, r180}, {r11}, {r19, r24}, {r28}, {r129}, {0x0, r33}, {}, {}, {}, {r104, r49}, {}, {}, {r47}, {r116, r158}, {0x0, r9}, {r56}, {0x0, r38}, {0x0, r37}, {}, {}, {0x0, r174}, {}, {r104, r32}, {r126}, {r107}, {0x0, r124}, {}, {}, {0x0, r61}, {}, {}, {0x0, r117}, {r116}, {r66}, {r89, r99}, {}, {}, {}, {r168}, {r34}, {r131, r152}, {}, {}, {r72}, {0x0, r96}, {}, {}, {0x0, r80}, {r78, r137}, {r41}, {0x0, r80}, {}, {0x0, r85}, {r55}, {0x0, r50}, {r25, r170}, {r6}, {r62}, {r179, r12}, {r175}, {0x0, r22}, {r17, r174}, {r46}, {}, {r139, r75}, {r36, r31}, {}, {}, {r140, r100}, {0x0, r92}, {r108}, {r69}, {r181}, {}, {}, {r161}, {r173}, {}, {0x0, r112}, {r101, r7}, {0x0, r144}, {r91}, {}, {r93}, {}, {r95}, {0x0, r114}, {0x0, r134}, {r115}, {}, {r23}, {0x0, r68}, {r51}, {0x0, r90}, {0x0, r109}, {r57, r167}, {0x0, r156}, {r15, r29}, {}, {r97}, {r101, r120}, {}, {r83, r117}, {}, {0x0, r102}, {}, {r181}, {}, {}, {}, {r71}, {r155, r149}, {}, {r154, r65}, {}, {r159, r79}, {0x0, r184}, {r138, r54}, {r42}, {}, {}, {0x0, r48}, {r39}, {}, {0x0, r18}, {r138}, {r165}, {r146}, {0x0, r143}, {}, {r70, r122}, {r20, r105}, {r119}, {r183}, {r113, r45}, {}, {}, {0x0, r100}, {r72}, {}, {0x0, r128}, {0x0, r81}, {r141}, {}, {r171, r84}, {r97}, {}, {r10, r38}, {r177}, {}, {r47, r106}, {0x0, r143}, {r113}, {}, {r145}, {r69}, {r57}, {0x0, r162}, {0x0, r35}, {r87}, {0x0, r53}, {}, {r118, r106}, {0x0, r76}, {r123, r150}, {r121}, {}, {}, {r8}, {}, {}, {}, {}, {}, {r151, r130}, {}, {r181, r35}, {r94, r90}, {r82}, {r72}, {r16}, {}, {r135, r44}, {0x0, r88}, {r123}, {r129}, {r98}, {}, {}, {0x0, r164}, {0x0, r27}, {r157}, {0x0, r63}, {0x0, r43}, {0x0, r59}, {0x0, r43}, {0x0, r27}, {r121, r67}, {}, {r86, r43}, {0x0, r166}, {r34}, {0x0, r73}, {r30, r148}, {}, {}, {}, {}, {0x0, r147}, {r56, r31}, {r115}, {r145, r21}, {r64}, {0x0, r142}, {}, {r136}, {}, {r133, r84}, {0x0, r164}, {0x0, r111}, {0x0, r125}, {0x0, r100}, {}, {0x0, r178}, {r16}, {r179, r153}, {}, {r62, r33}, {r163, r169}, {}, {}, {r26}, {0x0, r74}, {r56, r132}, {r77}], 0x0, "e8da0117d3c471"}) 02:21:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000037d02000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:46 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000258030006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:46 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f002600000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:46 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000002e02000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="208cffffff02000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 931.254377][T14161] loop2: detected capacity change from 0 to 4096 [ 931.261326][T14160] loop3: detected capacity change from 0 to 4096 [ 931.268771][T14163] loop1: detected capacity change from 0 to 4 [ 931.269689][T14162] loop4: detected capacity change from 0 to 4096 [ 931.282738][T14163] EXT4-fs (loop1): #clusters per group too big: 32768 [ 931.292315][T14161] EXT4-fs (loop2): bad geometry: block count 767 exceeds size of device (512 blocks) 02:21:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2097ffffff02000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:46 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00fe00000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 931.302503][ C0] scsi_io_completion_action: 2 callbacks suppressed [ 931.302532][ C0] sd 0:0:1:0: tag#5271 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 931.318943][ C0] sd 0:0:1:0: tag#5271 CDB: opcode=0xe5 (vendor) [ 931.325280][ C0] sd 0:0:1:0: tag#5271 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 931.334318][ C0] sd 0:0:1:0: tag#5271 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 931.343451][ C0] sd 0:0:1:0: tag#5271 CDB[20]: ba [ 931.348803][T14160] EXT4-fs (loop3): bad geometry: block count 558 exceeds size of device (512 blocks) [ 931.362510][T14162] EXT4-fs (loop4): Invalid log block size: 219138 [ 931.369043][ C0] sd 0:0:1:0: tag#5272 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 931.373627][T14163] loop1: detected capacity change from 0 to 4 [ 931.378947][ C0] sd 0:0:1:0: tag#5272 CDB: opcode=0xe4 (vendor) [ 931.391303][ C0] sd 0:0:1:0: tag#5272 CDB[00]: e4 9d 02 8c 07 15 e2 0b 51 04 22 69 36 00 59 73 02:21:46 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000402000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:46 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000259030006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:46 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000003000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 931.400352][ C0] sd 0:0:1:0: tag#5272 CDB[10]: 91 8f e1 59 f8 6d 8e 03 0a cf a7 1b 16 85 31 e9 [ 931.409405][ C0] sd 0:0:1:0: tag#5272 CDB[20]: 7c 8c 98 e7 98 09 7a 3c 82 29 ad 24 d9 cb [ 931.418242][T14179] loop2: detected capacity change from 0 to 4096 [ 931.432392][T14163] EXT4-fs (loop1): #clusters per group too big: 32768 [ 931.442606][T14179] EXT4-fs (loop2): bad geometry: block count 767 exceeds size of device (512 blocks) 02:21:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20daffffff02000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 931.493783][T14194] loop4: detected capacity change from 0 to 4096 [ 931.508803][T14194] EXT4-fs (loop4): Invalid log block size: 219394 [ 931.540861][T14212] loop2: detected capacity change from 0 to 4096 [ 931.550562][T14212] EXT4-fs (loop2): bad geometry: block count 767 exceeds size of device (512 blocks) [ 931.603482][T14212] loop2: detected capacity change from 0 to 4096 [ 931.610844][T14212] EXT4-fs (loop2): bad geometry: block count 767 exceeds size of device (512 blocks) 02:21:47 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x97, 0x0, 0x7, 0x0, 0x0, 0x28300, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x418, 0x0, @perf_config_ext={0x4118, 0x100}, 0x800, 0x7, 0x0, 0x8, 0x0, 0xed7, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x3b, 0x5, 0x0, 0x0, 0xcc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xcb8, 0x80}, 0x480, 0xffffffffffffffe0, 0x0, 0x0, 0x20, 0x0, 0x173, 0x0, 0x4bf, 0x0, 0xe408}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000f00)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000004c0)={0x53, 0xffffffffffffffff, 0x2e, 0x6, @scatter={0x2, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000d40)=""/136, 0x88}, {&(0x7f0000000e00)=""/208, 0xd0}]}, &(0x7f00000001c0)="e49d028c0715e20b5104226936005973918fe159f86d8e030acfa71b168531e97c8c98e798097a3c8229ad24d9cb", &(0x7f0000000540)=""/101, 0x15, 0x10000, 0x2, &(0x7f0000000340)}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x10\'\\@$&\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055300)={0x8f7, [{0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r5}, {}, {}, {r3}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {r3}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, r4}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x0, "0d4abfd4b32220"}) r185 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000840)={0x0, 0xfaef, 0xffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r185, 0x0) r186 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r186, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r186, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0xfffffffffffffeff, 0x1) sendto$inet(r186, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b300)={0xffff, [{r72, r60}, {}, {r110}, {r161}, {}, {r172}, {}, {}, {r103}, {}, {r135}, {}, {0x0, r52}, {0x0, r40}, {0x0, r182}, {r127, r14}, {r160, r32}, {r177, r58}, {}, {r13, r176}, {0x0, r180}, {r11}, {r19, r24}, {r28}, {r129}, {0x0, r33}, {}, {}, {}, {r104, r49}, {}, {}, {r47}, {r116, r158}, {0x0, r9}, {r56}, {0x0, r38}, {0x0, r37}, {}, {}, {0x0, r174}, {}, {r104, r32}, {r126}, {r107}, {0x0, r124}, {}, {}, {0x0, r61}, {}, {}, {0x0, r117}, {r116}, {r66}, {r89, r99}, {}, {}, {}, {r168}, {r34}, {r131, r152}, {}, {}, {r72}, {0x0, r96}, {}, {}, {0x0, r80}, {r78, r137}, {r41}, {0x0, r80}, {}, {0x0, r85}, {r55}, {0x0, r50}, {r25, r170}, {r6}, {r62}, {r179, r12}, {r175}, {0x0, r22}, {r17, r174}, {r46}, {}, {r139, r75}, {r36, r31}, {}, {}, {r140, r100}, {0x0, r92}, {r108}, {r69}, {r181}, {}, {}, {r161}, {r173}, {}, {0x0, r112}, {r101, r7}, {0x0, r144}, {r91}, {}, {r93}, {}, {r95}, {0x0, r114}, {0x0, r134}, {r115}, {}, {r23}, {0x0, r68}, {r51}, {0x0, r90}, {0x0, r109}, {r57, r167}, {0x0, r156}, {r15, r29}, {}, {r97}, {r101, r120}, {}, {r83, r117}, {}, {0x0, r102}, {}, {r181}, {}, {}, {}, {r71}, {r155, r149}, {}, {r154, r65}, {}, {r159, r79}, {0x0, r184}, {r138, r54}, {r42}, {}, {}, {0x0, r48}, {r39}, {}, {0x0, r18}, {r138}, {r165}, {r146}, {0x0, r143}, {}, {r70, r122}, {r20, r105}, {r119}, {r183}, {r113, r45}, {}, {}, {0x0, r100}, {r72}, {}, {0x0, r128}, {0x0, r81}, {r141}, {}, {r171, r84}, {r97}, {}, {r10, r38}, {r177}, {}, {r47, r106}, {0x0, r143}, {r113}, {}, {r145}, {r69}, {r57}, {0x0, r162}, {0x0, r35}, {r87}, {0x0, r53}, {}, {r118, r106}, {0x0, r76}, {r123, r150}, {r121}, {}, {}, {r8}, {}, {}, {}, {}, {}, {r151, r130}, {}, {r181, r35}, {r94, r90}, {r82}, {r72}, {r16}, {}, {r135, r44}, {0x0, r88}, {r123}, {r129}, {r98}, {}, {}, {0x0, r164}, {0x0, r27}, {r157}, {0x0, r63}, {0x0, r43}, {0x0, r59}, {0x0, r43}, {0x0, r27}, {r121, r67}, {}, {r86, r43}, {0x0, r166}, {r34}, {0x0, r73}, {r30, r148}, {}, {}, {}, {}, {0x0, r147}, {r56, r31}, {r115}, {r145, r21}, {r64}, {0x0, r142}, {}, {r136}, {}, {r133, r84}, {0x0, r164}, {0x0, r111}, {0x0, r125}, {0x0, r100}, {}, {0x0, r178}, {r16}, {r179, r153}, {}, {r62, r33}, {r163, r169}, {}, {}, {r26}, {0x0, r74}, {r56, r132}, {r77}], 0x0, "e8da0117d3c471"}) 02:21:47 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000037e02000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:47 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000204000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:47 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f00000000000000025e030006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20f6ffffff02000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 932.121346][T14232] loop4: detected capacity change from 0 to 4096 [ 932.130958][T14235] loop3: detected capacity change from 0 to 4096 [ 932.136644][T14231] loop2: detected capacity change from 0 to 4096 [ 932.144523][T14232] EXT4-fs (loop4): Invalid log block size: 220674 [ 932.148361][T14245] loop1: detected capacity change from 0 to 4 02:21:47 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f00000000000000025f030006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 932.172359][ C0] sd 0:0:1:0: tag#5289 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 932.176013][T14235] EXT4-fs (loop3): bad geometry: block count 560 exceeds size of device (512 blocks) [ 932.182221][ C0] sd 0:0:1:0: tag#5289 CDB: opcode=0xe5 (vendor) [ 932.198013][ C0] sd 0:0:1:0: tag#5289 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 932.207066][ C0] sd 0:0:1:0: tag#5289 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 932.216102][ C0] sd 0:0:1:0: tag#5289 CDB[20]: ba 02:21:47 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000604000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 932.219397][T14231] EXT4-fs (loop2): bad geometry: block count 767 exceeds size of device (512 blocks) [ 932.230801][T14245] EXT4-fs (loop1): #clusters per group too big: 32768 [ 932.231770][ C1] sd 0:0:1:0: tag#5290 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 932.247450][ C1] sd 0:0:1:0: tag#5290 CDB: opcode=0xe4 (vendor) [ 932.253796][ C1] sd 0:0:1:0: tag#5290 CDB[00]: e4 9d 02 8c 07 15 e2 0b 51 04 22 69 36 00 59 73 [ 932.262903][ C1] sd 0:0:1:0: tag#5290 CDB[10]: 91 8f e1 59 f8 6d 8e 03 0a cf a7 1b 16 85 31 e9 02:21:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008102000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:47 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f008004000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:47 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000005000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 932.271963][ C1] sd 0:0:1:0: tag#5290 CDB[20]: 7c 8c 98 e7 98 09 7a 3c 82 29 ad 24 d9 cb 02:21:47 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f002a05000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 932.320898][T14231] loop2: detected capacity change from 0 to 4096 [ 932.330786][T14231] EXT4-fs (loop2): bad geometry: block count 767 exceeds size of device (512 blocks) [ 932.333975][T14262] loop4: detected capacity change from 0 to 4096 [ 932.346599][T14275] loop1: detected capacity change from 0 to 4 [ 932.360051][T14262] EXT4-fs (loop4): Invalid log block size: 220930 02:21:47 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x97, 0x0, 0x7, 0x0, 0x0, 0x28300, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x418, 0x0, @perf_config_ext={0x4118, 0x100}, 0x800, 0x7, 0x0, 0x8, 0x0, 0xed7, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x3b, 0x5, 0x0, 0x0, 0xcc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xcb8, 0x80}, 0x480, 0xffffffffffffffe0, 0x0, 0x0, 0x20, 0x0, 0x173, 0x0, 0x4bf, 0x0, 0xe408}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000f00)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000004c0)={0x53, 0xffffffffffffffff, 0x2e, 0x6, @scatter={0x2, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000d40)=""/136, 0x88}, {&(0x7f0000000e00)=""/208, 0xd0}]}, &(0x7f00000001c0)="e49d028c0715e20b5104226936005973918fe159f86d8e030acfa71b168531e97c8c98e798097a3c8229ad24d9cb", &(0x7f0000000540)=""/101, 0x15, 0x10000, 0x2, &(0x7f0000000340)}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x10\'\\@$&\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055300)={0x8f7, [{0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r5}, {}, {}, {r3}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {r3}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, r4}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x0, "0d4abfd4b32220"}) r184 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000840)={0x0, 0xfaef, 0xffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r184, 0x0) r185 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r185, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r185, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0xfffffffffffffeff, 0x1) sendto$inet(r185, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b300)={0xffff, [{r72, r60}, {}, {r110}, {r160}, {}, {r171}, {}, {}, {r103}, {}, {r134}, {}, {0x0, r52}, {0x0, r40}, {0x0, r181}, {r126, r14}, {r159, r32}, {r176, r58}, {}, {r13, r175}, {0x0, r179}, {r11}, {r19, r24}, {r28}, {r128}, {0x0, r33}, {}, {}, {}, {r104, r49}, {}, {}, {r47}, {r116, r157}, {0x0, r9}, {r56}, {0x0, r38}, {0x0, r37}, {}, {}, {0x0, r173}, {}, {r104, r32}, {}, {r107, r142}, {0x0, r124}, {}, {}, {0x0, r61}, {}, {}, {0x0, r117}, {r116}, {r66}, {r89, r99}, {}, {}, {}, {r167}, {r34}, {r130, r151}, {}, {}, {r72}, {0x0, r96}, {}, {}, {0x0, r80}, {r78, r136}, {r41}, {0x0, r80}, {}, {0x0, r85}, {r55}, {0x0, r50}, {r25, r169}, {r6}, {r62}, {r178, r12}, {r174}, {0x0, r22}, {r17, r173}, {r46}, {}, {r138, r75}, {r36, r31}, {}, {}, {r139, r100}, {0x0, r92}, {r108}, {r69}, {r180}, {}, {}, {r160}, {r172}, {}, {0x0, r112}, {r101, r7}, {0x0, r143}, {r91}, {}, {r93}, {}, {r95}, {0x0, r114}, {0x0, r133}, {r115}, {}, {r23}, {0x0, r68}, {r51}, {0x0, r90}, {0x0, r109}, {r57, r166}, {0x0, r155}, {r15, r29}, {}, {r97}, {r101, r120}, {}, {r83, r117}, {}, {0x0, r102}, {}, {r180}, {}, {}, {}, {r71}, {r154, r148}, {}, {r153, r65}, {}, {r158, r79}, {0x0, r183}, {r137, r54}, {r42}, {}, {}, {0x0, r48}, {r39}, {}, {0x0, r18}, {r137}, {r164}, {r145}, {0x0, r142}, {}, {r70, r122}, {r20, r105}, {r119}, {r182}, {r113, r45}, {}, {}, {0x0, r100}, {r72}, {}, {0x0, r127}, {0x0, r81}, {r140}, {}, {r170, r84}, {r97}, {}, {r10, r38}, {r176}, {}, {r47, r106}, {0x0, r142}, {r113}, {}, {r144}, {r69}, {r57}, {0x0, r161}, {0x0, r35}, {r87}, {0x0, r53}, {}, {r118, r106}, {0x0, r76}, {r123, r149}, {r121}, {}, {}, {r8}, {}, {}, {}, {}, {}, {r150, r129}, {}, {r180, r35}, {r94, r90}, {r82}, {r72}, {r16}, {}, {r134, r44}, {0x0, r88}, {r123}, {r128}, {r98}, {}, {}, {0x0, r163}, {0x0, r27}, {r156}, {0x0, r63}, {0x0, r43}, {0x0, r59}, {0x0, r43}, {0x0, r27}, {r121, r67}, {}, {r86, r43}, {0x0, r165}, {r34}, {0x0, r73}, {r30, r147}, {}, {}, {}, {}, {0x0, r146}, {r56, r31}, {r115}, {r144, r21}, {r64}, {0x0, r141}, {}, {r135}, {}, {r132, r84}, {0x0, r163}, {0x0, r111}, {0x0, r125}, {0x0, r100}, {}, {0x0, r177}, {r16}, {r178, r152}, {}, {r62, r33}, {r162, r168}, {}, {}, {r26}, {0x0, r74}, {r56, r131}, {r77}], 0x0, "e8da0117d3c471"}) 02:21:47 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003102000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:47 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000006000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 932.372695][T14275] EXT4-fs (loop1): #clusters per group too big: 32768 [ 932.400338][ C1] sd 0:0:1:0: tag#5291 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 932.410198][ C1] sd 0:0:1:0: tag#5291 CDB: opcode=0xe5 (vendor) 02:21:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20fdffffff02000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 932.416551][ C1] sd 0:0:1:0: tag#5291 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 932.417187][T14287] loop3: detected capacity change from 0 to 4096 [ 932.425591][ C1] sd 0:0:1:0: tag#5291 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 932.440945][ C1] sd 0:0:1:0: tag#5291 CDB[20]: ba [ 932.452153][T14262] loop4: detected capacity change from 0 to 4096 [ 932.453320][ C1] sd 0:0:1:0: tag#5292 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s 02:21:47 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000406000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:47 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000278030006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 932.468314][ C1] sd 0:0:1:0: tag#5292 CDB: opcode=0xe4 (vendor) [ 932.469136][T14287] EXT4-fs (loop3): bad geometry: block count 561 exceeds size of device (512 blocks) [ 932.474670][ C1] sd 0:0:1:0: tag#5292 CDB[00]: e4 9d 02 8c 07 15 e2 0b 51 04 22 69 36 00 59 73 [ 932.493177][ C1] sd 0:0:1:0: tag#5292 CDB[10]: 91 8f e1 59 f8 6d 8e 03 0a cf a7 1b 16 85 31 e9 [ 932.502205][ C1] sd 0:0:1:0: tag#5292 CDB[20]: 7c 8c 98 e7 98 09 7a 3c 82 29 ad 24 d9 cb 02:21:47 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000007000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 932.542033][T14302] loop2: detected capacity change from 0 to 4096 [ 932.561251][T14302] EXT4-fs (loop2): bad geometry: block count 767 exceeds size of device (512 blocks) [ 932.572486][T14275] loop1: detected capacity change from 0 to 4 02:21:48 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003202000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008202000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:48 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000018000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 932.600634][T14316] loop4: detected capacity change from 0 to 4096 [ 932.607773][T14275] EXT4-fs (loop1): #clusters per group too big: 32768 [ 932.630012][T14321] loop3: detected capacity change from 0 to 4096 [ 932.636925][T14316] EXT4-fs (loop4): Invalid log block size: 227330 02:21:48 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00001c000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:48 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000279030006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 932.650348][T14321] EXT4-fs (loop3): bad geometry: block count 562 exceeds size of device (512 blocks) [ 932.666619][T14302] loop2: detected capacity change from 0 to 4096 [ 932.671798][T14333] loop1: detected capacity change from 0 to 4 [ 932.694988][T14302] EXT4-fs (loop2): bad geometry: block count 767 exceeds size of device (512 blocks) [ 932.702195][T14343] loop4: detected capacity change from 0 to 4096 [ 932.712303][T14333] EXT4-fs (loop1): #clusters per group too big: 32768 [ 932.727129][T14343] EXT4-fs (loop4): Invalid log block size: 227586 [ 932.764254][T14333] loop1: detected capacity change from 0 to 4 [ 932.771609][T14333] EXT4-fs (loop1): #clusters per group too big: 32768 02:21:48 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x97, 0x0, 0x7, 0x0, 0x0, 0x28300, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x418, 0x0, @perf_config_ext={0x4118, 0x100}, 0x800, 0x7, 0x0, 0x8, 0x0, 0xed7, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x3b, 0x5, 0x0, 0x0, 0xcc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xcb8, 0x80}, 0x480, 0xffffffffffffffe0, 0x0, 0x0, 0x20, 0x0, 0x173, 0x0, 0x4bf, 0x0, 0xe408}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000f00)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000004c0)={0x53, 0xffffffffffffffff, 0x2e, 0x6, @scatter={0x2, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000d40)=""/136, 0x88}, {&(0x7f0000000e00)=""/208, 0xd0}]}, &(0x7f00000001c0)="e49d028c0715e20b5104226936005973918fe159f86d8e030acfa71b168531e97c8c98e798097a3c8229ad24d9cb", &(0x7f0000000540)=""/101, 0x15, 0x10000, 0x2, &(0x7f0000000340)}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x10\'\\@$&\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055300)={0x8f7, [{0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r5}, {}, {}, {r3}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {r3}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, r4}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x0, "0d4abfd4b32220"}) r184 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000840)={0x0, 0xfaef, 0xffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r184, 0x0) r185 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r185, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r185, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0xfffffffffffffeff, 0x1) sendto$inet(r185, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b300)={0xffff, [{r72, r60}, {}, {r110}, {r160}, {}, {r171}, {}, {}, {r103}, {}, {r134}, {}, {0x0, r52}, {0x0, r40}, {0x0, r181}, {r126, r14}, {r159, r32}, {r176, r58}, {}, {r13, r175}, {0x0, r179}, {r11}, {r19, r24}, {r28}, {r128}, {0x0, r33}, {}, {}, {}, {r104, r49}, {}, {}, {r47}, {r116, r157}, {0x0, r9}, {r56}, {0x0, r38}, {0x0, r37}, {}, {}, {0x0, r173}, {}, {r104, r32}, {}, {r107, r142}, {0x0, r124}, {}, {}, {0x0, r61}, {}, {}, {0x0, r117}, {r116}, {r66}, {r89, r99}, {}, {}, {}, {r167}, {r34}, {r130, r151}, {}, {}, {r72}, {0x0, r96}, {}, {}, {0x0, r80}, {r78, r136}, {r41}, {0x0, r80}, {}, {0x0, r85}, {r55}, {0x0, r50}, {r25, r169}, {r6}, {r62}, {r178, r12}, {r174}, {0x0, r22}, {r17, r173}, {r46}, {}, {r138, r75}, {r36, r31}, {}, {}, {r139, r100}, {0x0, r92}, {r108}, {r69}, {r180}, {}, {}, {r160}, {r172}, {}, {0x0, r112}, {r101, r7}, {0x0, r143}, {r91}, {}, {r93}, {}, {r95}, {0x0, r114}, {0x0, r133}, {r115}, {}, {r23}, {0x0, r68}, {r51}, {0x0, r90}, {0x0, r109}, {r57, r166}, {0x0, r155}, {r15, r29}, {}, {r97}, {r101, r120}, {}, {r83, r117}, {}, {0x0, r102}, {}, {r180}, {}, {}, {}, {r71}, {r154, r148}, {}, {r153, r65}, {}, {r158, r79}, {0x0, r183}, {r137, r54}, {r42}, {}, {}, {0x0, r48}, {r39}, {}, {0x0, r18}, {r137}, {r164}, {r145}, {0x0, r142}, {}, {r70, r122}, {r20, r105}, {r119}, {r182}, {r113, r45}, {}, {}, {0x0, r100}, {r72}, {}, {0x0, r127}, {0x0, r81}, {r140}, {}, {r170, r84}, {r97}, {}, {r10, r38}, {r176}, {}, {r47, r106}, {0x0, r142}, {r113}, {}, {r144}, {r69}, {r57}, {0x0, r161}, {0x0, r35}, {r87}, {0x0, r53}, {}, {r118, r106}, {0x0, r76}, {r123, r149}, {r121}, {}, {}, {r8}, {}, {}, {}, {}, {}, {r150, r129}, {}, {r180, r35}, {r94, r90}, {r82}, {r72}, {r16}, {}, {r134, r44}, {0x0, r88}, {r123}, {r128}, {r98}, {}, {}, {0x0, r163}, {0x0, r27}, {r156}, {0x0, r63}, {0x0, r43}, {0x0, r59}, {0x0, r43}, {0x0, r27}, {r121, r67}, {}, {r86, r43}, {0x0, r165}, {r34}, {0x0, r73}, {r30, r147}, {}, {}, {}, {}, {0x0, r146}, {r56, r31}, {r115}, {r144, r21}, {r64}, {0x0, r141}, {}, {r135}, {}, {r132, r84}, {0x0, r163}, {0x0, r111}, {0x0, r125}, {0x0, r100}, {}, {0x0, r177}, {r16}, {r178, r152}, {}, {r62, r33}, {r162, r168}, {}, {}, {r26}, {0x0, r74}, {r56, r131}, {r77}], 0x0, "e8da0117d3c471"}) 02:21:48 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003f02000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20feffffff02000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:48 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000020000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:48 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f00000000000000027c030006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008302000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:48 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000026000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 933.258755][T14368] loop3: detected capacity change from 0 to 4096 [ 933.263109][T14376] loop1: detected capacity change from 0 to 4 [ 933.265878][T14377] loop4: detected capacity change from 0 to 4096 [ 933.280164][T14378] loop2: detected capacity change from 0 to 4096 [ 933.286577][T14376] EXT4-fs (loop1): #clusters per group too big: 32768 [ 933.296120][ C0] sd 0:0:1:0: tag#5293 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 933.305999][ C0] sd 0:0:1:0: tag#5293 CDB: opcode=0xe5 (vendor) [ 933.312334][ C0] sd 0:0:1:0: tag#5293 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 933.319795][T14377] EXT4-fs (loop4): Invalid log block size: 228354 [ 933.321457][ C0] sd 0:0:1:0: tag#5293 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 933.328201][T14378] EXT4-fs (loop2): bad geometry: block count 767 exceeds size of device (512 blocks) [ 933.336866][ C0] sd 0:0:1:0: tag#5293 CDB[20]: ba 02:21:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000003c102000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:48 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00052a000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:48 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00003f000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 933.350571][T14368] EXT4-fs (loop3): bad geometry: block count 575 exceeds size of device (512 blocks) [ 933.377695][ C0] sd 0:0:1:0: tag#5294 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 933.387564][ C0] sd 0:0:1:0: tag#5294 CDB: opcode=0xe4 (vendor) [ 933.393918][ C0] sd 0:0:1:0: tag#5294 CDB[00]: e4 9d 02 8c 07 15 e2 0b 51 04 22 69 36 00 59 73 02:21:48 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000040000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:48 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 933.402994][ C0] sd 0:0:1:0: tag#5294 CDB[10]: 91 8f e1 59 f8 6d 8e 03 0a cf a7 1b 16 85 31 e9 [ 933.412031][ C0] sd 0:0:1:0: tag#5294 CDB[20]: 7c 8c 98 e7 98 09 7a 3c 82 29 ad 24 d9 cb [ 933.441090][T14405] loop1: detected capacity change from 0 to 4 [ 933.444670][T14378] loop2: detected capacity change from 0 to 4096 [ 933.465157][T14405] EXT4-fs (loop1): #clusters per group too big: 32768 [ 933.477068][T14378] EXT4-fs (loop2): bad geometry: block count 767 exceeds size of device (512 blocks) [ 933.487760][T14416] loop3: detected capacity change from 0 to 4096 [ 933.496677][T14416] EXT4-fs (loop3): bad geometry: block count 576 exceeds size of device (512 blocks) [ 933.507455][T14405] loop1: detected capacity change from 0 to 4 [ 933.519120][T14405] EXT4-fs (loop1): #clusters per group too big: 32768 02:21:49 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x97, 0x0, 0x7, 0x0, 0x0, 0x28300, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x418, 0x0, @perf_config_ext={0x4118, 0x100}, 0x800, 0x7, 0x0, 0x8, 0x0, 0xed7, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x3b, 0x5, 0x0, 0x0, 0xcc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xcb8, 0x80}, 0x480, 0xffffffffffffffe0, 0x0, 0x0, 0x20, 0x0, 0x173, 0x0, 0x4bf, 0x0, 0xe408}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000f00)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000004c0)={0x53, 0xffffffffffffffff, 0x2e, 0x6, @scatter={0x2, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000d40)=""/136, 0x88}, {&(0x7f0000000e00)=""/208, 0xd0}]}, &(0x7f00000001c0)="e49d028c0715e20b5104226936005973918fe159f86d8e030acfa71b168531e97c8c98e798097a3c8229ad24d9cb", &(0x7f0000000540)=""/101, 0x15, 0x10000, 0x2, &(0x7f0000000340)}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x10\'\\@$&\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055300)={0x8f7, [{0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r5}, {}, {}, {r3}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {r3}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, r4}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x0, "0d4abfd4b32220"}) r184 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000840)={0x0, 0xfaef, 0xffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r184, 0x0) r185 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r185, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r185, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0xfffffffffffffeff, 0x1) sendto$inet(r185, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b300)={0xffff, [{r72, r60}, {}, {r110}, {r160}, {}, {r171}, {}, {}, {r103}, {}, {r134}, {}, {0x0, r52}, {0x0, r40}, {0x0, r181}, {r126, r14}, {r159, r32}, {r176, r58}, {}, {r13, r175}, {0x0, r179}, {r11}, {r19, r24}, {r28}, {r128}, {0x0, r33}, {}, {}, {}, {r104, r49}, {}, {}, {r47}, {r116, r157}, {0x0, r9}, {r56}, {0x0, r38}, {0x0, r37}, {}, {}, {0x0, r173}, {}, {r104, r32}, {}, {r107, r142}, {0x0, r124}, {}, {}, {0x0, r61}, {}, {}, {0x0, r117}, {r116}, {r66}, {r89, r99}, {}, {}, {}, {r167}, {r34}, {r130, r151}, {}, {}, {r72}, {0x0, r96}, {}, {}, {0x0, r80}, {r78, r136}, {r41}, {0x0, r80}, {}, {0x0, r85}, {r55}, {0x0, r50}, {r25, r169}, {r6}, {r62}, {r178, r12}, {r174}, {0x0, r22}, {r17, r173}, {r46}, {}, {r138, r75}, {r36, r31}, {}, {}, {r139, r100}, {0x0, r92}, {r108}, {r69}, {r180}, {}, {}, {r160}, {r172}, {}, {0x0, r112}, {r101, r7}, {0x0, r143}, {r91}, {}, {r93}, {}, {r95}, {0x0, r114}, {0x0, r133}, {r115}, {}, {r23}, {0x0, r68}, {r51}, {0x0, r90}, {0x0, r109}, {r57, r166}, {0x0, r155}, {r15, r29}, {}, {r97}, {r101, r120}, {}, {r83, r117}, {}, {0x0, r102}, {}, {r180}, {}, {}, {}, {r71}, {r154, r148}, {}, {r153, r65}, {}, {r158, r79}, {0x0, r183}, {r137, r54}, {r42}, {}, {}, {0x0, r48}, {r39}, {}, {0x0, r18}, {r137}, {r164}, {r145}, {0x0, r142}, {}, {r70, r122}, {r20, r105}, {r119}, {r182}, {r113, r45}, {}, {}, {0x0, r100}, {r72}, {}, {0x0, r127}, {0x0, r81}, {r140}, {}, {r170, r84}, {r97}, {}, {r10, r38}, {r176}, {}, {r47, r106}, {0x0, r142}, {r113}, {}, {r144}, {r69}, {r57}, {0x0, r161}, {0x0, r35}, {r87}, {0x0, r53}, {}, {r118, r106}, {0x0, r76}, {r123, r149}, {r121}, {}, {}, {r8}, {}, {}, {}, {}, {}, {r150, r129}, {}, {r180, r35}, {r94, r90}, {r82}, {r72}, {r16}, {}, {r134, r44}, {0x0, r88}, {r123}, {r128}, {r98}, {}, {}, {0x0, r163}, {0x0, r27}, {r156}, {0x0, r63}, {0x0, r43}, {0x0, r59}, {0x0, r43}, {0x0, r27}, {r121, r67}, {}, {r86, r43}, {0x0, r165}, {r34}, {0x0, r73}, {r30, r147}, {}, {}, {}, {}, {0x0, r146}, {r56, r31}, {r115}, {r144, r21}, {r64}, {0x0, r141}, {}, {r135}, {}, {r132, r84}, {0x0, r163}, {0x0, r111}, {0x0, r125}, {0x0, r100}, {}, {0x0, r177}, {r16}, {r178, r152}, {}, {r62, r33}, {r162, r168}, {}, {}, {r26}, {0x0, r74}, {r56, r131}, {r77}], 0x0, "e8da0117d3c471"}) 02:21:49 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f0000000000000002c1030006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:49 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000480000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:49 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200008004002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000400000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000fffe02000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 933.730496][T14444] loop3: detected capacity change from 0 to 4096 [ 933.736091][T14448] loop1: detected capacity change from 0 to 4 [ 933.740425][T14445] loop4: detected capacity change from 0 to 4096 [ 933.747084][ C1] sd 0:0:1:0: tag#5295 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 933.755157][T14450] loop2: detected capacity change from 0 to 4096 [ 933.759416][ C1] sd 0:0:1:0: tag#5295 CDB: opcode=0xe5 (vendor) [ 933.772017][ C1] sd 0:0:1:0: tag#5295 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c 02:21:49 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00fffe000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 933.772822][T14445] EXT4-fs (loop4): Invalid log block size: 246018 [ 933.781064][ C1] sd 0:0:1:0: tag#5295 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 933.796525][ C1] sd 0:0:1:0: tag#5295 CDB[20]: ba [ 933.806020][T14444] EXT4-fs (loop3): bad geometry: block count 576 exceeds size of device (512 blocks) [ 933.815884][ C0] sd 0:0:1:0: tag#5296 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 933.825716][ C0] sd 0:0:1:0: tag#5296 CDB: opcode=0xe4 (vendor) [ 933.832229][ C0] sd 0:0:1:0: tag#5296 CDB[00]: e4 9d 02 8c 07 15 e2 0b 51 04 22 69 36 00 59 73 [ 933.838937][T14448] EXT4-fs (loop1): #clusters per group too big: 32768 [ 933.841279][ C0] sd 0:0:1:0: tag#5296 CDB[10]: 91 8f e1 59 f8 6d 8e 03 0a cf a7 1b 16 85 31 e9 [ 933.857259][ C0] sd 0:0:1:0: tag#5296 CDB[20]: 7c 8c 98 e7 98 09 7a 3c 82 29 ad 24 d9 cb 02:21:49 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00feff000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 933.874110][T14450] EXT4-fs (loop2): bad geometry: first data block 33816576 is beyond end of filesystem (4) 02:21:49 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000080000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000fff02000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 933.906551][T14448] loop1: detected capacity change from 0 to 4 [ 933.922710][T14448] EXT4-fs (loop1): #clusters per group too big: 32768 [ 933.933003][T14450] loop2: detected capacity change from 0 to 4096 02:21:49 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004802000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:49 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000202040006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 933.954835][T14450] EXT4-fs (loop2): bad geometry: first data block 33816576 is beyond end of filesystem (4) [ 933.983542][T14488] loop1: detected capacity change from 0 to 4 [ 933.999862][T14491] loop3: detected capacity change from 0 to 4096 [ 934.000792][T14497] loop4: detected capacity change from 0 to 4096 [ 934.014561][T14488] EXT4-fs (loop1): #clusters per group too big: 32768 [ 934.041325][T14497] EXT4-fs (loop4): Invalid log block size: 262658 [ 934.050555][T14491] EXT4-fs (loop3): bad geometry: block count 584 exceeds size of device (512 blocks) 02:21:49 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x97, 0x0, 0x7, 0x0, 0x0, 0x28300, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x418, 0x0, @perf_config_ext={0x4118, 0x100}, 0x800, 0x7, 0x0, 0x8, 0x0, 0xed7, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x3b, 0x5, 0x0, 0x0, 0xcc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xcb8, 0x80}, 0x480, 0xffffffffffffffe0, 0x0, 0x0, 0x20, 0x0, 0x173, 0x0, 0x4bf, 0x0, 0xe408}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000f00)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000004c0)={0x53, 0xffffffffffffffff, 0x2e, 0x6, @scatter={0x2, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000d40)=""/136, 0x88}, {&(0x7f0000000e00)=""/208, 0xd0}]}, &(0x7f00000001c0)="e49d028c0715e20b5104226936005973918fe159f86d8e030acfa71b168531e97c8c98e798097a3c8229ad24d9cb", &(0x7f0000000540)=""/101, 0x15, 0x10000, 0x2, &(0x7f0000000340)}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x10\'\\@$&\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055300)={0x8f7, [{0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r5}, {}, {}, {r3}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {r3}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, r4}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x0, "0d4abfd4b32220"}) r185 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000840)={0x0, 0xfaef, 0xffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r185, 0x0) r186 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r186, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r186, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0xfffffffffffffeff, 0x1) sendto$inet(r186, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b300)={0xffff, [{r72, r60}, {}, {r110}, {r161}, {}, {r172}, {}, {}, {r103}, {}, {r135}, {}, {0x0, r52}, {0x0, r40}, {0x0, r182}, {r127, r14}, {r160, r32}, {r177, r58}, {}, {r13, r176}, {0x0, r180}, {r11}, {r19, r24}, {r28}, {r129}, {0x0, r33}, {}, {}, {}, {r104, r49}, {}, {}, {r47}, {r116, r158}, {0x0, r9}, {r56}, {0x0, r38}, {0x0, r37}, {}, {}, {0x0, r174}, {}, {0x0, r32}, {r126}, {r107, r143}, {0x0, r124}, {}, {}, {0x0, r61}, {}, {}, {0x0, r117}, {r116}, {r66}, {r89, r99}, {}, {}, {}, {r168}, {r34}, {r131, r152}, {}, {}, {r72}, {0x0, r96}, {}, {}, {0x0, r80}, {r78, r137}, {r41}, {0x0, r80}, {}, {0x0, r85}, {r55}, {0x0, r50}, {r25, r170}, {r6}, {r62}, {r179, r12}, {r175}, {0x0, r22}, {r17, r174}, {r46}, {}, {r139, r75}, {r36, r31}, {}, {}, {r140, r100}, {0x0, r92}, {r108}, {r69}, {r181}, {}, {}, {r161}, {r173}, {}, {0x0, r112}, {r101, r7}, {0x0, r144}, {r91}, {}, {r93}, {}, {r95}, {0x0, r114}, {0x0, r134}, {r115}, {}, {r23}, {0x0, r68}, {r51}, {0x0, r90}, {0x0, r109}, {r57, r167}, {0x0, r156}, {r15, r29}, {}, {r97}, {r101, r120}, {}, {r83, r117}, {}, {0x0, r102}, {}, {r181}, {}, {}, {}, {r71}, {r155, r149}, {}, {r154, r65}, {}, {r159, r79}, {0x0, r184}, {r138, r54}, {r42}, {}, {}, {0x0, r48}, {r39}, {}, {0x0, r18}, {r138}, {r165}, {r146}, {0x0, r143}, {}, {r70, r122}, {r20, r105}, {r119}, {r183}, {r113, r45}, {}, {}, {0x0, r100}, {r72}, {}, {0x0, r128}, {0x0, r81}, {r141}, {}, {r171, r84}, {r97}, {}, {r10, r38}, {r177}, {}, {r47, r106}, {0x0, r143}, {r113}, {}, {r145}, {r69}, {r57}, {0x0, r162}, {0x0, r35}, {r87}, {0x0, r53}, {}, {r118, r106}, {0x0, r76}, {r123, r150}, {r121}, {}, {}, {r8}, {}, {}, {}, {}, {}, {r151, r130}, {}, {r181, r35}, {r94, r90}, {r82}, {r72}, {r16}, {}, {r135, r44}, {0x0, r88}, {r123}, {r129}, {r98}, {}, {}, {0x0, r164}, {0x0, r27}, {r157}, {0x0, r63}, {0x0, r43}, {0x0, r59}, {0x0, r43}, {0x0, r27}, {r121, r67}, {}, {r86, r43}, {0x0, r166}, {r34}, {0x0, r73}, {r30, r148}, {}, {}, {}, {}, {0x0, r147}, {r56, r31}, {r115}, {r145, r21}, {r64}, {0x0, r142}, {}, {r136}, {}, {r133, r84}, {0x0, r164}, {0x0, r111}, {0x0, r125}, {0x0, r100}, {}, {0x0, r178}, {r16}, {r179, r153}, {}, {r62, r33}, {r163, r169}, {}, {}, {r26}, {0x0, r74}, {r56, r132}, {r77}], 0x0, "e8da0117d3c471"}) 02:21:49 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f004000080000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000800000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:49 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000206040006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:49 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004c02000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000feff02000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:50 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000100000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 934.607138][T14522] loop4: detected capacity change from 0 to 4096 [ 934.616358][T14523] loop1: detected capacity change from 0 to 4 [ 934.622629][T14524] loop3: detected capacity change from 0 to 4096 [ 934.631236][T14527] loop2: detected capacity change from 0 to 4096 02:21:50 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000200000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:50 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000100000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:50 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200050006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 934.655818][T14522] EXT4-fs (loop4): Invalid log block size: 263682 [ 934.666705][T14523] EXT4-fs (loop1): #clusters per group too big: 32768 [ 934.675577][T14524] EXT4-fs (loop3): bad geometry: block count 588 exceeds size of device (512 blocks) [ 934.691748][T14527] EXT4-fs (loop2): bad geometry: first data block 33816576 is beyond end of filesystem (8) 02:21:50 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000034e02000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:50 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000200000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 934.736024][T14523] loop1: detected capacity change from 0 to 4 [ 934.742995][T14527] loop2: detected capacity change from 0 to 4096 [ 934.743807][T14555] loop4: detected capacity change from 0 to 4096 [ 934.756241][T14527] EXT4-fs (loop2): bad geometry: first data block 33816576 is beyond end of filesystem (8) [ 934.766760][T14523] EXT4-fs (loop1): #clusters per group too big: 32768 [ 934.788870][T14555] EXT4-fs (loop4): Invalid log block size: 327682 [ 934.796053][T14569] loop3: detected capacity change from 0 to 4096 [ 934.805806][T14569] EXT4-fs (loop3): bad geometry: block count 590 exceeds size of device (512 blocks) 02:21:50 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x97, 0x0, 0x7, 0x0, 0x0, 0x28300, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x418, 0x0, @perf_config_ext={0x4118, 0x100}, 0x800, 0x7, 0x0, 0x8, 0x0, 0xed7, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x3b, 0x5, 0x0, 0x0, 0xcc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xcb8, 0x80}, 0x480, 0xffffffffffffffe0, 0x0, 0x0, 0x20, 0x0, 0x173, 0x0, 0x4bf, 0x0, 0xe408}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000f00)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000004c0)={0x53, 0xffffffffffffffff, 0x2e, 0x6, @scatter={0x2, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000d40)=""/136, 0x88}, {&(0x7f0000000e00)=""/208, 0xd0}]}, &(0x7f00000001c0)="e49d028c0715e20b5104226936005973918fe159f86d8e030acfa71b168531e97c8c98e798097a3c8229ad24d9cb", &(0x7f0000000540)=""/101, 0x15, 0x10000, 0x2, &(0x7f0000000340)}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x10\'\\@$&\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055300)={0x8f7, [{0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r5}, {}, {}, {r3}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {r3}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, r4}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x0, "0d4abfd4b32220"}) r185 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000840)={0x0, 0xfaef, 0xffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r185, 0x0) r186 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r186, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r186, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0xfffffffffffffeff, 0x1) sendto$inet(r186, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b300)={0xffff, [{r72, r60}, {}, {r110}, {r161}, {}, {r172}, {}, {}, {r103}, {}, {r135}, {}, {0x0, r52}, {0x0, r40}, {0x0, r182}, {r127, r14}, {r160, r32}, {r177, r58}, {}, {r13, r176}, {0x0, r180}, {r11}, {r19, r24}, {r28}, {r129}, {0x0, r33}, {}, {}, {}, {r104, r49}, {}, {}, {r47}, {r116, r158}, {0x0, r9}, {r56}, {0x0, r38}, {0x0, r37}, {}, {}, {0x0, r174}, {}, {0x0, r32}, {r126}, {r107, r143}, {0x0, r124}, {}, {}, {0x0, r61}, {}, {}, {0x0, r117}, {r116}, {r66}, {r89, r99}, {}, {}, {}, {r168}, {r34}, {r131, r152}, {}, {}, {r72}, {0x0, r96}, {}, {}, {0x0, r80}, {r78, r137}, {r41}, {0x0, r80}, {}, {0x0, r85}, {r55}, {0x0, r50}, {r25, r170}, {r6}, {r62}, {r179, r12}, {r175}, {0x0, r22}, {r17, r174}, {r46}, {}, {r139, r75}, {r36, r31}, {}, {}, {r140, r100}, {0x0, r92}, {r108}, {r69}, {r181}, {}, {}, {r161}, {r173}, {}, {0x0, r112}, {r101, r7}, {0x0, r144}, {r91}, {}, {r93}, {}, {r95}, {0x0, r114}, {0x0, r134}, {r115}, {}, {r23}, {0x0, r68}, {r51}, {0x0, r90}, {0x0, r109}, {r57, r167}, {0x0, r156}, {r15, r29}, {}, {r97}, {r101, r120}, {}, {r83, r117}, {}, {0x0, r102}, {}, {r181}, {}, {}, {}, {r71}, {r155, r149}, {}, {r154, r65}, {}, {r159, r79}, {0x0, r184}, {r138, r54}, {r42}, {}, {}, {0x0, r48}, {r39}, {}, {0x0, r18}, {r138}, {r165}, {r146}, {0x0, r143}, {}, {r70, r122}, {r20, r105}, {r119}, {r183}, {r113, r45}, {}, {}, {0x0, r100}, {r72}, {}, {0x0, r128}, {0x0, r81}, {r141}, {}, {r171, r84}, {r97}, {}, {r10, r38}, {r177}, {}, {r47, r106}, {0x0, r143}, {r113}, {}, {r145}, {r69}, {r57}, {0x0, r162}, {0x0, r35}, {r87}, {0x0, r53}, {}, {r118, r106}, {0x0, r76}, {r123, r150}, {r121}, {}, {}, {r8}, {}, {}, {}, {}, {}, {r151, r130}, {}, {r181, r35}, {r94, r90}, {r82}, {r72}, {r16}, {}, {r135, r44}, {0x0, r88}, {r123}, {r129}, {r98}, {}, {}, {0x0, r164}, {0x0, r27}, {r157}, {0x0, r63}, {0x0, r43}, {0x0, r59}, {0x0, r43}, {0x0, r27}, {r121, r67}, {}, {r86, r43}, {0x0, r166}, {r34}, {0x0, r73}, {r30, r148}, {}, {}, {}, {}, {0x0, r147}, {r56, r31}, {r115}, {r145, r21}, {r64}, {0x0, r142}, {}, {r136}, {}, {r133, r84}, {0x0, r164}, {0x0, r111}, {0x0, r125}, {0x0, r100}, {}, {0x0, r178}, {r16}, {r179, r153}, {}, {r62, r33}, {r163, r169}, {}, {}, {r26}, {0x0, r74}, {r56, r132}, {r77}], 0x0, "e8da0117d3c471"}) 02:21:50 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000040200000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000004000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000001000000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:50 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200060006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:50 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000035402000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:50 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000300000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 935.493583][T14599] loop2: detected capacity change from 0 to 4096 [ 935.497623][T14600] loop1: detected capacity change from 0 to 4 [ 935.503662][T14602] loop4: detected capacity change from 0 to 4096 [ 935.508779][T14601] loop3: detected capacity change from 0 to 4096 [ 935.522000][T14602] EXT4-fs (loop4): Invalid log block size: 393218 02:21:50 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000400000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:50 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000500000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 935.537010][T14599] EXT4-fs (loop2): bad geometry: first data block 33816576 is beyond end of filesystem (16) [ 935.551779][T14600] EXT4-fs (loop1): #clusters per group too big: 32768 [ 935.564797][T14601] EXT4-fs (loop3): bad geometry: block count 596 exceeds size of device (512 blocks) 02:21:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000010000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:51 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000204060006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:51 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000035502000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 935.601388][T14599] loop2: detected capacity change from 0 to 4096 [ 935.615469][T14599] EXT4-fs (loop2): bad geometry: first data block 33816576 is beyond end of filesystem (16) [ 935.636467][T14636] loop4: detected capacity change from 0 to 4096 [ 935.646116][T14636] EXT4-fs (loop4): Invalid log block size: 394242 [ 935.664779][T14642] loop3: detected capacity change from 0 to 4096 [ 935.669756][T14644] loop1: detected capacity change from 0 to 4 [ 935.682921][T14642] EXT4-fs (loop3): bad geometry: block count 597 exceeds size of device (512 blocks) [ 935.717151][T14644] EXT4-fs (loop1): #clusters per group too big: 32768 [ 935.750549][T14644] loop1: detected capacity change from 0 to 4 [ 935.763360][T14644] EXT4-fs (loop1): #clusters per group too big: 32768 02:21:51 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000001000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:51 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000600000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:51 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200070006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:51 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000035f02000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:51 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x97, 0x0, 0x7, 0x0, 0x0, 0x28300, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x418, 0x0, @perf_config_ext={0x4118, 0x100}, 0x800, 0x7, 0x0, 0x8, 0x0, 0xed7, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x3b, 0x5, 0x0, 0x0, 0xcc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xcb8, 0x80}, 0x480, 0xffffffffffffffe0, 0x0, 0x0, 0x20, 0x0, 0x173, 0x0, 0x4bf, 0x0, 0xe408}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000f00)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000004c0)={0x53, 0xffffffffffffffff, 0x2e, 0x6, @scatter={0x2, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000d40)=""/136, 0x88}, {&(0x7f0000000e00)=""/208, 0xd0}]}, &(0x7f00000001c0)="e49d028c0715e20b5104226936005973918fe159f86d8e030acfa71b168531e97c8c98e798097a3c8229ad24d9cb", &(0x7f0000000540)=""/101, 0x15, 0x10000, 0x2, &(0x7f0000000340)}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x10\'\\@$&\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055300)={0x8f7, [{0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r5}, {}, {}, {r3}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {r3}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, r4}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x0, "0d4abfd4b32220"}) r185 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000840)={0x0, 0xfaef, 0xffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r185, 0x0) r186 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r186, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r186, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0xfffffffffffffeff, 0x1) sendto$inet(r186, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b300)={0xffff, [{r72, r60}, {}, {r110}, {r161}, {}, {r172}, {}, {}, {r103}, {}, {r135}, {}, {0x0, r52}, {0x0, r40}, {0x0, r182}, {r127, r14}, {r160, r32}, {r177, r58}, {}, {r13, r176}, {0x0, r180}, {r11}, {r19, r24}, {r28}, {r129}, {0x0, r33}, {}, {}, {}, {r104, r49}, {}, {}, {r47}, {r116, r158}, {0x0, r9}, {r56}, {0x0, r38}, {0x0, r37}, {}, {}, {0x0, r174}, {}, {0x0, r32}, {r126}, {r107, r143}, {0x0, r124}, {}, {}, {0x0, r61}, {}, {}, {0x0, r117}, {r116}, {r66}, {r89, r99}, {}, {}, {}, {r168}, {r34}, {r131, r152}, {}, {}, {r72}, {0x0, r96}, {}, {}, {0x0, r80}, {r78, r137}, {r41}, {0x0, r80}, {}, {0x0, r85}, {r55}, {0x0, r50}, {r25, r170}, {r6}, {r62}, {r179, r12}, {r175}, {0x0, r22}, {r17, r174}, {r46}, {}, {r139, r75}, {r36, r31}, {}, {}, {r140, r100}, {0x0, r92}, {r108}, {r69}, {r181}, {}, {}, {r161}, {r173}, {}, {0x0, r112}, {r101, r7}, {0x0, r144}, {r91}, {}, {r93}, {}, {r95}, {0x0, r114}, {0x0, r134}, {r115}, {}, {r23}, {0x0, r68}, {r51}, {0x0, r90}, {0x0, r109}, {r57, r167}, {0x0, r156}, {r15, r29}, {}, {r97}, {r101, r120}, {}, {r83, r117}, {}, {0x0, r102}, {}, {r181}, {}, {}, {}, {r71}, {r155, r149}, {}, {r154, r65}, {}, {r159, r79}, {0x0, r184}, {r138, r54}, {r42}, {}, {}, {0x0, r48}, {r39}, {}, {0x0, r18}, {r138}, {r165}, {r146}, {0x0, r143}, {}, {r70, r122}, {r20, r105}, {r119}, {r183}, {r113, r45}, {}, {}, {0x0, r100}, {r72}, {}, {0x0, r128}, {0x0, r81}, {r141}, {}, {r171, r84}, {r97}, {}, {r10, r38}, {r177}, {}, {r47, r106}, {0x0, r143}, {r113}, {}, {r145}, {r69}, {r57}, {0x0, r162}, {0x0, r35}, {r87}, {0x0, r53}, {}, {r118, r106}, {0x0, r76}, {r123, r150}, {r121}, {}, {}, {r8}, {}, {}, {}, {}, {}, {r151, r130}, {}, {r181, r35}, {r94, r90}, {r82}, {r72}, {r16}, {}, {r135, r44}, {0x0, r88}, {r123}, {r129}, {r98}, {}, {}, {0x0, r164}, {0x0, r27}, {r157}, {0x0, r63}, {0x0, r43}, {0x0, r59}, {0x0, r43}, {0x0, r27}, {r121, r67}, {}, {r86, r43}, {0x0, r166}, {r34}, {0x0, r73}, {r30, r148}, {}, {}, {}, {}, {0x0, r147}, {r56, r31}, {r115}, {r145, r21}, {r64}, {0x0, r142}, {}, {r136}, {}, {r133, r84}, {0x0, r164}, {0x0, r111}, {0x0, r125}, {0x0, r100}, {}, {0x0, r178}, {r16}, {r179, r153}, {}, {r62, r33}, {r163, r169}, {}, {}, {r26}, {0x0, r74}, {r56, r132}, {r77}], 0x0, "e8da0117d3c471"}) 02:21:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000000010019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 936.394011][T14671] loop1: detected capacity change from 0 to 4 [ 936.394888][T14670] loop4: detected capacity change from 0 to 4096 [ 936.403859][T14673] loop3: detected capacity change from 0 to 4096 [ 936.409133][T14672] loop2: detected capacity change from 0 to 4096 [ 936.422723][ C1] scsi_io_completion_action: 4 callbacks suppressed [ 936.422754][ C1] sd 0:0:1:0: tag#5301 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s 02:21:51 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000040600000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 936.439200][ C1] sd 0:0:1:0: tag#5301 CDB: opcode=0xe5 (vendor) [ 936.445641][ C1] sd 0:0:1:0: tag#5301 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 936.454862][ C1] sd 0:0:1:0: tag#5301 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 936.458606][T14673] EXT4-fs (loop3): bad geometry: block count 607 exceeds size of device (512 blocks) [ 936.463921][ C1] sd 0:0:1:0: tag#5301 CDB[20]: ba [ 936.476302][T14670] EXT4-fs (loop4): Invalid log block size: 458754 02:21:51 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000202080006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 936.484097][ C1] sd 0:0:1:0: tag#5307 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 936.495095][ C1] sd 0:0:1:0: tag#5307 CDB: opcode=0xe4 (vendor) [ 936.501562][ C1] sd 0:0:1:0: tag#5307 CDB[00]: e4 9d 02 8c 07 15 e2 0b 51 04 22 69 36 00 59 73 [ 936.510356][T14672] EXT4-fs (loop2): bad geometry: first data block 33816576 is beyond end of filesystem (256) [ 936.510624][ C1] sd 0:0:1:0: tag#5307 CDB[10]: 91 8f e1 59 f8 6d 8e 03 0a cf a7 1b 16 85 31 e9 [ 936.520952][T14671] EXT4-fs (loop1): #clusters per group too big: 32768 02:21:51 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:51 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200002000002000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 936.529795][ C1] sd 0:0:1:0: tag#5307 CDB[20]: 7c 8c 98 e7 98 09 7a 3c 82 29 ad 24 d9 cb 02:21:52 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000700000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 936.595589][T14691] loop4: detected capacity change from 0 to 4096 [ 936.617866][T14705] loop2: detected capacity change from 0 to 4096 [ 936.623034][T14699] loop3: detected capacity change from 0 to 4096 [ 936.624272][T14691] EXT4-fs (loop4): Invalid log block size: 524802 02:21:52 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000800000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:52 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200090006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 936.640209][T14671] loop1: detected capacity change from 0 to 4 [ 936.648582][T14705] EXT4-fs (loop2): bad geometry: first data block 33816576 is beyond end of filesystem (512) [ 936.662051][T14699] EXT4-fs (loop3): bad geometry: block count 608 exceeds size of device (512 blocks) [ 936.662680][T14671] EXT4-fs (loop1): #clusters per group too big: 32768 02:21:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000e010019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:52 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006802000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:52 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000001800000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 936.743027][T14705] loop2: detected capacity change from 0 to 4096 [ 936.752909][T14723] loop4: detected capacity change from 0 to 4096 [ 936.765353][T14705] EXT4-fs (loop2): bad geometry: first data block 33816576 is beyond end of filesystem (512) [ 936.770635][T14738] loop3: detected capacity change from 0 to 4096 [ 936.780363][T14723] EXT4-fs (loop4): Invalid log block size: 589826 [ 936.791800][T14738] EXT4-fs (loop3): bad geometry: block count 616 exceeds size of device (512 blocks) [ 936.794293][T14736] loop1: detected capacity change from 0 to 4 [ 936.809205][T14736] EXT4-fs (loop1): #clusters per group too big: 32768 02:21:52 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x97, 0x0, 0x7, 0x0, 0x0, 0x28300, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x418, 0x0, @perf_config_ext={0x4118, 0x100}, 0x800, 0x7, 0x0, 0x8, 0x0, 0xed7, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x3b, 0x5, 0x0, 0x0, 0xcc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xcb8, 0x80}, 0x480, 0xffffffffffffffe0, 0x0, 0x0, 0x20, 0x0, 0x173, 0x0, 0x4bf, 0x0, 0xe408}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000f00)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000004c0)={0x53, 0xffffffffffffffff, 0x2e, 0x6, @scatter={0x2, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000d40)=""/136, 0x88}, {&(0x7f0000000e00)=""/208, 0xd0}]}, &(0x7f00000001c0)="e49d028c0715e20b5104226936005973918fe159f86d8e030acfa71b168531e97c8c98e798097a3c8229ad24d9cb", &(0x7f0000000540)=""/101, 0x15, 0x10000, 0x2, &(0x7f0000000340)}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x10\'\\@$&\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055300)={0x8f7, [{0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r5}, {}, {}, {r3}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {r3}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, r4}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x0, "0d4abfd4b32220"}) r185 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000840)={0x0, 0xfaef, 0xffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r185, 0x0) r186 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r186, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r186, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0xfffffffffffffeff, 0x1) sendto$inet(r186, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b300)={0xffff, [{r72, r60}, {}, {r110}, {r161}, {}, {r172}, {}, {}, {r103}, {}, {r135}, {}, {0x0, r52}, {0x0, r40}, {0x0, r182}, {r127, r14}, {r160, r32}, {r177, r58}, {}, {r13, r176}, {0x0, r180}, {r11}, {r19, r24}, {r28}, {r129}, {0x0, r33}, {}, {}, {}, {r104, r49}, {}, {}, {r47}, {r116, r158}, {0x0, r9}, {r56}, {0x0, r38}, {0x0, r37}, {}, {}, {0x0, r174}, {}, {r104}, {r126}, {r107, r143}, {0x0, r124}, {}, {}, {0x0, r61}, {}, {}, {0x0, r117}, {r116}, {r66}, {r89, r99}, {}, {}, {}, {r168}, {r34}, {r131, r152}, {}, {}, {r72}, {0x0, r96}, {}, {}, {0x0, r80}, {r78, r137}, {r41}, {0x0, r80}, {}, {0x0, r85}, {r55}, {0x0, r50}, {r25, r170}, {r6}, {r62}, {r179, r12}, {r175}, {0x0, r22}, {r17, r174}, {r46}, {}, {r139, r75}, {r36, r31}, {}, {}, {r140, r100}, {0x0, r92}, {r108}, {r69}, {r181}, {}, {}, {r161}, {r173}, {}, {0x0, r112}, {r101, r7}, {0x0, r144}, {r91}, {}, {r93}, {}, {r95}, {0x0, r114}, {0x0, r134}, {r115}, {}, {r23}, {0x0, r68}, {r51}, {0x0, r90}, {0x0, r109}, {r57, r167}, {0x0, r156}, {r15, r29}, {}, {r97}, {r101, r120}, {}, {r83, r117}, {}, {0x0, r102}, {}, {r181}, {}, {}, {}, {r71}, {r155, r149}, {}, {r154, r65}, {}, {r159, r79}, {0x0, r184}, {r138, r54}, {r42}, {}, {}, {0x0, r48}, {r39}, {}, {0x0, r18}, {r138}, {r165}, {r146}, {0x0, r143}, {}, {r70, r122}, {r20, r105}, {r119}, {r183}, {r113, r45}, {}, {}, {0x0, r100}, {r72}, {}, {0x0, r128}, {0x0, r81}, {r141}, {}, {r171, r84}, {r97}, {}, {r10, r38}, {r177}, {}, {r47, r106}, {0x0, r143}, {r113}, {}, {r145}, {r69}, {r57}, {0x0, r162}, {0x0, r35}, {r87}, {0x0, r53}, {}, {r118, r106}, {0x0, r76}, {r123, r150}, {r121}, {}, {}, {r8}, {}, {}, {}, {}, {}, {r151, r130}, {}, {r181, r35}, {r94, r90}, {r82}, {r72}, {r16}, {}, {r135, r44}, {0x0, r88}, {r123}, {r129}, {r98}, {}, {}, {0x0, r164}, {0x0, r27}, {r157}, {0x0, r63}, {0x0, r43}, {0x0, r59}, {0x0, r43}, {0x0, r27}, {r121, r67}, {}, {r86, r43}, {0x0, r166}, {r34}, {0x0, r73}, {r30, r148}, {}, {}, {}, {}, {0x0, r147}, {r56, r31}, {r115}, {r145, r21}, {r64}, {0x0, r142}, {}, {r136}, {}, {r133, r84}, {0x0, r164}, {0x0, r111}, {0x0, r125}, {0x0, r100}, {}, {0x0, r178}, {r16}, {r179, r153}, {}, {r62, r33}, {r163, r169}, {}, {}, {r26}, {0x0, r74}, {r56, r132}, {r77}], 0x0, "e8da0117d3c471"}) 02:21:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000202000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:52 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000001c00000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:52 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006c02000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:52 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f0000000000000002000a0006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200003000002000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:52 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000002600000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 936.909754][T14765] loop2: detected capacity change from 0 to 4096 [ 936.916277][T14764] loop1: detected capacity change from 0 to 4 [ 936.923327][T14766] loop4: detected capacity change from 0 to 4096 [ 936.929999][ C0] sd 0:0:1:0: tag#5308 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 936.939831][ C0] sd 0:0:1:0: tag#5308 CDB: opcode=0xe5 (vendor) [ 936.941636][T14772] loop3: detected capacity change from 0 to 4096 02:21:52 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000052a00000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 936.946196][ C0] sd 0:0:1:0: tag#5308 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 936.961657][ C0] sd 0:0:1:0: tag#5308 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 936.970696][ C0] sd 0:0:1:0: tag#5308 CDB[20]: ba [ 936.976222][T14766] EXT4-fs (loop4): Invalid log block size: 655362 [ 936.983236][T14764] EXT4-fs (loop1): #clusters per group too big: 32768 [ 936.995846][T14765] EXT4-fs (loop2): bad geometry: first data block 33816576 is beyond end of filesystem (512) 02:21:52 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f0000000000000002000b0006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000302000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200004000002000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 937.000036][ C0] sd 0:0:1:0: tag#5309 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 937.009559][T14772] EXT4-fs (loop3): bad geometry: block count 620 exceeds size of device (512 blocks) [ 937.015902][ C0] sd 0:0:1:0: tag#5309 CDB: opcode=0xe4 (vendor) [ 937.015936][ C0] sd 0:0:1:0: tag#5309 CDB[00]: e4 9d 02 8c 07 15 e2 0b 51 04 22 69 36 00 59 73 [ 937.040752][ C0] sd 0:0:1:0: tag#5309 CDB[10]: 91 8f e1 59 f8 6d 8e 03 0a cf a7 1b 16 85 31 e9 [ 937.049810][ C0] sd 0:0:1:0: tag#5309 CDB[20]: 7c 8c 98 e7 98 09 7a 3c 82 29 ad 24 d9 cb 02:21:52 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000027202000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 937.120645][T14792] loop1: detected capacity change from 0 to 4 [ 937.130248][T14787] loop2: detected capacity change from 0 to 4096 [ 937.138153][T14792] EXT4-fs (loop1): #clusters per group too big: 32768 [ 937.148987][T14802] loop3: detected capacity change from 0 to 4096 [ 937.168156][T14787] EXT4-fs (loop2): bad geometry: first data block 33816576 is beyond end of filesystem (512) [ 937.181937][T14802] EXT4-fs (loop3): bad geometry: block count 626 exceeds size of device (512 blocks) [ 937.216981][T14787] loop2: detected capacity change from 0 to 4096 [ 937.231289][T14787] EXT4-fs (loop2): bad geometry: first data block 33816576 is beyond end of filesystem (512) 02:21:53 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x97, 0x0, 0x7, 0x0, 0x0, 0x28300, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x418, 0x0, @perf_config_ext={0x4118, 0x100}, 0x800, 0x7, 0x0, 0x8, 0x0, 0xed7, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x3b, 0x5, 0x0, 0x0, 0xcc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xcb8, 0x80}, 0x480, 0xffffffffffffffe0, 0x0, 0x0, 0x20, 0x0, 0x173, 0x0, 0x4bf, 0x0, 0xe408}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000f00)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000004c0)={0x53, 0xffffffffffffffff, 0x2e, 0x6, @scatter={0x2, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000d40)=""/136, 0x88}, {&(0x7f0000000e00)=""/208, 0xd0}]}, &(0x7f00000001c0)="e49d028c0715e20b5104226936005973918fe159f86d8e030acfa71b168531e97c8c98e798097a3c8229ad24d9cb", &(0x7f0000000540)=""/101, 0x15, 0x10000, 0x2, &(0x7f0000000340)}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x10\'\\@$&\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055300)={0x8f7, [{0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r5}, {}, {}, {r3}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {r3}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, r4}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x0, "0d4abfd4b32220"}) r185 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000840)={0x0, 0xfaef, 0xffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r185, 0x0) r186 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r186, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r186, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0xfffffffffffffeff, 0x1) sendto$inet(r186, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b300)={0xffff, [{r72, r60}, {}, {r110}, {r161}, {}, {r172}, {}, {}, {r103}, {}, {r135}, {}, {0x0, r52}, {0x0, r40}, {0x0, r182}, {r127, r14}, {r160, r32}, {r177, r58}, {}, {r13, r176}, {0x0, r180}, {r11}, {r19, r24}, {r28}, {r129}, {0x0, r33}, {}, {}, {}, {r104, r49}, {}, {}, {r47}, {r116, r158}, {0x0, r9}, {r56}, {0x0, r38}, {0x0, r37}, {}, {}, {0x0, r174}, {}, {r104}, {r126}, {r107, r143}, {0x0, r124}, {}, {}, {0x0, r61}, {}, {}, {0x0, r117}, {r116}, {r66}, {r89, r99}, {}, {}, {}, {r168}, {r34}, {r131, r152}, {}, {}, {r72}, {0x0, r96}, {}, {}, {0x0, r80}, {r78, r137}, {r41}, {0x0, r80}, {}, {0x0, r85}, {r55}, {0x0, r50}, {r25, r170}, {r6}, {r62}, {r179, r12}, {r175}, {0x0, r22}, {r17, r174}, {r46}, {}, {r139, r75}, {r36, r31}, {}, {}, {r140, r100}, {0x0, r92}, {r108}, {r69}, {r181}, {}, {}, {r161}, {r173}, {}, {0x0, r112}, {r101, r7}, {0x0, r144}, {r91}, {}, {r93}, {}, {r95}, {0x0, r114}, {0x0, r134}, {r115}, {}, {r23}, {0x0, r68}, {r51}, {0x0, r90}, {0x0, r109}, {r57, r167}, {0x0, r156}, {r15, r29}, {}, {r97}, {r101, r120}, {}, {r83, r117}, {}, {0x0, r102}, {}, {r181}, {}, {}, {}, {r71}, {r155, r149}, {}, {r154, r65}, {}, {r159, r79}, {0x0, r184}, {r138, r54}, {r42}, {}, {}, {0x0, r48}, {r39}, {}, {0x0, r18}, {r138}, {r165}, {r146}, {0x0, r143}, {}, {r70, r122}, {r20, r105}, {r119}, {r183}, {r113, r45}, {}, {}, {0x0, r100}, {r72}, {}, {0x0, r128}, {0x0, r81}, {r141}, {}, {r171, r84}, {r97}, {}, {r10, r38}, {r177}, {}, {r47, r106}, {0x0, r143}, {r113}, {}, {r145}, {r69}, {r57}, {0x0, r162}, {0x0, r35}, {r87}, {0x0, r53}, {}, {r118, r106}, {0x0, r76}, {r123, r150}, {r121}, {}, {}, {r8}, {}, {}, {}, {}, {}, {r151, r130}, {}, {r181, r35}, {r94, r90}, {r82}, {r72}, {r16}, {}, {r135, r44}, {0x0, r88}, {r123}, {r129}, {r98}, {}, {}, {0x0, r164}, {0x0, r27}, {r157}, {0x0, r63}, {0x0, r43}, {0x0, r59}, {0x0, r43}, {0x0, r27}, {r121, r67}, {}, {r86, r43}, {0x0, r166}, {r34}, {0x0, r73}, {r30, r148}, {}, {}, {}, {}, {0x0, r147}, {r56, r31}, {r115}, {r145, r21}, {r64}, {0x0, r142}, {}, {r136}, {}, {r133, r84}, {0x0, r164}, {0x0, r111}, {0x0, r125}, {0x0, r100}, {}, {0x0, r178}, {r16}, {r179, r153}, {}, {r62, r33}, {r163, r169}, {}, {}, {r26}, {0x0, r74}, {r56, r132}, {r77}], 0x0, "e8da0117d3c471"}) 02:21:53 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000003f00000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000402000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:53 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f0000000000000002000c0006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:53 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000007402000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200005000002000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 937.805705][T14828] loop1: detected capacity change from 0 to 4 [ 937.809350][T14830] loop3: detected capacity change from 0 to 4096 [ 937.813874][ C1] sd 0:0:1:0: tag#5310 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 937.821948][T14834] loop2: detected capacity change from 0 to 4096 [ 937.827962][ C1] sd 0:0:1:0: tag#5310 CDB: opcode=0xe5 (vendor) [ 937.840697][ C1] sd 0:0:1:0: tag#5310 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c 02:21:53 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000004000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 937.849761][ C1] sd 0:0:1:0: tag#5310 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 937.852376][T14830] EXT4-fs (loop3): bad geometry: block count 628 exceeds size of device (512 blocks) [ 937.858797][ C1] sd 0:0:1:0: tag#5310 CDB[20]: ba [ 937.874307][T14831] loop4: detected capacity change from 0 to 4096 [ 937.883317][T14834] EXT4-fs (loop2): bad geometry: first data block 33816576 is beyond end of filesystem (512) [ 937.893847][T14828] EXT4-fs (loop1): #clusters per group too big: 32768 02:21:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200006000002000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 937.901522][T14831] EXT4-fs (loop4): Invalid log block size: 786434 02:21:53 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000008004000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:53 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000037802000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:53 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000048000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:53 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00fffffff600000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 937.927656][ C1] sd 0:0:1:0: tag#5311 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 937.937600][ C1] sd 0:0:1:0: tag#5311 CDB: opcode=0xe4 (vendor) [ 937.943975][ C1] sd 0:0:1:0: tag#5311 CDB[00]: e4 9d 02 8c 07 15 e2 0b 51 04 22 69 36 00 59 73 [ 937.953014][ C1] sd 0:0:1:0: tag#5311 CDB[10]: 91 8f e1 59 f8 6d 8e 03 0a cf a7 1b 16 85 31 e9 [ 937.962050][ C1] sd 0:0:1:0: tag#5311 CDB[20]: 7c 8c 98 e7 98 09 7a 3c 82 29 ad 24 d9 cb [ 938.011821][T14828] loop1: detected capacity change from 0 to 4 [ 938.024197][T14828] EXT4-fs (loop1): #clusters per group too big: 32768 [ 938.029467][T14865] loop2: detected capacity change from 0 to 4096 [ 938.041251][T14868] loop3: detected capacity change from 0 to 4096 [ 938.073580][T14865] EXT4-fs (loop2): bad geometry: first data block 33816576 is beyond end of filesystem (512) [ 938.085087][T14868] EXT4-fs (loop3): bad geometry: block count 632 exceeds size of device (512 blocks) [ 938.116808][T14865] loop2: detected capacity change from 0 to 4096 [ 938.133916][T14865] EXT4-fs (loop2): bad geometry: first data block 33816576 is beyond end of filesystem (512) 02:21:54 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00fffffffe00000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:54 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f0000000000000002000d0006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000502000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:54 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000037902000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:54 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x97, 0x0, 0x7, 0x0, 0x0, 0x28300, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x418, 0x0, @perf_config_ext={0x4118, 0x100}, 0x800, 0x7, 0x0, 0x8, 0x0, 0xed7, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x3b, 0x5, 0x0, 0x0, 0xcc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xcb8, 0x80}, 0x480, 0xffffffffffffffe0, 0x0, 0x0, 0x20, 0x0, 0x173, 0x0, 0x4bf, 0x0, 0xe408}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000f00)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000004c0)={0x53, 0xffffffffffffffff, 0x2e, 0x6, @scatter={0x2, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000d40)=""/136, 0x88}, {&(0x7f0000000e00)=""/208, 0xd0}]}, &(0x7f00000001c0)="e49d028c0715e20b5104226936005973918fe159f86d8e030acfa71b168531e97c8c98e798097a3c8229ad24d9cb", &(0x7f0000000540)=""/101, 0x15, 0x10000, 0x2, &(0x7f0000000340)}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x10\'\\@$&\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055300)={0x8f7, [{0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r5}, {}, {}, {r3}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {r3}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, r4}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x0, "0d4abfd4b32220"}) r185 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000840)={0x0, 0xfaef, 0xffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r185, 0x0) r186 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r186, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r186, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0xfffffffffffffeff, 0x1) sendto$inet(r186, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b300)={0xffff, [{r72, r60}, {}, {r110}, {r161}, {}, {r172}, {}, {}, {r103}, {}, {r135}, {}, {0x0, r52}, {0x0, r40}, {0x0, r182}, {r127, r14}, {r160, r32}, {r177, r58}, {}, {r13, r176}, {0x0, r180}, {r11}, {r19, r24}, {r28}, {r129}, {0x0, r33}, {}, {}, {}, {r104, r49}, {}, {}, {r47}, {r116, r158}, {0x0, r9}, {r56}, {0x0, r38}, {0x0, r37}, {}, {}, {0x0, r174}, {}, {r104}, {r126}, {r107, r143}, {0x0, r124}, {}, {}, {0x0, r61}, {}, {}, {0x0, r117}, {r116}, {r66}, {r89, r99}, {}, {}, {}, {r168}, {r34}, {r131, r152}, {}, {}, {r72}, {0x0, r96}, {}, {}, {0x0, r80}, {r78, r137}, {r41}, {0x0, r80}, {}, {0x0, r85}, {r55}, {0x0, r50}, {r25, r170}, {r6}, {r62}, {r179, r12}, {r175}, {0x0, r22}, {r17, r174}, {r46}, {}, {r139, r75}, {r36, r31}, {}, {}, {r140, r100}, {0x0, r92}, {r108}, {r69}, {r181}, {}, {}, {r161}, {r173}, {}, {0x0, r112}, {r101, r7}, {0x0, r144}, {r91}, {}, {r93}, {}, {r95}, {0x0, r114}, {0x0, r134}, {r115}, {}, {r23}, {0x0, r68}, {r51}, {0x0, r90}, {0x0, r109}, {r57, r167}, {0x0, r156}, {r15, r29}, {}, {r97}, {r101, r120}, {}, {r83, r117}, {}, {0x0, r102}, {}, {r181}, {}, {}, {}, {r71}, {r155, r149}, {}, {r154, r65}, {}, {r159, r79}, {0x0, r184}, {r138, r54}, {r42}, {}, {}, {0x0, r48}, {r39}, {}, {0x0, r18}, {r138}, {r165}, {r146}, {0x0, r143}, {}, {r70, r122}, {r20, r105}, {r119}, {r183}, {r113, r45}, {}, {}, {0x0, r100}, {r72}, {}, {0x0, r128}, {0x0, r81}, {r141}, {}, {r171, r84}, {r97}, {}, {r10, r38}, {r177}, {}, {r47, r106}, {0x0, r143}, {r113}, {}, {r145}, {r69}, {r57}, {0x0, r162}, {0x0, r35}, {r87}, {0x0, r53}, {}, {r118, r106}, {0x0, r76}, {r123, r150}, {r121}, {}, {}, {r8}, {}, {}, {}, {}, {}, {r151, r130}, {}, {r181, r35}, {r94, r90}, {r82}, {r72}, {r16}, {}, {r135, r44}, {0x0, r88}, {r123}, {r129}, {r98}, {}, {}, {0x0, r164}, {0x0, r27}, {r157}, {0x0, r63}, {0x0, r43}, {0x0, r59}, {0x0, r43}, {0x0, r27}, {r121, r67}, {}, {r86, r43}, {0x0, r166}, {r34}, {0x0, r73}, {r30, r148}, {}, {}, {}, {}, {0x0, r147}, {r56, r31}, {r115}, {r145, r21}, {r64}, {0x0, r142}, {}, {r136}, {}, {r133, r84}, {0x0, r164}, {0x0, r111}, {0x0, r125}, {0x0, r100}, {}, {0x0, r178}, {r16}, {r179, r153}, {}, {r62, r33}, {r163, r169}, {}, {}, {r26}, {0x0, r74}, {r56, r132}, {r77}], 0x0, "e8da0117d3c471"}) 02:21:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200007000002000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 938.686216][T14895] loop2: detected capacity change from 0 to 4096 [ 938.693470][T14896] loop4: detected capacity change from 0 to 4096 [ 938.707636][T14901] loop3: detected capacity change from 0 to 4096 [ 938.712751][T14904] loop1: detected capacity change from 0 to 4 [ 938.737125][ C0] sd 0:0:1:0: tag#5248 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 938.746986][ C0] sd 0:0:1:0: tag#5248 CDB: opcode=0xe5 (vendor) [ 938.747716][T14901] EXT4-fs (loop3): bad geometry: block count 633 exceeds size of device (512 blocks) [ 938.753339][ C0] sd 0:0:1:0: tag#5248 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 938.753357][ C0] sd 0:0:1:0: tag#5248 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d 02:21:54 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00f6ffffff00000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 938.770899][T14895] EXT4-fs (loop2): bad geometry: first data block 33816576 is beyond end of filesystem (512) [ 938.771827][ C0] sd 0:0:1:0: tag#5248 CDB[20]: ba [ 938.783363][ C0] sd 0:0:1:0: tag#5249 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 938.798553][T14904] EXT4-fs (loop1): #clusters per group too big: 32768 [ 938.805930][ C0] sd 0:0:1:0: tag#5249 CDB: opcode=0xe4 (vendor) [ 938.819032][ C0] sd 0:0:1:0: tag#5249 CDB[00]: e4 9d 02 8c 07 15 e2 0b 51 04 22 69 36 00 59 73 [ 938.828170][ C0] sd 0:0:1:0: tag#5249 CDB[10]: 91 8f e1 59 f8 6d 8e 03 0a cf a7 1b 16 85 31 e9 02:21:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000602000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:54 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00feffffff00000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:54 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000002000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 938.830416][T14896] EXT4-fs (loop4): Invalid log block size: 851970 [ 938.837211][ C0] sd 0:0:1:0: tag#5249 CDB[20]: 7c 8c 98 e7 98 09 7a 3c 82 29 ad 24 d9 cb 02:21:54 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000003000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200008000002000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 938.895547][T14917] loop1: detected capacity change from 0 to 4 [ 938.897966][T14895] loop2: detected capacity change from 0 to 4096 [ 938.909341][T14896] loop4: detected capacity change from 0 to 4096 [ 938.912571][T14901] loop3: detected capacity change from 0 to 4096 [ 938.922461][T14917] EXT4-fs (loop1): #clusters per group too big: 32768 [ 938.930533][T14895] EXT4-fs (loop2): bad geometry: first data block 33816576 is beyond end of filesystem (512) 02:21:54 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f0000000000000002000e0006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:54 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000004000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:54 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000007a02000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:54 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000005000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 938.985091][T14917] loop1: detected capacity change from 0 to 4 [ 938.992615][T14917] EXT4-fs (loop1): #clusters per group too big: 32768 [ 938.996476][T14951] loop2: detected capacity change from 0 to 4096 [ 939.024807][T14951] EXT4-fs (loop2): bad geometry: first data block 33816576 is beyond end of filesystem (512) [ 939.067693][T14951] loop2: detected capacity change from 0 to 4096 [ 939.078328][T14970] loop3: detected capacity change from 0 to 4096 [ 939.088118][T14971] loop4: detected capacity change from 0 to 4096 [ 939.102733][T14970] EXT4-fs (loop3): bad geometry: block count 634 exceeds size of device (512 blocks) [ 939.113306][T14951] EXT4-fs (loop2): bad geometry: first data block 33816576 is beyond end of filesystem (512) [ 939.125763][T14971] EXT4-fs (loop4): Invalid log block size: 917506 02:21:54 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x97, 0x0, 0x7, 0x0, 0x0, 0x28300, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x418, 0x0, @perf_config_ext={0x4118, 0x100}, 0x800, 0x7, 0x0, 0x8, 0x0, 0xed7, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x3b, 0x5, 0x0, 0x0, 0xcc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xcb8, 0x80}, 0x480, 0xffffffffffffffe0, 0x0, 0x0, 0x20, 0x0, 0x173, 0x0, 0x4bf, 0x0, 0xe408}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000f00)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000004c0)={0x53, 0xffffffffffffffff, 0x2e, 0x6, @scatter={0x2, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000d40)=""/136, 0x88}, {&(0x7f0000000e00)=""/208, 0xd0}]}, &(0x7f00000001c0)="e49d028c0715e20b5104226936005973918fe159f86d8e030acfa71b168531e97c8c98e798097a3c8229ad24d9cb", &(0x7f0000000540)=""/101, 0x15, 0x10000, 0x2, &(0x7f0000000340)}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x10\'\\@$&\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055300)={0x8f7, [{0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r5}, {}, {}, {r3}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {r3}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, r4}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x0, "0d4abfd4b32220"}) r185 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000840)={0x0, 0xfaef, 0xffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r185, 0x0) r186 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r186, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r186, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0xfffffffffffffeff, 0x1) sendto$inet(r186, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b300)={0xffff, [{r72, r60}, {}, {r110}, {r161}, {}, {r172}, {}, {}, {r103}, {}, {r135}, {}, {0x0, r52}, {0x0, r40}, {0x0, r182}, {r127, r14}, {r160, r32}, {r177, r58}, {}, {r13, r176}, {0x0, r180}, {r11}, {r19, r24}, {r28}, {r129}, {0x0, r33}, {}, {}, {}, {r104, r49}, {}, {}, {r47}, {r116, r158}, {0x0, r9}, {r56}, {0x0, r38}, {0x0, r37}, {}, {}, {}, {}, {r104, r32}, {r126}, {r107, r143}, {0x0, r124}, {}, {}, {0x0, r61}, {}, {}, {0x0, r117}, {r116}, {r66}, {r89, r99}, {}, {}, {}, {r168}, {r34}, {r131, r152}, {}, {}, {r72}, {0x0, r96}, {}, {}, {0x0, r80}, {r78, r137}, {r41}, {0x0, r80}, {}, {0x0, r85}, {r55}, {0x0, r50}, {r25, r170}, {r6}, {r62}, {r179, r12}, {r175}, {0x0, r22}, {r17, r174}, {r46}, {}, {r139, r75}, {r36, r31}, {}, {}, {r140, r100}, {0x0, r92}, {r108}, {r69}, {r181}, {}, {}, {r161}, {r173}, {}, {0x0, r112}, {r101, r7}, {0x0, r144}, {r91}, {}, {r93}, {}, {r95}, {0x0, r114}, {0x0, r134}, {r115}, {}, {r23}, {0x0, r68}, {r51}, {0x0, r90}, {0x0, r109}, {r57, r167}, {0x0, r156}, {r15, r29}, {}, {r97}, {r101, r120}, {}, {r83, r117}, {}, {0x0, r102}, {}, {r181}, {}, {}, {}, {r71}, {r155, r149}, {}, {r154, r65}, {}, {r159, r79}, {0x0, r184}, {r138, r54}, {r42}, {}, {}, {0x0, r48}, {r39}, {}, {0x0, r18}, {r138}, {r165}, {r146}, {0x0, r143}, {}, {r70, r122}, {r20, r105}, {r119}, {r183}, {r113, r45}, {}, {}, {0x0, r100}, {r72}, {}, {0x0, r128}, {0x0, r81}, {r141}, {}, {r171, r84}, {r97}, {}, {r10, r38}, {r177}, {}, {r47, r106}, {0x0, r143}, {r113}, {}, {r145}, {r69}, {r57}, {0x0, r162}, {0x0, r35}, {r87}, {0x0, r53}, {}, {r118, r106}, {0x0, r76}, {r123, r150}, {r121}, {}, {}, {r8}, {}, {}, {}, {}, {}, {r151, r130}, {}, {r181, r35}, {r94, r90}, {r82}, {r72}, {r16}, {}, {r135, r44}, {0x0, r88}, {r123}, {r129}, {r98}, {}, {}, {0x0, r164}, {0x0, r27}, {r157}, {0x0, r63}, {0x0, r43}, {0x0, r59}, {0x0, r43}, {0x0, r27}, {r121, r67}, {}, {r86, r43}, {0x0, r166}, {r34}, {0x0, r73}, {r30, r148}, {}, {}, {}, {}, {0x0, r147}, {r56, r31}, {r115}, {r145, r21}, {r64}, {0x0, r142}, {}, {r136}, {}, {r133, r84}, {0x0, r164}, {0x0, r111}, {0x0, r125}, {0x0, r100}, {}, {0x0, r178}, {r16}, {r179, r153}, {}, {r62, r33}, {r163, r169}, {}, {}, {r26}, {0x0, r74}, {r56, r132}, {r77}], 0x0, "e8da0117d3c471"}) 02:21:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000702000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:54 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000006000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:54 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f0000000000000002000f0006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:54 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000007e02000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200009000002000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:55 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000000000000e000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 939.594547][T14995] loop4: detected capacity change from 0 to 4096 [ 939.606798][T14999] loop2: detected capacity change from 0 to 4096 [ 939.606833][T15000] loop3: detected capacity change from 0 to 4096 [ 939.613983][T14996] loop1: detected capacity change from 0 to 4 [ 939.627824][T15000] EXT4-fs (loop3): bad geometry: block count 638 exceeds size of device (512 blocks) [ 939.628365][T14995] EXT4-fs (loop4): Invalid log block size: 983042 02:21:55 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f0000000000000002f80f0006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 939.648061][ C0] sd 0:0:1:0: tag#5250 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 939.657941][ C0] sd 0:0:1:0: tag#5250 CDB: opcode=0xe5 (vendor) [ 939.664295][ C0] sd 0:0:1:0: tag#5250 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 939.673437][ C0] sd 0:0:1:0: tag#5250 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 939.682469][ C0] sd 0:0:1:0: tag#5250 CDB[20]: ba [ 939.686721][T14999] EXT4-fs (loop2): bad geometry: first data block 33816576 is beyond end of filesystem (512) [ 939.700385][T14996] EXT4-fs (loop1): #clusters per group too big: 32768 [ 939.711970][ C0] sd 0:0:1:0: tag#5251 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 939.721905][ C0] sd 0:0:1:0: tag#5251 CDB: opcode=0xe4 (vendor) [ 939.728267][ C0] sd 0:0:1:0: tag#5251 CDB[00]: e4 9d 02 8c 07 15 e2 0b 51 04 22 69 36 00 59 73 [ 939.737300][ C0] sd 0:0:1:0: tag#5251 CDB[10]: 91 8f e1 59 f8 6d 8e 03 0a cf a7 1b 16 85 31 e9 02:21:55 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000038302000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:55 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000000000000f000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:55 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000000000001b000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 939.747740][ C0] sd 0:0:1:0: tag#5251 CDB[20]: 7c 8c 98 e7 98 09 7a 3c 82 29 ad 24 d9 cb [ 939.783330][T15015] loop4: detected capacity change from 0 to 4096 [ 939.789939][T15019] loop3: detected capacity change from 0 to 4096 02:21:55 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000020000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 939.790167][T14996] loop1: detected capacity change from 0 to 4 [ 939.800762][T15015] EXT4-fs (loop4): Invalid log block size: 1046530 [ 939.814878][T15019] EXT4-fs (loop3): bad geometry: block count 643 exceeds size of device (512 blocks) [ 939.826446][T14999] loop2: detected capacity change from 0 to 4096 02:21:55 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x97, 0x0, 0x7, 0x0, 0x0, 0x28300, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x418, 0x0, @perf_config_ext={0x4118, 0x100}, 0x800, 0x7, 0x0, 0x8, 0x0, 0xed7, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x3b, 0x5, 0x0, 0x0, 0xcc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xcb8, 0x80}, 0x480, 0xffffffffffffffe0, 0x0, 0x0, 0x20, 0x0, 0x173, 0x0, 0x4bf, 0x0, 0xe408}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000f00)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000004c0)={0x53, 0xffffffffffffffff, 0x2e, 0x6, @scatter={0x2, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000d40)=""/136, 0x88}, {&(0x7f0000000e00)=""/208, 0xd0}]}, &(0x7f00000001c0)="e49d028c0715e20b5104226936005973918fe159f86d8e030acfa71b168531e97c8c98e798097a3c8229ad24d9cb", &(0x7f0000000540)=""/101, 0x15, 0x10000, 0x2, &(0x7f0000000340)}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x10\'\\@$&\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055300)={0x8f7, [{0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r5}, {}, {}, {r3}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {r3}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, r4}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x0, "0d4abfd4b32220"}) r185 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000840)={0x0, 0xfaef, 0xffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r185, 0x0) r186 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r186, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r186, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0xfffffffffffffeff, 0x1) sendto$inet(r186, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b300)={0xffff, [{r72, r60}, {}, {r110}, {r161}, {}, {r172}, {}, {}, {r103}, {}, {r135}, {}, {0x0, r52}, {0x0, r40}, {0x0, r182}, {r127, r14}, {r160, r32}, {r177, r58}, {}, {r13, r176}, {0x0, r180}, {r11}, {r19, r24}, {r28}, {r129}, {0x0, r33}, {}, {}, {}, {r104, r49}, {}, {}, {r47}, {r116, r158}, {0x0, r9}, {r56}, {0x0, r38}, {0x0, r37}, {}, {}, {}, {}, {r104, r32}, {r126}, {r107, r143}, {0x0, r124}, {}, {}, {0x0, r61}, {}, {}, {0x0, r117}, {r116}, {r66}, {r89, r99}, {}, {}, {}, {r168}, {r34}, {r131, r152}, {}, {}, {r72}, {0x0, r96}, {}, {}, {0x0, r80}, {r78, r137}, {r41}, {0x0, r80}, {}, {0x0, r85}, {r55}, {0x0, r50}, {r25, r170}, {r6}, {r62}, {r179, r12}, {r175}, {0x0, r22}, {r17, r174}, {r46}, {}, {r139, r75}, {r36, r31}, {}, {}, {r140, r100}, {0x0, r92}, {r108}, {r69}, {r181}, {}, {}, {r161}, {r173}, {}, {0x0, r112}, {r101, r7}, {0x0, r144}, {r91}, {}, {r93}, {}, {r95}, {0x0, r114}, {0x0, r134}, {r115}, {}, {r23}, {0x0, r68}, {r51}, {0x0, r90}, {0x0, r109}, {r57, r167}, {0x0, r156}, {r15, r29}, {}, {r97}, {r101, r120}, {}, {r83, r117}, {}, {0x0, r102}, {}, {r181}, {}, {}, {}, {r71}, {r155, r149}, {}, {r154, r65}, {}, {r159, r79}, {0x0, r184}, {r138, r54}, {r42}, {}, {}, {0x0, r48}, {r39}, {}, {0x0, r18}, {r138}, {r165}, {r146}, {0x0, r143}, {}, {r70, r122}, {r20, r105}, {r119}, {r183}, {r113, r45}, {}, {}, {0x0, r100}, {r72}, {}, {0x0, r128}, {0x0, r81}, {r141}, {}, {r171, r84}, {r97}, {}, {r10, r38}, {r177}, {}, {r47, r106}, {0x0, r143}, {r113}, {}, {r145}, {r69}, {r57}, {0x0, r162}, {0x0, r35}, {r87}, {0x0, r53}, {}, {r118, r106}, {0x0, r76}, {r123, r150}, {r121}, {}, {}, {r8}, {}, {}, {}, {}, {}, {r151, r130}, {}, {r181, r35}, {r94, r90}, {r82}, {r72}, {r16}, {}, {r135, r44}, {0x0, r88}, {r123}, {r129}, {r98}, {}, {}, {0x0, r164}, {0x0, r27}, {r157}, {0x0, r63}, {0x0, r43}, {0x0, r59}, {0x0, r43}, {0x0, r27}, {r121, r67}, {}, {r86, r43}, {0x0, r166}, {r34}, {0x0, r73}, {r30, r148}, {}, {}, {}, {}, {0x0, r147}, {r56, r31}, {r115}, {r145, r21}, {r64}, {0x0, r142}, {}, {r136}, {}, {r133, r84}, {0x0, r164}, {0x0, r111}, {0x0, r125}, {0x0, r100}, {}, {0x0, r178}, {r16}, {r179, r153}, {}, {r62, r33}, {r163, r169}, {}, {}, {r26}, {0x0, r74}, {r56, r132}, {r77}], 0x0, "e8da0117d3c471"}) 02:21:55 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000220100006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:55 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000018402000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000802000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000a000002000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:55 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000000000003f000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 940.095580][T15060] loop2: detected capacity change from 0 to 4096 [ 940.100464][T15059] loop1: detected capacity change from 0 to 4 [ 940.102579][T15061] loop3: detected capacity change from 0 to 4096 [ 940.117066][T15062] loop4: detected capacity change from 0 to 4096 [ 940.135684][T15060] EXT4-fs (loop2): bad geometry: first data block 33816576 is beyond end of filesystem (512) 02:21:55 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000040000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 940.150238][T15059] EXT4-fs (loop1): #clusters per group too big: 32768 [ 940.162993][T15062] EXT4-fs (loop4): Invalid log block size: 1056770 [ 940.171052][T15061] EXT4-fs (loop3): bad geometry: block count 644 exceeds size of device (512 blocks) [ 940.190583][T15059] loop1: detected capacity change from 0 to 4 02:21:55 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200110006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:55 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000000000001f0447000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 940.197108][T15059] EXT4-fs (loop1): #clusters per group too big: 32768 02:21:55 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20ffffff8502000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000902000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:55 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00fffffffffffffffe000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 940.245353][T15060] loop2: detected capacity change from 0 to 4096 [ 940.258837][T15097] loop4: detected capacity change from 0 to 4096 [ 940.269497][T15060] EXT4-fs (loop2): bad geometry: first data block 33816576 is beyond end of filesystem (512) [ 940.300979][T15104] loop1: detected capacity change from 0 to 4 [ 940.311043][T15104] EXT4-fs (loop1): #clusters per group too big: 32768 [ 940.324759][T15097] EXT4-fs (loop4): Invalid log block size: 1114114 [ 940.332717][T15107] loop3: detected capacity change from 0 to 4096 [ 940.358529][T15107] EXT4-fs (loop3): bad geometry: block count 645 exceeds size of device (512 blocks) [ 940.369200][T15104] loop1: detected capacity change from 0 to 4 [ 940.380301][T15104] EXT4-fs (loop1): #clusters per group too big: 32768 02:21:56 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x97, 0x0, 0x7, 0x0, 0x0, 0x28300, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x418, 0x0, @perf_config_ext={0x4118, 0x100}, 0x800, 0x7, 0x0, 0x8, 0x0, 0xed7, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x3b, 0x5, 0x0, 0x0, 0xcc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xcb8, 0x80}, 0x480, 0xffffffffffffffe0, 0x0, 0x0, 0x20, 0x0, 0x173, 0x0, 0x4bf, 0x0, 0xe408}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000f00)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000004c0)={0x53, 0xffffffffffffffff, 0x2e, 0x6, @scatter={0x2, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000d40)=""/136, 0x88}, {&(0x7f0000000e00)=""/208, 0xd0}]}, &(0x7f00000001c0)="e49d028c0715e20b5104226936005973918fe159f86d8e030acfa71b168531e97c8c98e798097a3c8229ad24d9cb", &(0x7f0000000540)=""/101, 0x15, 0x10000, 0x2, &(0x7f0000000340)}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x10\'\\@$&\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055300)={0x8f7, [{0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r5}, {}, {}, {r3}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {r3}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, r4}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x0, "0d4abfd4b32220"}) r185 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000840)={0x0, 0xfaef, 0xffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r185, 0x0) r186 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r186, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r186, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0xfffffffffffffeff, 0x1) sendto$inet(r186, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b300)={0xffff, [{r72, r60}, {}, {r110}, {r161}, {}, {r172}, {}, {}, {r103}, {}, {r135}, {}, {0x0, r52}, {0x0, r40}, {0x0, r182}, {r127, r14}, {r160, r32}, {r177, r58}, {}, {r13, r176}, {0x0, r180}, {r11}, {r19, r24}, {r28}, {r129}, {0x0, r33}, {}, {}, {}, {r104, r49}, {}, {}, {r47}, {r116, r158}, {0x0, r9}, {r56}, {0x0, r38}, {0x0, r37}, {}, {}, {}, {}, {r104, r32}, {r126}, {r107, r143}, {0x0, r124}, {}, {}, {0x0, r61}, {}, {}, {0x0, r117}, {r116}, {r66}, {r89, r99}, {}, {}, {}, {r168}, {r34}, {r131, r152}, {}, {}, {r72}, {0x0, r96}, {}, {}, {0x0, r80}, {r78, r137}, {r41}, {0x0, r80}, {}, {0x0, r85}, {r55}, {0x0, r50}, {r25, r170}, {r6}, {r62}, {r179, r12}, {r175}, {0x0, r22}, {r17, r174}, {r46}, {}, {r139, r75}, {r36, r31}, {}, {}, {r140, r100}, {0x0, r92}, {r108}, {r69}, {r181}, {}, {}, {r161}, {r173}, {}, {0x0, r112}, {r101, r7}, {0x0, r144}, {r91}, {}, {r93}, {}, {r95}, {0x0, r114}, {0x0, r134}, {r115}, {}, {r23}, {0x0, r68}, {r51}, {0x0, r90}, {0x0, r109}, {r57, r167}, {0x0, r156}, {r15, r29}, {}, {r97}, {r101, r120}, {}, {r83, r117}, {}, {0x0, r102}, {}, {r181}, {}, {}, {}, {r71}, {r155, r149}, {}, {r154, r65}, {}, {r159, r79}, {0x0, r184}, {r138, r54}, {r42}, {}, {}, {0x0, r48}, {r39}, {}, {0x0, r18}, {r138}, {r165}, {r146}, {0x0, r143}, {}, {r70, r122}, {r20, r105}, {r119}, {r183}, {r113, r45}, {}, {}, {0x0, r100}, {r72}, {}, {0x0, r128}, {0x0, r81}, {r141}, {}, {r171, r84}, {r97}, {}, {r10, r38}, {r177}, {}, {r47, r106}, {0x0, r143}, {r113}, {}, {r145}, {r69}, {r57}, {0x0, r162}, {0x0, r35}, {r87}, {0x0, r53}, {}, {r118, r106}, {0x0, r76}, {r123, r150}, {r121}, {}, {}, {r8}, {}, {}, {}, {}, {}, {r151, r130}, {}, {r181, r35}, {r94, r90}, {r82}, {r72}, {r16}, {}, {r135, r44}, {0x0, r88}, {r123}, {r129}, {r98}, {}, {}, {0x0, r164}, {0x0, r27}, {r157}, {0x0, r63}, {0x0, r43}, {0x0, r59}, {0x0, r43}, {0x0, r27}, {r121, r67}, {}, {r86, r43}, {0x0, r166}, {r34}, {0x0, r73}, {r30, r148}, {}, {}, {}, {}, {0x0, r147}, {r56, r31}, {r115}, {r145, r21}, {r64}, {0x0, r142}, {}, {r136}, {}, {r133, r84}, {0x0, r164}, {0x0, r111}, {0x0, r125}, {0x0, r100}, {}, {0x0, r178}, {r16}, {r179, r153}, {}, {r62, r33}, {r163, r169}, {}, {}, {r26}, {0x0, r74}, {r56, r132}, {r77}], 0x0, "e8da0117d3c471"}) 02:21:56 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200120006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000b000002000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:56 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000007ffffffffffff000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:56 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008602000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000a02000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 940.950378][T15138] loop3: detected capacity change from 0 to 4096 [ 940.971805][T15144] loop4: detected capacity change from 0 to 4096 [ 940.979591][T15145] loop1: detected capacity change from 0 to 4 [ 940.980322][T15146] loop2: detected capacity change from 0 to 4096 02:21:56 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000002000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:56 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200180006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:56 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000003000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 941.010470][T15144] EXT4-fs (loop4): Invalid log block size: 1179650 [ 941.017341][T15146] EXT4-fs (loop2): bad geometry: first data block 33816576 is beyond end of filesystem (512) [ 941.031815][T15138] EXT4-fs (loop3): bad geometry: block count 646 exceeds size of device (512 blocks) [ 941.046373][T15145] EXT4-fs (loop1): #clusters per group too big: 32768 02:21:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000c000002000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:56 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000018602000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 941.096356][T15164] loop4: detected capacity change from 0 to 4096 [ 941.115897][T15145] loop1: detected capacity change from 0 to 4 [ 941.133521][T15178] loop2: detected capacity change from 0 to 4096 [ 941.139950][T15164] EXT4-fs (loop4): Invalid log block size: 1572866 02:21:56 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000004000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 941.145118][T15181] loop3: detected capacity change from 0 to 4096 [ 941.157876][T15178] EXT4-fs (loop2): bad geometry: first data block 33816576 is beyond end of filesystem (512) [ 941.168710][T15145] EXT4-fs (loop1): #clusters per group too big: 32768 [ 941.179498][T15181] EXT4-fs (loop3): bad geometry: block count 646 exceeds size of device (512 blocks) 02:21:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000b02000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:57 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x97, 0x0, 0x7, 0x0, 0x0, 0x28300, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x418, 0x0, @perf_config_ext={0x4118, 0x100}, 0x800, 0x7, 0x0, 0x8, 0x0, 0xed7, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x3b, 0x5, 0x0, 0x0, 0xcc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xcb8, 0x80}, 0x480, 0xffffffffffffffe0, 0x0, 0x0, 0x20, 0x0, 0x173, 0x0, 0x4bf, 0x0, 0xe408}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000f00)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000004c0)={0x53, 0xffffffffffffffff, 0x2e, 0x6, @scatter={0x2, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000d40)=""/136, 0x88}, {&(0x7f0000000e00)=""/208, 0xd0}]}, &(0x7f00000001c0)="e49d028c0715e20b5104226936005973918fe159f86d8e030acfa71b168531e97c8c98e798097a3c8229ad24d9cb", &(0x7f0000000540)=""/101, 0x15, 0x10000, 0x2, &(0x7f0000000340)}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x10\'\\@$&\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055300)={0x8f7, [{0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r5}, {}, {}, {r3}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {r3}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, r4}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x0, "0d4abfd4b32220"}) r184 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000840)={0x0, 0xfaef, 0xffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r184, 0x0) r185 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r185, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r185, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0xfffffffffffffeff, 0x1) sendto$inet(r185, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b300)={0xffff, [{r71, r59}, {}, {r109}, {r160}, {}, {r171}, {}, {}, {r102}, {}, {r134}, {}, {0x0, r51}, {0x0, r39}, {0x0, r181}, {r126, r14}, {r159, r32}, {r176, r57}, {}, {r13, r175}, {0x0, r179}, {r11}, {r19, r24}, {r28}, {r128}, {0x0, r33}, {}, {}, {}, {r103, r48}, {}, {}, {r46}, {r115, r157}, {0x0, r9}, {r55}, {0x0, r37}, {}, {}, {}, {0x0, r173}, {}, {r103, r32}, {r125}, {r106, r142}, {0x0, r123}, {}, {}, {0x0, r60}, {}, {}, {0x0, r116}, {r115}, {r65}, {r88, r98}, {}, {}, {}, {r167}, {r34}, {r130, r151}, {}, {}, {r71}, {0x0, r95}, {}, {}, {0x0, r79}, {r77, r136}, {r40}, {0x0, r79}, {}, {0x0, r84}, {r54}, {0x0, r49}, {r25, r169}, {r6}, {r61}, {r178, r12}, {r174}, {0x0, r22}, {r17, r173}, {r45}, {}, {r138, r74}, {r36, r31}, {}, {}, {r139, r99}, {0x0, r91}, {r107}, {r68}, {r180}, {}, {}, {r160}, {r172}, {}, {0x0, r111}, {r100, r7}, {0x0, r143}, {r90}, {}, {r92}, {}, {r94}, {0x0, r113}, {0x0, r133}, {r114}, {}, {r23}, {0x0, r67}, {r50}, {0x0, r89}, {0x0, r108}, {r56, r166}, {0x0, r155}, {r15, r29}, {}, {r96}, {r100, r119}, {}, {r82, r116}, {}, {0x0, r101}, {}, {r180}, {}, {}, {}, {r70}, {r154, r148}, {}, {r153, r64}, {}, {r158, r78}, {0x0, r183}, {r137, r53}, {r41}, {}, {}, {0x0, r47}, {r38}, {}, {0x0, r18}, {r137}, {r164}, {r145}, {0x0, r142}, {}, {r69, r121}, {r20, r104}, {r118}, {r182}, {r112, r44}, {}, {}, {0x0, r99}, {r71}, {}, {0x0, r127}, {0x0, r80}, {r140}, {}, {r170, r83}, {r96}, {}, {r10, r37}, {r176}, {}, {r46, r105}, {0x0, r142}, {r112}, {}, {r144}, {r68}, {r56}, {0x0, r161}, {0x0, r35}, {r86}, {0x0, r52}, {}, {r117, r105}, {0x0, r75}, {r122, r149}, {r120}, {}, {}, {r8}, {}, {}, {}, {}, {}, {r150, r129}, {}, {r180, r35}, {r93, r89}, {r81}, {r71}, {r16}, {}, {r134, r43}, {0x0, r87}, {r122}, {r128}, {r97}, {}, {}, {0x0, r163}, {0x0, r27}, {r156}, {0x0, r62}, {0x0, r42}, {0x0, r58}, {0x0, r42}, {0x0, r27}, {r120, r66}, {}, {r85, r42}, {0x0, r165}, {r34}, {0x0, r72}, {r30, r147}, {}, {}, {}, {}, {0x0, r146}, {r55, r31}, {r114}, {r144, r21}, {r63}, {0x0, r141}, {}, {r135}, {}, {r132, r83}, {0x0, r163}, {0x0, r110}, {0x0, r124}, {0x0, r99}, {}, {0x0, r177}, {r16}, {r178, r152}, {}, {r61, r33}, {r162, r168}, {}, {}, {r26}, {0x0, r73}, {r55, r131}, {r76}], 0x0, "e8da0117d3c471"}) 02:21:57 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200190006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:57 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000005000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000d000002000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:57 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008702000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 941.846493][T15210] loop3: detected capacity change from 0 to 4096 [ 941.858338][T15213] loop4: detected capacity change from 0 to 4096 [ 941.859596][T15214] loop2: detected capacity change from 0 to 4096 [ 941.870391][ C1] scsi_io_completion_action: 4 callbacks suppressed [ 941.870435][ C1] sd 0:0:1:0: tag#5262 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 941.880653][T15219] loop1: detected capacity change from 0 to 4 02:21:57 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000006000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 941.887571][ C1] sd 0:0:1:0: tag#5262 CDB: opcode=0xe5 (vendor) [ 941.900040][ C1] sd 0:0:1:0: tag#5262 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 941.909117][ C1] sd 0:0:1:0: tag#5262 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 941.918160][ C1] sd 0:0:1:0: tag#5262 CDB[20]: ba [ 941.928082][T15210] EXT4-fs (loop3): bad geometry: block count 647 exceeds size of device (512 blocks) 02:21:57 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000007000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 941.942341][T15214] EXT4-fs (loop2): bad geometry: first data block 33816576 is beyond end of filesystem (512) [ 941.965343][T15213] EXT4-fs (loop4): Invalid log block size: 1638402 [ 941.972426][ C1] sd 0:0:1:0: tag#5263 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 941.982283][ C1] sd 0:0:1:0: tag#5263 CDB: opcode=0xe4 (vendor) [ 941.985792][T15219] EXT4-fs (loop1): #clusters per group too big: 32768 02:21:57 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000008000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:57 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000010000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 941.988623][ C1] sd 0:0:1:0: tag#5263 CDB[00]: e4 9d 02 8c 07 15 e2 0b 51 04 22 69 36 00 59 73 [ 942.004409][ C1] sd 0:0:1:0: tag#5263 CDB[10]: 91 8f e1 59 f8 6d 8e 03 0a cf a7 1b 16 85 31 e9 [ 942.013461][ C1] sd 0:0:1:0: tag#5263 CDB[20]: 7c 8c 98 e7 98 09 7a 3c 82 29 ad 24 d9 cb 02:21:57 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f0000000000000002001f0006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:57 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20ffffff8c02000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 942.057221][T15219] loop1: detected capacity change from 0 to 4 [ 942.064989][T15214] loop2: detected capacity change from 0 to 4096 [ 942.072002][T15214] EXT4-fs (loop2): bad geometry: first data block 33816576 is beyond end of filesystem (512) [ 942.092441][T15219] EXT4-fs (loop1): #clusters per group too big: 32768 [ 942.118978][T15252] loop4: detected capacity change from 0 to 4096 [ 942.130339][T15258] loop3: detected capacity change from 0 to 4096 [ 942.136057][T15252] EXT4-fs (loop4): Invalid log block size: 2031618 [ 942.156044][T15258] EXT4-fs (loop3): bad geometry: block count 652 exceeds size of device (512 blocks) 02:21:57 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x97, 0x0, 0x7, 0x0, 0x0, 0x28300, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x418, 0x0, @perf_config_ext={0x4118, 0x100}, 0x800, 0x7, 0x0, 0x8, 0x0, 0xed7, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x3b, 0x5, 0x0, 0x0, 0xcc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xcb8, 0x80}, 0x480, 0xffffffffffffffe0, 0x0, 0x0, 0x20, 0x0, 0x173, 0x0, 0x4bf, 0x0, 0xe408}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000f00)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000004c0)={0x53, 0xffffffffffffffff, 0x2e, 0x6, @scatter={0x2, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000d40)=""/136, 0x88}, {&(0x7f0000000e00)=""/208, 0xd0}]}, &(0x7f00000001c0)="e49d028c0715e20b5104226936005973918fe159f86d8e030acfa71b168531e97c8c98e798097a3c8229ad24d9cb", &(0x7f0000000540)=""/101, 0x15, 0x10000, 0x2, &(0x7f0000000340)}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x10\'\\@$&\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055300)={0x8f7, [{0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r5}, {}, {}, {r3}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {r3}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, r4}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x0, "0d4abfd4b32220"}) r184 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000840)={0x0, 0xfaef, 0xffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r184, 0x0) r185 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r185, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r185, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0xfffffffffffffeff, 0x1) sendto$inet(r185, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b300)={0xffff, [{r71, r59}, {}, {r109}, {r160}, {}, {r171}, {}, {}, {r102}, {}, {r134}, {}, {0x0, r51}, {0x0, r39}, {0x0, r181}, {r126, r14}, {r159, r32}, {r176, r57}, {}, {r13, r175}, {0x0, r179}, {r11}, {r19, r24}, {r28}, {r128}, {0x0, r33}, {}, {}, {}, {r103, r48}, {}, {}, {r46}, {r115, r157}, {0x0, r9}, {r55}, {0x0, r37}, {}, {}, {}, {0x0, r173}, {}, {r103, r32}, {r125}, {r106, r142}, {0x0, r123}, {}, {}, {0x0, r60}, {}, {}, {0x0, r116}, {r115}, {r65}, {r88, r98}, {}, {}, {}, {r167}, {r34}, {r130, r151}, {}, {}, {r71}, {0x0, r95}, {}, {}, {0x0, r79}, {r77, r136}, {r40}, {0x0, r79}, {}, {0x0, r84}, {r54}, {0x0, r49}, {r25, r169}, {r6}, {r61}, {r178, r12}, {r174}, {0x0, r22}, {r17, r173}, {r45}, {}, {r138, r74}, {r36, r31}, {}, {}, {r139, r99}, {0x0, r91}, {r107}, {r68}, {r180}, {}, {}, {r160}, {r172}, {}, {0x0, r111}, {r100, r7}, {0x0, r143}, {r90}, {}, {r92}, {}, {r94}, {0x0, r113}, {0x0, r133}, {r114}, {}, {r23}, {0x0, r67}, {r50}, {0x0, r89}, {0x0, r108}, {r56, r166}, {0x0, r155}, {r15, r29}, {}, {r96}, {r100, r119}, {}, {r82, r116}, {}, {0x0, r101}, {}, {r180}, {}, {}, {}, {r70}, {r154, r148}, {}, {r153, r64}, {}, {r158, r78}, {0x0, r183}, {r137, r53}, {r41}, {}, {}, {0x0, r47}, {r38}, {}, {0x0, r18}, {r137}, {r164}, {r145}, {0x0, r142}, {}, {r69, r121}, {r20, r104}, {r118}, {r182}, {r112, r44}, {}, {}, {0x0, r99}, {r71}, {}, {0x0, r127}, {0x0, r80}, {r140}, {}, {r170, r83}, {r96}, {}, {r10, r37}, {r176}, {}, {r46, r105}, {0x0, r142}, {r112}, {}, {r144}, {r68}, {r56}, {0x0, r161}, {0x0, r35}, {r86}, {0x0, r52}, {}, {r117, r105}, {0x0, r75}, {r122, r149}, {r120}, {}, {}, {r8}, {}, {}, {}, {}, {}, {r150, r129}, {}, {r180, r35}, {r93, r89}, {r81}, {r71}, {r16}, {}, {r134, r43}, {0x0, r87}, {r122}, {r128}, {r97}, {}, {}, {0x0, r163}, {0x0, r27}, {r156}, {0x0, r62}, {0x0, r42}, {0x0, r58}, {0x0, r42}, {0x0, r27}, {r120, r66}, {}, {r85, r42}, {0x0, r165}, {r34}, {0x0, r72}, {r30, r147}, {}, {}, {}, {}, {0x0, r146}, {r55, r31}, {r114}, {r144, r21}, {r63}, {0x0, r141}, {}, {r135}, {}, {r132, r83}, {0x0, r163}, {0x0, r110}, {0x0, r124}, {0x0, r99}, {}, {0x0, r177}, {r16}, {r178, r152}, {}, {r61, r33}, {r162, r168}, {}, {}, {r26}, {0x0, r73}, {r55, r131}, {r76}], 0x0, "e8da0117d3c471"}) 02:21:57 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000018000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000c02000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000e000002000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:57 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200200006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:57 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000018d02000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 942.360924][ C0] sd 0:0:1:0: tag#5264 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 942.370896][ C0] sd 0:0:1:0: tag#5264 CDB: opcode=0xe5 (vendor) [ 942.377082][T15281] loop1: detected capacity change from 0 to 4 [ 942.377253][ C0] sd 0:0:1:0: tag#5264 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 942.391778][T15282] loop2: detected capacity change from 0 to 4096 [ 942.392307][ C0] sd 0:0:1:0: tag#5264 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 942.392323][ C0] sd 0:0:1:0: tag#5264 CDB[20]: ba [ 942.396052][T15280] loop3: detected capacity change from 0 to 4096 [ 942.426647][T15290] loop4: detected capacity change from 0 to 4096 [ 942.433259][ C0] sd 0:0:1:0: tag#5265 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 942.443110][ C0] sd 0:0:1:0: tag#5265 CDB: opcode=0xe4 (vendor) [ 942.449983][ C0] sd 0:0:1:0: tag#5265 CDB[00]: e4 9d 02 8c 07 15 e2 0b 51 04 22 69 36 00 59 73 02:21:57 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00001c000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:57 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000026000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 942.459407][ C0] sd 0:0:1:0: tag#5265 CDB[10]: 91 8f e1 59 f8 6d 8e 03 0a cf a7 1b 16 85 31 e9 [ 942.468473][ C0] sd 0:0:1:0: tag#5265 CDB[20]: 7c 8c 98 e7 98 09 7a 3c 82 29 ad 24 d9 cb [ 942.482823][T15281] EXT4-fs (loop1): #clusters per group too big: 32768 [ 942.486328][T15280] EXT4-fs (loop3): bad geometry: block count 653 exceeds size of device (512 blocks) 02:21:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000d02000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:57 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000fe000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 942.501898][T15282] EXT4-fs (loop2): bad geometry: first data block 33816576 is beyond end of filesystem (512) [ 942.514453][T15290] EXT4-fs (loop4): Invalid log block size: 2097154 02:21:57 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000210200006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:58 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20ffffff9702000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 942.559308][T15282] loop2: detected capacity change from 0 to 4096 [ 942.573451][T15282] EXT4-fs (loop2): bad geometry: first data block 33816576 is beyond end of filesystem (512) [ 942.608854][T15321] loop1: detected capacity change from 0 to 4 [ 942.620804][T15321] EXT4-fs (loop1): #clusters per group too big: 32768 [ 942.635167][T15319] loop4: detected capacity change from 0 to 4096 [ 942.642505][T15325] loop3: detected capacity change from 0 to 4096 [ 942.646850][T15319] EXT4-fs (loop4): Invalid log block size: 2101250 [ 942.655647][T15325] EXT4-fs (loop3): bad geometry: block count 663 exceeds size of device (512 blocks) 02:21:58 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x97, 0x0, 0x7, 0x0, 0x0, 0x28300, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x418, 0x0, @perf_config_ext={0x4118, 0x100}, 0x800, 0x7, 0x0, 0x8, 0x0, 0xed7, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x3b, 0x5, 0x0, 0x0, 0xcc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xcb8, 0x80}, 0x480, 0xffffffffffffffe0, 0x0, 0x0, 0x20, 0x0, 0x173, 0x0, 0x4bf, 0x0, 0xe408}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000f00)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000004c0)={0x53, 0xffffffffffffffff, 0x2e, 0x6, @scatter={0x2, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000d40)=""/136, 0x88}, {&(0x7f0000000e00)=""/208, 0xd0}]}, &(0x7f00000001c0)="e49d028c0715e20b5104226936005973918fe159f86d8e030acfa71b168531e97c8c98e798097a3c8229ad24d9cb", &(0x7f0000000540)=""/101, 0x15, 0x10000, 0x2, &(0x7f0000000340)}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x10\'\\@$&\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055300)={0x8f7, [{0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r5}, {}, {}, {r3}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {r3}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, r4}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x0, "0d4abfd4b32220"}) r184 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000840)={0x0, 0xfaef, 0xffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r184, 0x0) r185 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r185, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r185, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0xfffffffffffffeff, 0x1) sendto$inet(r185, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b300)={0xffff, [{r71, r59}, {}, {r109}, {r160}, {}, {r171}, {}, {}, {r102}, {}, {r134}, {}, {0x0, r51}, {0x0, r39}, {0x0, r181}, {r126, r14}, {r159, r32}, {r176, r57}, {}, {r13, r175}, {0x0, r179}, {r11}, {r19, r24}, {r28}, {r128}, {0x0, r33}, {}, {}, {}, {r103, r48}, {}, {}, {r46}, {r115, r157}, {0x0, r9}, {r55}, {0x0, r37}, {}, {}, {}, {0x0, r173}, {}, {r103, r32}, {r125}, {r106, r142}, {0x0, r123}, {}, {}, {0x0, r60}, {}, {}, {0x0, r116}, {r115}, {r65}, {r88, r98}, {}, {}, {}, {r167}, {r34}, {r130, r151}, {}, {}, {r71}, {0x0, r95}, {}, {}, {0x0, r79}, {r77, r136}, {r40}, {0x0, r79}, {}, {0x0, r84}, {r54}, {0x0, r49}, {r25, r169}, {r6}, {r61}, {r178, r12}, {r174}, {0x0, r22}, {r17, r173}, {r45}, {}, {r138, r74}, {r36, r31}, {}, {}, {r139, r99}, {0x0, r91}, {r107}, {r68}, {r180}, {}, {}, {r160}, {r172}, {}, {0x0, r111}, {r100, r7}, {0x0, r143}, {r90}, {}, {r92}, {}, {r94}, {0x0, r113}, {0x0, r133}, {r114}, {}, {r23}, {0x0, r67}, {r50}, {0x0, r89}, {0x0, r108}, {r56, r166}, {0x0, r155}, {r15, r29}, {}, {r96}, {r100, r119}, {}, {r82, r116}, {}, {0x0, r101}, {}, {r180}, {}, {}, {}, {r70}, {r154, r148}, {}, {r153, r64}, {}, {r158, r78}, {0x0, r183}, {r137, r53}, {r41}, {}, {}, {0x0, r47}, {r38}, {}, {0x0, r18}, {r137}, {r164}, {r145}, {0x0, r142}, {}, {r69, r121}, {r20, r104}, {r118}, {r182}, {r112, r44}, {}, {}, {0x0, r99}, {r71}, {}, {0x0, r127}, {0x0, r80}, {r140}, {}, {r170, r83}, {r96}, {}, {r10, r37}, {r176}, {}, {r46, r105}, {0x0, r142}, {r112}, {}, {r144}, {r68}, {r56}, {0x0, r161}, {0x0, r35}, {r86}, {0x0, r52}, {}, {r117, r105}, {0x0, r75}, {r122, r149}, {r120}, {}, {}, {r8}, {}, {}, {}, {}, {}, {r150, r129}, {}, {r180, r35}, {r93, r89}, {r81}, {r71}, {r16}, {}, {r134, r43}, {0x0, r87}, {r122}, {r128}, {r97}, {}, {}, {0x0, r163}, {0x0, r27}, {r156}, {0x0, r62}, {0x0, r42}, {0x0, r58}, {0x0, r42}, {0x0, r27}, {r120, r66}, {}, {r85, r42}, {0x0, r165}, {r34}, {0x0, r72}, {r30, r147}, {}, {}, {}, {}, {0x0, r146}, {r55, r31}, {r114}, {r144, r21}, {r63}, {0x0, r141}, {}, {r135}, {}, {r132, r83}, {0x0, r163}, {0x0, r110}, {0x0, r124}, {0x0, r99}, {}, {0x0, r177}, {r16}, {r178, r152}, {}, {r61, r33}, {r162, r168}, {}, {}, {r26}, {0x0, r73}, {r55, r131}, {r76}], 0x0, "e8da0117d3c471"}) 02:21:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000f000002000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:58 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000004020000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000e02000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:58 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200220006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:58 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000a002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:58 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000030000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 942.863385][T15351] loop2: detected capacity change from 0 to 4096 [ 942.863952][T15350] loop1: detected capacity change from 0 to 4 [ 942.877072][T15349] loop3: detected capacity change from 0 to 4096 [ 942.883335][T15355] loop4: detected capacity change from 0 to 4096 [ 942.893998][ C0] sd 0:0:1:0: tag#5266 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 942.903970][ C0] sd 0:0:1:0: tag#5266 CDB: opcode=0xe5 (vendor) [ 942.910299][ C0] sd 0:0:1:0: tag#5266 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 942.919374][ C0] sd 0:0:1:0: tag#5266 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 942.928530][ C0] sd 0:0:1:0: tag#5266 CDB[20]: ba [ 942.928737][T15349] EXT4-fs (loop3): bad geometry: block count 672 exceeds size of device (512 blocks) [ 942.945198][T15355] EXT4-fs (loop4): Invalid log block size: 2228226 [ 942.946962][ C0] sd 0:0:1:0: tag#5267 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s 02:21:58 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000002040000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:58 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000006040000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 942.961578][ C0] sd 0:0:1:0: tag#5267 CDB: opcode=0xe4 (vendor) [ 942.967934][ C0] sd 0:0:1:0: tag#5267 CDB[00]: e4 9d 02 8c 07 15 e2 0b 51 04 22 69 36 00 59 73 [ 942.976988][ C0] sd 0:0:1:0: tag#5267 CDB[10]: 91 8f e1 59 f8 6d 8e 03 0a cf a7 1b 16 85 31 e9 [ 942.985704][T15350] EXT4-fs (loop1): #clusters per group too big: 32768 [ 942.986039][ C0] sd 0:0:1:0: tag#5267 CDB[20]: 7c 8c 98 e7 98 09 7a 3c 82 29 ad 24 d9 cb [ 942.998026][T15351] EXT4-fs (loop2): bad geometry: first data block 33816576 is beyond end of filesystem (512) 02:21:58 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000aa02000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:58 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200250006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 943.035092][T15350] loop1: detected capacity change from 0 to 4 [ 943.059701][T15350] EXT4-fs (loop1): #clusters per group too big: 32768 [ 943.071836][T15351] loop2: detected capacity change from 0 to 4096 02:21:58 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000080040000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 943.082060][T15351] EXT4-fs (loop2): bad geometry: first data block 33816576 is beyond end of filesystem (512) [ 943.084200][T15389] loop4: detected capacity change from 0 to 4096 [ 943.115102][T15389] EXT4-fs (loop4): Invalid log block size: 2424834 [ 943.120280][T15396] loop3: detected capacity change from 0 to 4096 [ 943.141198][T15396] EXT4-fs (loop3): bad geometry: block count 682 exceeds size of device (512 blocks) 02:21:59 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x97, 0x0, 0x7, 0x0, 0x0, 0x28300, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x418, 0x0, @perf_config_ext={0x4118, 0x100}, 0x800, 0x7, 0x0, 0x8, 0x0, 0xed7, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x3b, 0x5, 0x0, 0x0, 0xcc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xcb8, 0x80}, 0x480, 0xffffffffffffffe0, 0x0, 0x0, 0x20, 0x0, 0x173, 0x0, 0x4bf, 0x0, 0xe408}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000f00)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000004c0)={0x53, 0xffffffffffffffff, 0x2e, 0x6, @scatter={0x2, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000d40)=""/136, 0x88}, {&(0x7f0000000e00)=""/208, 0xd0}]}, &(0x7f00000001c0)="e49d028c0715e20b5104226936005973918fe159f86d8e030acfa71b168531e97c8c98e798097a3c8229ad24d9cb", &(0x7f0000000540)=""/101, 0x15, 0x10000, 0x2, &(0x7f0000000340)}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x10\'\\@$&\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055300)={0x8f7, [{0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r5}, {}, {}, {r3}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {r3}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, r4}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x0, "0d4abfd4b32220"}) r185 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000840)={0x0, 0xfaef, 0xffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r185, 0x0) r186 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r186, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r186, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0xfffffffffffffeff, 0x1) sendto$inet(r186, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b300)={0xffff, [{r72, r60}, {}, {r110}, {r161}, {}, {r172}, {}, {}, {r103}, {}, {r135}, {}, {0x0, r52}, {0x0, r40}, {0x0, r182}, {r127, r14}, {r160, r32}, {r177, r58}, {}, {r13, r176}, {0x0, r180}, {r11}, {r19, r24}, {r28}, {r129}, {0x0, r33}, {}, {}, {}, {r104, r49}, {}, {}, {r47}, {r116, r158}, {0x0, r9}, {r56}, {}, {0x0, r37}, {}, {}, {0x0, r174}, {}, {r104, r32}, {r126}, {r107, r143}, {0x0, r124}, {}, {}, {0x0, r61}, {}, {}, {0x0, r117}, {r116}, {r66}, {r89, r99}, {}, {}, {}, {r168}, {r34}, {r131, r152}, {}, {}, {r72}, {0x0, r96}, {}, {}, {0x0, r80}, {r78, r137}, {r41}, {0x0, r80}, {}, {0x0, r85}, {r55}, {0x0, r50}, {r25, r170}, {r6}, {r62}, {r179, r12}, {r175}, {0x0, r22}, {r17, r174}, {r46}, {}, {r139, r75}, {r36, r31}, {}, {}, {r140, r100}, {0x0, r92}, {r108}, {r69}, {r181}, {}, {}, {r161}, {r173}, {}, {0x0, r112}, {r101, r7}, {0x0, r144}, {r91}, {}, {r93}, {}, {r95}, {0x0, r114}, {0x0, r134}, {r115}, {}, {r23}, {0x0, r68}, {r51}, {0x0, r90}, {0x0, r109}, {r57, r167}, {0x0, r156}, {r15, r29}, {}, {r97}, {r101, r120}, {}, {r83, r117}, {}, {0x0, r102}, {}, {r181}, {}, {}, {}, {r71}, {r155, r149}, {}, {r154, r65}, {}, {r159, r79}, {0x0, r184}, {r138, r54}, {r42}, {}, {}, {0x0, r48}, {r39}, {}, {0x0, r18}, {r138}, {r165}, {r146}, {0x0, r143}, {}, {r70, r122}, {r20, r105}, {r119}, {r183}, {r113, r45}, {}, {}, {0x0, r100}, {r72}, {}, {0x0, r128}, {0x0, r81}, {r141}, {}, {r171, r84}, {r97}, {}, {r10, r38}, {r177}, {}, {r47, r106}, {0x0, r143}, {r113}, {}, {r145}, {r69}, {r57}, {0x0, r162}, {0x0, r35}, {r87}, {0x0, r53}, {}, {r118, r106}, {0x0, r76}, {r123, r150}, {r121}, {}, {}, {r8}, {}, {}, {}, {}, {}, {r151, r130}, {}, {r181, r35}, {r94, r90}, {r82}, {r72}, {r16}, {}, {r135, r44}, {0x0, r88}, {r123}, {r129}, {r98}, {}, {}, {0x0, r164}, {0x0, r27}, {r157}, {0x0, r63}, {0x0, r43}, {0x0, r59}, {0x0, r43}, {0x0, r27}, {r121, r67}, {}, {r86, r43}, {0x0, r166}, {r34}, {0x0, r73}, {r30, r148}, {}, {}, {}, {}, {0x0, r147}, {r56, r31}, {r115}, {r145, r21}, {r64}, {0x0, r142}, {}, {r136}, {}, {r133, r84}, {0x0, r164}, {0x0, r111}, {0x0, r125}, {0x0, r100}, {}, {0x0, r178}, {r16}, {r179, r153}, {}, {r62, r33}, {r163, r169}, {}, {}, {r26}, {0x0, r74}, {r56, r132}, {r77}], 0x0, "e8da0117d3c471"}) 02:21:59 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000ab02000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000f02000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:59 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000050000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200010000002000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:59 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f0000000000000002012a0006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 943.774989][T15422] loop3: detected capacity change from 0 to 4096 [ 943.781880][T15423] loop2: detected capacity change from 0 to 4096 [ 943.793162][T15427] loop1: detected capacity change from 0 to 4 [ 943.809071][T15422] EXT4-fs (loop3): bad geometry: block count 683 exceeds size of device (512 blocks) [ 943.819704][ C0] sd 0:0:1:0: tag#5268 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 943.829562][ C0] sd 0:0:1:0: tag#5268 CDB: opcode=0xe5 (vendor) [ 943.835943][ C0] sd 0:0:1:0: tag#5268 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 943.844255][T15434] loop4: detected capacity change from 0 to 4096 [ 943.844994][ C0] sd 0:0:1:0: tag#5268 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 943.860345][ C0] sd 0:0:1:0: tag#5268 CDB[20]: ba [ 943.861925][T15427] EXT4-fs (loop1): #clusters per group too big: 32768 02:21:59 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00002a050000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 943.872596][ C0] sd 0:0:1:0: tag#5269 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 943.882479][ C0] sd 0:0:1:0: tag#5269 CDB: opcode=0xe4 (vendor) [ 943.888882][ C0] sd 0:0:1:0: tag#5269 CDB[00]: e4 9d 02 8c 07 15 e2 0b 51 04 22 69 36 00 59 73 [ 943.897960][ C0] sd 0:0:1:0: tag#5269 CDB[10]: 91 8f e1 59 f8 6d 8e 03 0a cf a7 1b 16 85 31 e9 [ 943.903405][T15434] EXT4-fs (loop4): Invalid log block size: 2752770 [ 943.907180][ C0] sd 0:0:1:0: tag#5269 CDB[20]: 7c 8c 98 e7 98 09 7a 3c 82 29 ad 24 d9 cb 02:21:59 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000060000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:59 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000b102000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 943.929083][T15423] EXT4-fs (loop2): bad geometry: first data block 33816576 is beyond end of filesystem (512) [ 943.957825][T15427] loop1: detected capacity change from 0 to 4 [ 943.968111][T15434] loop4: detected capacity change from 0 to 4096 02:21:59 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f0000000000000002002e0006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 943.987046][T15427] EXT4-fs (loop1): #clusters per group too big: 32768 [ 943.990892][T15423] loop2: detected capacity change from 0 to 4096 [ 944.002218][T15423] EXT4-fs (loop2): bad geometry: first data block 33816576 is beyond end of filesystem (512) 02:21:59 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000004060000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:21:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000001002000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 944.040333][T15468] loop3: detected capacity change from 0 to 4096 [ 944.058641][T15468] EXT4-fs (loop3): bad geometry: block count 689 exceeds size of device (512 blocks) [ 944.093674][T15474] loop4: detected capacity change from 0 to 4096 [ 944.120886][T15474] EXT4-fs (loop4): Invalid log block size: 3014658 [ 944.148740][T15488] loop1: detected capacity change from 0 to 4 [ 944.157535][T15488] EXT4-fs (loop1): #clusters per group too big: 32768 [ 944.213632][T15488] loop1: detected capacity change from 0 to 4 [ 944.220204][T15488] EXT4-fs (loop1): #clusters per group too big: 32768 02:22:00 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x97, 0x0, 0x7, 0x0, 0x0, 0x28300, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x418, 0x0, @perf_config_ext={0x4118, 0x100}, 0x800, 0x7, 0x0, 0x8, 0x0, 0xed7, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x3b, 0x5, 0x0, 0x0, 0xcc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xcb8, 0x80}, 0x480, 0xffffffffffffffe0, 0x0, 0x0, 0x20, 0x0, 0x173, 0x0, 0x4bf, 0x0, 0xe408}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000f00)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000004c0)={0x53, 0xffffffffffffffff, 0x2e, 0x6, @scatter={0x2, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000d40)=""/136, 0x88}, {&(0x7f0000000e00)=""/208, 0xd0}]}, &(0x7f00000001c0)="e49d028c0715e20b5104226936005973918fe159f86d8e030acfa71b168531e97c8c98e798097a3c8229ad24d9cb", &(0x7f0000000540)=""/101, 0x15, 0x10000, 0x2, &(0x7f0000000340)}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x10\'\\@$&\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055300)={0x8f7, [{0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r5}, {}, {}, {r3}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {r3}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, r4}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x0, "0d4abfd4b32220"}) r185 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000840)={0x0, 0xfaef, 0xffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r185, 0x0) r186 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r186, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r186, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0xfffffffffffffeff, 0x1) sendto$inet(r186, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b300)={0xffff, [{r72, r60}, {}, {r110}, {r161}, {}, {r172}, {}, {}, {r103}, {}, {r135}, {}, {0x0, r52}, {0x0, r40}, {0x0, r182}, {r127, r14}, {r160, r32}, {r177, r58}, {}, {r13, r176}, {0x0, r180}, {r11}, {r19, r24}, {r28}, {r129}, {0x0, r33}, {}, {}, {}, {r104, r49}, {}, {}, {r47}, {r116, r158}, {0x0, r9}, {r56}, {}, {0x0, r37}, {}, {}, {0x0, r174}, {}, {r104, r32}, {r126}, {r107, r143}, {0x0, r124}, {}, {}, {0x0, r61}, {}, {}, {0x0, r117}, {r116}, {r66}, {r89, r99}, {}, {}, {}, {r168}, {r34}, {r131, r152}, {}, {}, {r72}, {0x0, r96}, {}, {}, {0x0, r80}, {r78, r137}, {r41}, {0x0, r80}, {}, {0x0, r85}, {r55}, {0x0, r50}, {r25, r170}, {r6}, {r62}, {r179, r12}, {r175}, {0x0, r22}, {r17, r174}, {r46}, {}, {r139, r75}, {r36, r31}, {}, {}, {r140, r100}, {0x0, r92}, {r108}, {r69}, {r181}, {}, {}, {r161}, {r173}, {}, {0x0, r112}, {r101, r7}, {0x0, r144}, {r91}, {}, {r93}, {}, {r95}, {0x0, r114}, {0x0, r134}, {r115}, {}, {r23}, {0x0, r68}, {r51}, {0x0, r90}, {0x0, r109}, {r57, r167}, {0x0, r156}, {r15, r29}, {}, {r97}, {r101, r120}, {}, {r83, r117}, {}, {0x0, r102}, {}, {r181}, {}, {}, {}, {r71}, {r155, r149}, {}, {r154, r65}, {}, {r159, r79}, {0x0, r184}, {r138, r54}, {r42}, {}, {}, {0x0, r48}, {r39}, {}, {0x0, r18}, {r138}, {r165}, {r146}, {0x0, r143}, {}, {r70, r122}, {r20, r105}, {r119}, {r183}, {r113, r45}, {}, {}, {0x0, r100}, {r72}, {}, {0x0, r128}, {0x0, r81}, {r141}, {}, {r171, r84}, {r97}, {}, {r10, r38}, {r177}, {}, {r47, r106}, {0x0, r143}, {r113}, {}, {r145}, {r69}, {r57}, {0x0, r162}, {0x0, r35}, {r87}, {0x0, r53}, {}, {r118, r106}, {0x0, r76}, {r123, r150}, {r121}, {}, {}, {r8}, {}, {}, {}, {}, {}, {r151, r130}, {}, {r181, r35}, {r94, r90}, {r82}, {r72}, {r16}, {}, {r135, r44}, {0x0, r88}, {r123}, {r129}, {r98}, {}, {}, {0x0, r164}, {0x0, r27}, {r157}, {0x0, r63}, {0x0, r43}, {0x0, r59}, {0x0, r43}, {0x0, r27}, {r121, r67}, {}, {r86, r43}, {0x0, r166}, {r34}, {0x0, r73}, {r30, r148}, {}, {}, {}, {}, {0x0, r147}, {r56, r31}, {r115}, {r145, r21}, {r64}, {0x0, r142}, {}, {r136}, {}, {r133, r84}, {0x0, r164}, {0x0, r111}, {0x0, r125}, {0x0, r100}, {}, {0x0, r178}, {r16}, {r179, r153}, {}, {r62, r33}, {r163, r169}, {}, {}, {r26}, {0x0, r74}, {r56, r132}, {r77}], 0x0, "e8da0117d3c471"}) 02:22:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200011000002000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:22:00 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000070000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:22:00 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000edc002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:22:00 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200320006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:22:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000001102000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 944.689632][T15513] loop4: detected capacity change from 0 to 4096 [ 944.691689][T15511] loop3: detected capacity change from 0 to 4096 [ 944.712172][ C1] sd 0:0:1:0: tag#5270 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 944.713912][T15518] loop1: detected capacity change from 0 to 4 [ 944.722462][ C1] sd 0:0:1:0: tag#5270 CDB: opcode=0xe5 (vendor) 02:22:00 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000180000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 944.730804][T15520] loop2: detected capacity change from 0 to 4096 [ 944.734855][ C1] sd 0:0:1:0: tag#5270 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 944.750216][ C1] sd 0:0:1:0: tag#5270 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 944.759281][ C1] sd 0:0:1:0: tag#5270 CDB[20]: ba [ 944.777111][ C0] sd 0:0:1:0: tag#5271 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 944.785113][T15511] EXT4-fs (loop3): bad geometry: block count 704 exceeds size of device (512 blocks) [ 944.786962][ C0] sd 0:0:1:0: tag#5271 CDB: opcode=0xe4 (vendor) [ 944.802720][ C0] sd 0:0:1:0: tag#5271 CDB[00]: e4 9d 02 8c 07 15 e2 0b 51 04 22 69 36 00 59 73 [ 944.811780][ C0] sd 0:0:1:0: tag#5271 CDB[10]: 91 8f e1 59 f8 6d 8e 03 0a cf a7 1b 16 85 31 e9 [ 944.820819][ C0] sd 0:0:1:0: tag#5271 CDB[20]: 7c 8c 98 e7 98 09 7a 3c 82 29 ad 24 d9 cb [ 944.822581][T15520] EXT4-fs (loop2): bad geometry: first data block 33816576 is beyond end of filesystem (512) 02:22:00 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000003c102000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 944.840271][T15518] EXT4-fs (loop1): #clusters per group too big: 32768 [ 944.851357][T15513] EXT4-fs (loop4): Invalid log block size: 3276802 [ 944.868040][T15518] loop1: detected capacity change from 0 to 4 [ 944.874250][T15520] loop2: detected capacity change from 0 to 4096 [ 944.881789][T15518] EXT4-fs (loop1): #clusters per group too big: 32768 02:22:00 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f0000000000000002003f0006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:22:00 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000001c0000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:22:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000001202000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 944.896775][T15520] EXT4-fs (loop2): bad geometry: first data block 33816576 is beyond end of filesystem (512) [ 944.935427][T15553] loop3: detected capacity change from 0 to 4096 02:22:00 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000200000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 944.952475][T15556] loop4: detected capacity change from 0 to 4096 [ 944.968276][T15553] EXT4-fs (loop3): bad geometry: block count 705 exceeds size of device (512 blocks) [ 944.993469][T15556] EXT4-fs (loop4): Invalid log block size: 4128770 [ 945.021249][T15571] loop1: detected capacity change from 0 to 4 [ 945.038683][T15571] EXT4-fs (loop1): #clusters per group too big: 32768 02:22:00 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000260000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:22:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200012000002000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:22:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000002202000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:22:00 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200400006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:22:00 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x97, 0x0, 0x7, 0x0, 0x0, 0x28300, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x418, 0x0, @perf_config_ext={0x4118, 0x100}, 0x800, 0x7, 0x0, 0x8, 0x0, 0xed7, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x3b, 0x5, 0x0, 0x0, 0xcc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xcb8, 0x80}, 0x480, 0xffffffffffffffe0, 0x0, 0x0, 0x20, 0x0, 0x173, 0x0, 0x4bf, 0x0, 0xe408}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000f00)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000004c0)={0x53, 0xffffffffffffffff, 0x2e, 0x6, @scatter={0x2, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000d40)=""/136, 0x88}, {&(0x7f0000000e00)=""/208, 0xd0}]}, &(0x7f00000001c0)="e49d028c0715e20b5104226936005973918fe159f86d8e030acfa71b168531e97c8c98e798097a3c8229ad24d9cb", &(0x7f0000000540)=""/101, 0x15, 0x10000, 0x2, &(0x7f0000000340)}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x10\'\\@$&\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055300)={0x8f7, [{0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r5}, {}, {}, {r3}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {r3}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, r4}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x0, "0d4abfd4b32220"}) r185 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000840)={0x0, 0xfaef, 0xffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r185, 0x0) r186 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r186, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r186, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0xfffffffffffffeff, 0x1) sendto$inet(r186, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b300)={0xffff, [{r72, r60}, {}, {r110}, {r161}, {}, {r172}, {}, {}, {r103}, {}, {r135}, {}, {0x0, r52}, {0x0, r40}, {0x0, r182}, {r127, r14}, {r160, r32}, {r177, r58}, {}, {r13, r176}, {0x0, r180}, {r11}, {r19, r24}, {r28}, {r129}, {0x0, r33}, {}, {}, {}, {r104, r49}, {}, {}, {r47}, {r116, r158}, {0x0, r9}, {r56}, {}, {0x0, r37}, {}, {}, {0x0, r174}, {}, {r104, r32}, {r126}, {r107, r143}, {0x0, r124}, {}, {}, {0x0, r61}, {}, {}, {0x0, r117}, {r116}, {r66}, {r89, r99}, {}, {}, {}, {r168}, {r34}, {r131, r152}, {}, {}, {r72}, {0x0, r96}, {}, {}, {0x0, r80}, {r78, r137}, {r41}, {0x0, r80}, {}, {0x0, r85}, {r55}, {0x0, r50}, {r25, r170}, {r6}, {r62}, {r179, r12}, {r175}, {0x0, r22}, {r17, r174}, {r46}, {}, {r139, r75}, {r36, r31}, {}, {}, {r140, r100}, {0x0, r92}, {r108}, {r69}, {r181}, {}, {}, {r161}, {r173}, {}, {0x0, r112}, {r101, r7}, {0x0, r144}, {r91}, {}, {r93}, {}, {r95}, {0x0, r114}, {0x0, r134}, {r115}, {}, {r23}, {0x0, r68}, {r51}, {0x0, r90}, {0x0, r109}, {r57, r167}, {0x0, r156}, {r15, r29}, {}, {r97}, {r101, r120}, {}, {r83, r117}, {}, {0x0, r102}, {}, {r181}, {}, {}, {}, {r71}, {r155, r149}, {}, {r154, r65}, {}, {r159, r79}, {0x0, r184}, {r138, r54}, {r42}, {}, {}, {0x0, r48}, {r39}, {}, {0x0, r18}, {r138}, {r165}, {r146}, {0x0, r143}, {}, {r70, r122}, {r20, r105}, {r119}, {r183}, {r113, r45}, {}, {}, {0x0, r100}, {r72}, {}, {0x0, r128}, {0x0, r81}, {r141}, {}, {r171, r84}, {r97}, {}, {r10, r38}, {r177}, {}, {r47, r106}, {0x0, r143}, {r113}, {}, {r145}, {r69}, {r57}, {0x0, r162}, {0x0, r35}, {r87}, {0x0, r53}, {}, {r118, r106}, {0x0, r76}, {r123, r150}, {r121}, {}, {}, {r8}, {}, {}, {}, {}, {}, {r151, r130}, {}, {r181, r35}, {r94, r90}, {r82}, {r72}, {r16}, {}, {r135, r44}, {0x0, r88}, {r123}, {r129}, {r98}, {}, {}, {0x0, r164}, {0x0, r27}, {r157}, {0x0, r63}, {0x0, r43}, {0x0, r59}, {0x0, r43}, {0x0, r27}, {r121, r67}, {}, {r86, r43}, {0x0, r166}, {r34}, {0x0, r73}, {r30, r148}, {}, {}, {}, {}, {0x0, r147}, {r56, r31}, {r115}, {r145, r21}, {r64}, {0x0, r142}, {}, {r136}, {}, {r133, r84}, {0x0, r164}, {0x0, r111}, {0x0, r125}, {0x0, r100}, {}, {0x0, r178}, {r16}, {r179, r153}, {}, {r62, r33}, {r163, r169}, {}, {}, {r26}, {0x0, r74}, {r56, r132}, {r77}], 0x0, "e8da0117d3c471"}) 02:22:00 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000001d402000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:22:01 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20ffffffda02000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 945.599812][T15592] loop3: detected capacity change from 0 to 4096 [ 945.607379][T15593] loop2: detected capacity change from 0 to 4096 [ 945.619152][T15592] EXT4-fs (loop3): bad geometry: block count 724 exceeds size of device (512 blocks) [ 945.627111][T15601] loop1: detected capacity change from 0 to 4 [ 945.637949][T15602] loop4: detected capacity change from 0 to 4096 02:22:01 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000052a0000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 945.663412][T15601] EXT4-fs (loop1): #clusters per group too big: 32768 [ 945.689548][T15593] EXT4-fs (loop2): bad geometry: first data block 33816576 is beyond end of filesystem (512) 02:22:01 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000003f0000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 945.709958][T15602] EXT4-fs (loop4): Invalid log block size: 4194306 [ 945.716738][T15601] loop1: detected capacity change from 0 to 4 [ 945.728777][T15601] EXT4-fs (loop1): #clusters per group too big: 32768 [ 945.738714][T15621] loop3: detected capacity change from 0 to 4096 [ 945.750769][T15621] EXT4-fs (loop3): bad geometry: block count 730 exceeds size of device (512 blocks) 02:22:01 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20ffffffe202000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:22:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000002502000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:22:01 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200480006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:22:01 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000400000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 945.764979][T15593] loop2: detected capacity change from 0 to 4096 [ 945.783501][T15593] EXT4-fs (loop2): bad geometry: first data block 33816576 is beyond end of filesystem (512) 02:22:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200022000002000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 945.863659][T15649] loop1: detected capacity change from 0 to 4 [ 945.870297][T15652] loop3: detected capacity change from 0 to 4096 [ 945.892805][T15653] loop4: detected capacity change from 0 to 4096 [ 945.902988][T15649] EXT4-fs (loop1): #clusters per group too big: 32768 [ 945.911375][T15658] loop2: detected capacity change from 0 to 4096 [ 945.921885][T15652] EXT4-fs (loop3): bad geometry: block count 738 exceeds size of device (512 blocks) [ 945.932290][T15653] EXT4-fs (loop4): Invalid log block size: 4718594 [ 945.940400][T15649] loop1: detected capacity change from 0 to 4 [ 945.949047][T15649] EXT4-fs (loop1): #clusters per group too big: 32768 [ 945.964555][ T57] ================================================================== [ 945.972752][ T57] BUG: KCSAN: data-race in delete_from_page_cache_batch / page_mapping [ 945.980971][ T57] [ 945.983274][ T57] write to 0xffffea0004231d18 of 8 bytes by task 15658 on cpu 0: [ 945.991052][ T57] delete_from_page_cache_batch+0x30c/0x6c0 [ 945.996941][ T57] truncate_inode_pages_range+0x1d5/0xad0 [ 946.002642][ T57] truncate_inode_pages+0x20/0x30 [ 946.007658][ T57] set_blocksize+0x24e/0x270 [ 946.012235][ T57] sb_min_blocksize+0x9d/0x120 [ 946.016994][ T57] ext4_fill_super+0x3a5/0x7840 [ 946.021823][ T57] mount_bdev+0x1e8/0x290 [ 946.026128][ T57] ext4_mount+0x2d/0x40 [ 946.030353][ T57] legacy_get_tree+0x70/0xc0 [ 946.034919][ T57] vfs_get_tree+0x4a/0x1a0 [ 946.039315][ T57] path_mount+0x11ec/0x1d20 [ 946.043802][ T57] __se_sys_mount+0x24b/0x2f0 [ 946.048555][ T57] __x64_sys_mount+0x63/0x70 [ 946.053123][ T57] do_syscall_64+0x44/0xa0 [ 946.057524][ T57] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 946.063402][ T57] [ 946.065720][ T57] read to 0xffffea0004231d18 of 8 bytes by task 57 on cpu 1: [ 946.073077][ T57] page_mapping+0x111/0x1c0 [ 946.077560][ T57] __pagevec_lru_add_fn+0x82/0x490 [ 946.082651][ T57] __pagevec_lru_add+0x189/0x240 [ 946.087565][ T57] lru_cache_add+0x121/0x150 [ 946.092152][ T57] shmem_getpage_gfp+0xcb9/0x13d0 [ 946.097182][ T57] shmem_file_read_iter+0x1b2/0x5d0 [ 946.102356][ T57] do_iter_readv_writev+0x2fb/0x380 [ 946.107531][ T57] do_iter_read+0x192/0x5d0 [ 946.112011][ T57] vfs_iter_read+0x4c/0x70 [ 946.116402][ T57] loop_process_work+0x11ae/0x18f0 [ 946.121581][ T57] loop_rootcg_workfn+0x1b/0x20 [ 946.126410][ T57] process_one_work+0x402/0x910 [ 946.131247][ T57] worker_thread+0x636/0xae0 [ 946.135816][ T57] kthread+0x262/0x280 [ 946.140133][ T57] ret_from_fork+0x1f/0x30 [ 946.145148][ T57] [ 946.147465][ T57] value changed: 0xffff888101076ba8 -> 0x0000000000000000 [ 946.154645][ T57] [ 946.156960][ T57] Reported by Kernel Concurrency Sanitizer on: [ 946.163105][ T57] CPU: 1 PID: 57 Comm: kworker/u4:2 Not tainted 5.15.0-rc3-syzkaller #0 [ 946.171463][ T57] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 946.181674][ T57] Workqueue: loop2 loop_rootcg_workfn [ 946.187034][ T57] ================================================================== 02:22:01 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000004800000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:22:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000002e02000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 946.210222][T15658] EXT4-fs (loop2): bad geometry: first data block 33816576 is beyond end of filesystem (512) [ 946.246105][T15653] loop4: detected capacity change from 0 to 4096 [ 946.261819][T15658] loop2: detected capacity change from 0 to 4096 [ 946.268185][T15686] loop1: detected capacity change from 0 to 4 [ 946.279076][T15658] EXT4-fs (loop2): bad geometry: first data block 33816576 is beyond end of filesystem (512) [ 946.279578][T15686] EXT4-fs (loop1): #clusters per group too big: 32768 [ 946.338830][T15686] loop1: detected capacity change from 0 to 4 [ 946.345262][T15686] EXT4-fs (loop1): #clusters per group too big: 32768 02:22:01 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000fffe0000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:22:01 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000003f002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:22:01 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f0000000000000002004c0006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:22:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200025000002000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:22:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004802000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:22:01 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x97, 0x0, 0x7, 0x0, 0x0, 0x28300, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x418, 0x0, @perf_config_ext={0x4118, 0x100}, 0x800, 0x7, 0x0, 0x8, 0x0, 0xed7, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x3b, 0x5, 0x0, 0x0, 0xcc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xcb8, 0x80}, 0x480, 0xffffffffffffffe0, 0x0, 0x0, 0x20, 0x0, 0x173, 0x0, 0x4bf, 0x0, 0xe408}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000f00)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000004c0)={0x53, 0xffffffffffffffff, 0x2e, 0x6, @scatter={0x2, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000d40)=""/136, 0x88}, {&(0x7f0000000e00)=""/208, 0xd0}]}, &(0x7f00000001c0)="e49d028c0715e20b5104226936005973918fe159f86d8e030acfa71b168531e97c8c98e798097a3c8229ad24d9cb", &(0x7f0000000540)=""/101, 0x15, 0x10000, 0x2, &(0x7f0000000340)}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x10\'\\@$&\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055300)={0x8f7, [{0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r5}, {}, {}, {r3}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {r3}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, r4}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x0, "0d4abfd4b32220"}) r185 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000840)={0x0, 0xfaef, 0xffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r185, 0x0) r186 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r186, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r186, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0xfffffffffffffeff, 0x1) sendto$inet(r186, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b300)={0xffff, [{r72, r60}, {}, {r110}, {r161}, {}, {r172}, {}, {}, {r103}, {}, {r135}, {}, {0x0, r52}, {0x0, r40}, {0x0, r182}, {r127, r14}, {r160, r32}, {r177, r58}, {}, {r13, r176}, {0x0, r180}, {r11}, {r19, r24}, {r28}, {r129}, {0x0, r33}, {}, {}, {}, {r104, r49}, {}, {}, {r47}, {r116, r158}, {0x0, r9}, {}, {0x0, r38}, {0x0, r37}, {}, {}, {0x0, r174}, {}, {r104, r32}, {r126}, {r107, r143}, {0x0, r124}, {}, {}, {0x0, r61}, {}, {}, {0x0, r117}, {r116}, {r66}, {r89, r99}, {}, {}, {}, {r168}, {r34}, {r131, r152}, {}, {}, {r72}, {0x0, r96}, {}, {}, {0x0, r80}, {r78, r137}, {r41}, {0x0, r80}, {}, {0x0, r85}, {r55}, {0x0, r50}, {r25, r170}, {r6}, {r62}, {r179, r12}, {r175}, {0x0, r22}, {r17, r174}, {r46}, {}, {r139, r75}, {r36, r31}, {}, {}, {r140, r100}, {0x0, r92}, {r108}, {r69}, {r181}, {}, {}, {r161}, {r173}, {}, {0x0, r112}, {r101, r7}, {0x0, r144}, {r91}, {}, {r93}, {}, {r95}, {0x0, r114}, {0x0, r134}, {r115}, {}, {r23}, {0x0, r68}, {r51}, {0x0, r90}, {0x0, r109}, {r57, r167}, {0x0, r156}, {r15, r29}, {}, {r97}, {r101, r120}, {}, {r83, r117}, {}, {0x0, r102}, {}, {r181}, {}, {}, {}, {r71}, {r155, r149}, {}, {r154, r65}, {}, {r159, r79}, {0x0, r184}, {r138, r54}, {r42}, {}, {}, {0x0, r48}, {r39}, {}, {0x0, r18}, {r138}, {r165}, {r146}, {0x0, r143}, {}, {r70, r122}, {r20, r105}, {r119}, {r183}, {r113, r45}, {}, {}, {0x0, r100}, {r72}, {}, {0x0, r128}, {0x0, r81}, {r141}, {}, {r171, r84}, {r97}, {}, {r10, r38}, {r177}, {}, {r47, r106}, {0x0, r143}, {r113}, {}, {r145}, {r69}, {r57}, {0x0, r162}, {0x0, r35}, {r87}, {0x0, r53}, {}, {r118, r106}, {0x0, r76}, {r123, r150}, {r121}, {}, {}, {r8}, {}, {}, {}, {}, {}, {r151, r130}, {}, {r181, r35}, {r94, r90}, {r82}, {r72}, {r16}, {}, {r135, r44}, {0x0, r88}, {r123}, {r129}, {r98}, {}, {}, {0x0, r164}, {0x0, r27}, {r157}, {0x0, r63}, {0x0, r43}, {0x0, r59}, {0x0, r43}, {0x0, r27}, {r121, r67}, {}, {r86, r43}, {0x0, r166}, {r34}, {0x0, r73}, {r30, r148}, {}, {}, {}, {}, {0x0, r147}, {r56, r31}, {r115}, {r145, r21}, {r64}, {0x0, r142}, {}, {r136}, {}, {r133, r84}, {0x0, r164}, {0x0, r111}, {0x0, r125}, {0x0, r100}, {}, {0x0, r178}, {r16}, {r179, r153}, {}, {r62, r33}, {r163, r169}, {}, {}, {r26}, {0x0, r74}, {r56, r132}, {r77}], 0x0, "e8da0117d3c471"}) [ 946.479980][T15716] loop1: detected capacity change from 0 to 4 [ 946.509429][T15720] loop2: detected capacity change from 0 to 4096 [ 946.516873][T15716] EXT4-fs (loop1): #clusters per group too big: 32768 [ 946.526674][T15722] loop4: detected capacity change from 0 to 4096 [ 946.529671][T15727] loop3: detected capacity change from 0 to 4096 [ 946.554972][T15716] loop1: detected capacity change from 0 to 4 [ 946.568087][T15722] EXT4-fs (loop4): Invalid log block size: 4980738 02:22:02 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000feff0000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:22:02 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000003f102000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:22:02 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000800000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 946.570178][T15727] EXT4-fs (loop3): bad geometry: block count 752 exceeds size of device (512 blocks) [ 946.574731][T15716] EXT4-fs (loop1): #clusters per group too big: 32768 [ 946.593633][T15720] EXT4-fs (loop2): bad geometry: first data block 33816576 is beyond end of filesystem (512) 02:22:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004c02000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:22:02 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f0000000000000002034e0006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:22:02 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000040000800000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 946.647927][T15720] loop2: detected capacity change from 0 to 4096 [ 946.683573][T15720] EXT4-fs (loop2): bad geometry: first data block 33816576 is beyond end of filesystem (512) [ 946.712801][T15762] loop1: detected capacity change from 0 to 4 [ 946.719709][T15760] loop3: detected capacity change from 0 to 4096 [ 946.732311][T15767] loop4: detected capacity change from 0 to 4096 02:22:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20002e000002000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:22:02 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000001000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 946.771274][T15760] EXT4-fs (loop3): bad geometry: block count 753 exceeds size of device (512 blocks) [ 946.784443][T15767] EXT4-fs (loop4): Invalid log block size: 5112578 [ 946.799258][T15762] EXT4-fs (loop1): #clusters per group too big: 32768 02:22:02 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000203540006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 946.821579][T15779] loop2: detected capacity change from 0 to 4096 [ 946.833158][T15779] EXT4-fs (loop2): bad geometry: first data block 33816576 is beyond end of filesystem (512) [ 946.856401][T15762] loop1: detected capacity change from 0 to 4 02:22:02 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2002f68cf102000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 946.869795][T15762] EXT4-fs (loop1): #clusters per group too big: 32768 02:22:02 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000002000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 946.900047][T15799] loop4: detected capacity change from 0 to 4096 [ 946.924128][T15799] EXT4-fs (loop4): Invalid log block size: 5505794 [ 946.941581][T15779] loop2: detected capacity change from 0 to 4096 [ 946.954701][T15805] loop3: detected capacity change from 0 to 4096 [ 946.976038][T15805] EXT4-fs (loop3): bad geometry: block count 753 exceeds size of device (512 blocks) [ 946.988158][T15779] EXT4-fs (loop2): bad geometry: first data block 33816576 is beyond end of filesystem (512) 02:22:02 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x97, 0x0, 0x7, 0x0, 0x0, 0x28300, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x418, 0x0, @perf_config_ext={0x4118, 0x100}, 0x800, 0x7, 0x0, 0x8, 0x0, 0xed7, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x3b, 0x5, 0x0, 0x0, 0xcc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xcb8, 0x80}, 0x480, 0xffffffffffffffe0, 0x0, 0x0, 0x20, 0x0, 0x173, 0x0, 0x4bf, 0x0, 0xe408}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000f00)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000004c0)={0x53, 0xffffffffffffffff, 0x2e, 0x6, @scatter={0x2, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000d40)=""/136, 0x88}, {&(0x7f0000000e00)=""/208, 0xd0}]}, &(0x7f00000001c0)="e49d028c0715e20b5104226936005973918fe159f86d8e030acfa71b168531e97c8c98e798097a3c8229ad24d9cb", &(0x7f0000000540)=""/101, 0x15, 0x10000, 0x2, &(0x7f0000000340)}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x10\'\\@$&\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055300)={0x8f7, [{0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r5}, {}, {}, {r3}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {r3}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, r4}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x0, "0d4abfd4b32220"}) r185 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000840)={0x0, 0xfaef, 0xffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r185, 0x0) r186 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r186, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r186, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0xfffffffffffffeff, 0x1) sendto$inet(r186, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b300)={0xffff, [{r72, r60}, {}, {r110}, {r161}, {}, {r172}, {}, {}, {r103}, {}, {r135}, {}, {0x0, r52}, {0x0, r40}, {0x0, r182}, {r127, r14}, {r160, r32}, {r177, r58}, {}, {r13, r176}, {0x0, r180}, {r11}, {r19, r24}, {r28}, {r129}, {0x0, r33}, {}, {}, {}, {r104, r49}, {}, {}, {r47}, {r116, r158}, {0x0, r9}, {}, {0x0, r38}, {0x0, r37}, {}, {}, {0x0, r174}, {}, {r104, r32}, {r126}, {r107, r143}, {0x0, r124}, {}, {}, {0x0, r61}, {}, {}, {0x0, r117}, {r116}, {r66}, {r89, r99}, {}, {}, {}, {r168}, {r34}, {r131, r152}, {}, {}, {r72}, {0x0, r96}, {}, {}, {0x0, r80}, {r78, r137}, {r41}, {0x0, r80}, {}, {0x0, r85}, {r55}, {0x0, r50}, {r25, r170}, {r6}, {r62}, {r179, r12}, {r175}, {0x0, r22}, {r17, r174}, {r46}, {}, {r139, r75}, {r36, r31}, {}, {}, {r140, r100}, {0x0, r92}, {r108}, {r69}, {r181}, {}, {}, {r161}, {r173}, {}, {0x0, r112}, {r101, r7}, {0x0, r144}, {r91}, {}, {r93}, {}, {r95}, {0x0, r114}, {0x0, r134}, {r115}, {}, {r23}, {0x0, r68}, {r51}, {0x0, r90}, {0x0, r109}, {r57, r167}, {0x0, r156}, {r15, r29}, {}, {r97}, {r101, r120}, {}, {r83, r117}, {}, {0x0, r102}, {}, {r181}, {}, {}, {}, {r71}, {r155, r149}, {}, {r154, r65}, {}, {r159, r79}, {0x0, r184}, {r138, r54}, {r42}, {}, {}, {0x0, r48}, {r39}, {}, {0x0, r18}, {r138}, {r165}, {r146}, {0x0, r143}, {}, {r70, r122}, {r20, r105}, {r119}, {r183}, {r113, r45}, {}, {}, {0x0, r100}, {r72}, {}, {0x0, r128}, {0x0, r81}, {r141}, {}, {r171, r84}, {r97}, {}, {r10, r38}, {r177}, {}, {r47, r106}, {0x0, r143}, {r113}, {}, {r145}, {r69}, {r57}, {0x0, r162}, {0x0, r35}, {r87}, {0x0, r53}, {}, {r118, r106}, {0x0, r76}, {r123, r150}, {r121}, {}, {}, {r8}, {}, {}, {}, {}, {}, {r151, r130}, {}, {r181, r35}, {r94, r90}, {r82}, {r72}, {r16}, {}, {r135, r44}, {0x0, r88}, {r123}, {r129}, {r98}, {}, {}, {0x0, r164}, {0x0, r27}, {r157}, {0x0, r63}, {0x0, r43}, {0x0, r59}, {0x0, r43}, {0x0, r27}, {r121, r67}, {}, {r86, r43}, {0x0, r166}, {r34}, {0x0, r73}, {r30, r148}, {}, {}, {}, {}, {0x0, r147}, {r56, r31}, {r115}, {r145, r21}, {r64}, {0x0, r142}, {}, {r136}, {}, {r133, r84}, {0x0, r164}, {0x0, r111}, {0x0, r125}, {0x0, r100}, {}, {0x0, r178}, {r16}, {r179, r153}, {}, {r62, r33}, {r163, r169}, {}, {}, {r26}, {0x0, r74}, {r56, r132}, {r77}], 0x0, "e8da0117d3c471"}) 02:22:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006002000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:22:02 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000001000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:22:02 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20fffffff402000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:22:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200048000002000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:22:02 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000203550006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:22:02 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000002000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 947.392726][T15836] loop4: detected capacity change from 0 to 4096 [ 947.409809][T15841] loop1: detected capacity change from 0 to 4 [ 947.411524][T15839] loop2: detected capacity change from 0 to 4096 [ 947.426999][T15844] loop3: detected capacity change from 0 to 4096 [ 947.437245][ C1] scsi_io_completion_action: 4 callbacks suppressed [ 947.437273][ C1] sd 0:0:1:0: tag#5280 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 947.453891][ C1] sd 0:0:1:0: tag#5280 CDB: opcode=0xe5 (vendor) [ 947.460218][ C1] sd 0:0:1:0: tag#5280 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 947.469266][ C1] sd 0:0:1:0: tag#5280 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 947.475802][T15839] EXT4-fs (loop2): bad geometry: first data block 33816576 is beyond end of filesystem (512) [ 947.478426][ C1] sd 0:0:1:0: tag#5280 CDB[20]: ba 02:22:02 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000402000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 947.516923][T15841] EXT4-fs (loop1): #clusters per group too big: 32768 [ 947.517603][ C1] sd 0:0:1:0: tag#5281 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 947.525706][T15836] EXT4-fs (loop4): Invalid log block size: 5571330 [ 947.533552][ C1] sd 0:0:1:0: tag#5281 CDB: opcode=0xe4 (vendor) [ 947.544286][T15844] EXT4-fs (loop3): bad geometry: block count 756 exceeds size of device (512 blocks) [ 947.546537][ C1] sd 0:0:1:0: tag#5281 CDB[00]: e4 9d 02 8c 07 15 e2 0b 51 04 22 69 36 00 59 73 02:22:03 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000003000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:22:03 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000004000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 947.565304][ C1] sd 0:0:1:0: tag#5281 CDB[10]: 91 8f e1 59 f8 6d 8e 03 0a cf a7 1b 16 85 31 e9 [ 947.574440][ C1] sd 0:0:1:0: tag#5281 CDB[20]: 7c 8c 98 e7 98 09 7a 3c 82 29 ad 24 d9 cb 02:22:03 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20fffffff602000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 947.624822][T15841] loop1: detected capacity change from 0 to 4 [ 947.628970][T15839] loop2: detected capacity change from 0 to 4096 [ 947.631335][T15841] EXT4-fs (loop1): #clusters per group too big: 32768 02:22:03 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000203580006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 947.669376][T15839] EXT4-fs (loop2): bad geometry: first data block 33816576 is beyond end of filesystem (512) [ 947.701996][T15886] loop3: detected capacity change from 0 to 4096 [ 947.713666][T15886] EXT4-fs (loop3): bad geometry: block count 758 exceeds size of device (512 blocks) [ 947.720757][T15890] loop4: detected capacity change from 0 to 4096 [ 947.731822][T15890] EXT4-fs (loop4): Invalid log block size: 5767938 02:22:03 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x97, 0x0, 0x7, 0x0, 0x0, 0x28300, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x418, 0x0, @perf_config_ext={0x4118, 0x100}, 0x800, 0x7, 0x0, 0x8, 0x0, 0xed7, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x3b, 0x5, 0x0, 0x0, 0xcc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xcb8, 0x80}, 0x480, 0xffffffffffffffe0, 0x0, 0x0, 0x20, 0x0, 0x173, 0x0, 0x4bf, 0x0, 0xe408}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000f00)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000004c0)={0x53, 0xffffffffffffffff, 0x2e, 0x6, @scatter={0x2, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000d40)=""/136, 0x88}, {&(0x7f0000000e00)=""/208, 0xd0}]}, &(0x7f00000001c0)="e49d028c0715e20b5104226936005973918fe159f86d8e030acfa71b168531e97c8c98e798097a3c8229ad24d9cb", &(0x7f0000000540)=""/101, 0x15, 0x10000, 0x2, &(0x7f0000000340)}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x10\'\\@$&\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055300)={0x8f7, [{0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r5}, {}, {}, {r3}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {r3}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, r4}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x0, "0d4abfd4b32220"}) r185 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000840)={0x0, 0xfaef, 0xffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r185, 0x0) r186 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r186, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r186, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0xfffffffffffffeff, 0x1) sendto$inet(r186, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b300)={0xffff, [{r72, r60}, {}, {r110}, {r161}, {}, {r172}, {}, {}, {r103}, {}, {r135}, {}, {0x0, r52}, {0x0, r40}, {0x0, r182}, {r127, r14}, {r160, r32}, {r177, r58}, {}, {r13, r176}, {0x0, r180}, {r11}, {r19, r24}, {r28}, {r129}, {0x0, r33}, {}, {}, {}, {r104, r49}, {}, {}, {r47}, {r116, r158}, {0x0, r9}, {}, {0x0, r38}, {0x0, r37}, {}, {}, {0x0, r174}, {}, {r104, r32}, {r126}, {r107, r143}, {0x0, r124}, {}, {}, {0x0, r61}, {}, {}, {0x0, r117}, {r116}, {r66}, {r89, r99}, {}, {}, {}, {r168}, {r34}, {r131, r152}, {}, {}, {r72}, {0x0, r96}, {}, {}, {0x0, r80}, {r78, r137}, {r41}, {0x0, r80}, {}, {0x0, r85}, {r55}, {0x0, r50}, {r25, r170}, {r6}, {r62}, {r179, r12}, {r175}, {0x0, r22}, {r17, r174}, {r46}, {}, {r139, r75}, {r36, r31}, {}, {}, {r140, r100}, {0x0, r92}, {r108}, {r69}, {r181}, {}, {}, {r161}, {r173}, {}, {0x0, r112}, {r101, r7}, {0x0, r144}, {r91}, {}, {r93}, {}, {r95}, {0x0, r114}, {0x0, r134}, {r115}, {}, {r23}, {0x0, r68}, {r51}, {0x0, r90}, {0x0, r109}, {r57, r167}, {0x0, r156}, {r15, r29}, {}, {r97}, {r101, r120}, {}, {r83, r117}, {}, {0x0, r102}, {}, {r181}, {}, {}, {}, {r71}, {r155, r149}, {}, {r154, r65}, {}, {r159, r79}, {0x0, r184}, {r138, r54}, {r42}, {}, {}, {0x0, r48}, {r39}, {}, {0x0, r18}, {r138}, {r165}, {r146}, {0x0, r143}, {}, {r70, r122}, {r20, r105}, {r119}, {r183}, {r113, r45}, {}, {}, {0x0, r100}, {r72}, {}, {0x0, r128}, {0x0, r81}, {r141}, {}, {r171, r84}, {r97}, {}, {r10, r38}, {r177}, {}, {r47, r106}, {0x0, r143}, {r113}, {}, {r145}, {r69}, {r57}, {0x0, r162}, {0x0, r35}, {r87}, {0x0, r53}, {}, {r118, r106}, {0x0, r76}, {r123, r150}, {r121}, {}, {}, {r8}, {}, {}, {}, {}, {}, {r151, r130}, {}, {r181, r35}, {r94, r90}, {r82}, {r72}, {r16}, {}, {r135, r44}, {0x0, r88}, {r123}, {r129}, {r98}, {}, {}, {0x0, r164}, {0x0, r27}, {r157}, {0x0, r63}, {0x0, r43}, {0x0, r59}, {0x0, r43}, {0x0, r27}, {r121, r67}, {}, {r86, r43}, {0x0, r166}, {r34}, {0x0, r73}, {r30, r148}, {}, {}, {}, {}, {0x0, r147}, {r56, r31}, {r115}, {r145, r21}, {r64}, {0x0, r142}, {}, {r136}, {}, {r133, r84}, {0x0, r164}, {0x0, r111}, {0x0, r125}, {0x0, r100}, {}, {0x0, r178}, {r16}, {r179, r153}, {}, {r62, r33}, {r163, r169}, {}, {}, {r26}, {0x0, r74}, {r56, r132}, {r77}], 0x0, "e8da0117d3c471"}) 02:22:03 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000005000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:22:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006802000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:22:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20004c000002000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:22:03 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000ff802000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:22:03 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000203590006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 948.296136][T15913] loop4: detected capacity change from 0 to 4096 [ 948.312880][ C0] sd 0:0:1:0: tag#5282 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 948.322785][ C0] sd 0:0:1:0: tag#5282 CDB: opcode=0xe5 (vendor) [ 948.328932][T15918] loop2: detected capacity change from 0 to 4096 [ 948.329225][ C0] sd 0:0:1:0: tag#5282 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c 02:22:03 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000006000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 948.336834][T15919] loop3: detected capacity change from 0 to 4096 [ 948.344798][ C0] sd 0:0:1:0: tag#5282 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 948.344815][ C0] sd 0:0:1:0: tag#5282 CDB[20]: ba [ 948.360887][T15920] loop1: detected capacity change from 0 to 4 [ 948.383660][T15913] EXT4-fs (loop4): Invalid log block size: 5833474 02:22:03 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f0000000000000002035e0006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 948.393155][T15918] EXT4-fs (loop2): bad geometry: first data block 33816576 is beyond end of filesystem (512) [ 948.414725][T15920] EXT4-fs (loop1): #clusters per group too big: 32768 [ 948.422106][T15919] EXT4-fs (loop3): bad geometry: block count 760 exceeds size of device (512 blocks) [ 948.426781][ C0] sd 0:0:1:0: tag#5283 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s 02:22:03 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20fffffdf902000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 948.441419][ C0] sd 0:0:1:0: tag#5283 CDB: opcode=0xe4 (vendor) [ 948.447758][ C0] sd 0:0:1:0: tag#5283 CDB[00]: e4 9d 02 8c 07 15 e2 0b 51 04 22 69 36 00 59 73 [ 948.456797][ C0] sd 0:0:1:0: tag#5283 CDB[10]: 91 8f e1 59 f8 6d 8e 03 0a cf a7 1b 16 85 31 e9 [ 948.465856][ C0] sd 0:0:1:0: tag#5283 CDB[20]: 7c 8c 98 e7 98 09 7a 3c 82 29 ad 24 d9 cb [ 948.489243][T15935] loop3: detected capacity change from 0 to 4096 02:22:03 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000406000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 948.498066][T15920] loop1: detected capacity change from 0 to 4 [ 948.517808][T15920] EXT4-fs (loop1): #clusters per group too big: 32768 [ 948.527500][T15935] EXT4-fs (loop3): bad geometry: block count 761 exceeds size of device (512 blocks) [ 948.530112][T15918] loop2: detected capacity change from 0 to 4096 02:22:03 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20fffffffb02000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:22:04 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000007000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 948.549085][T15952] loop4: detected capacity change from 0 to 4096 [ 948.559497][T15918] EXT4-fs (loop2): bad geometry: first data block 33816576 is beyond end of filesystem (512) [ 948.580762][T15952] EXT4-fs (loop4): Invalid log block size: 6161154 [ 948.620250][T15965] loop3: detected capacity change from 0 to 4096 [ 948.650278][T15965] EXT4-fs (loop3): bad geometry: block count 763 exceeds size of device (512 blocks) 02:22:04 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x97, 0x0, 0x7, 0x0, 0x0, 0x28300, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x418, 0x0, @perf_config_ext={0x4118, 0x100}, 0x800, 0x7, 0x0, 0x8, 0x0, 0xed7, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x3b, 0x5, 0x0, 0x0, 0xcc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xcb8, 0x80}, 0x480, 0xffffffffffffffe0, 0x0, 0x0, 0x20, 0x0, 0x173, 0x0, 0x4bf, 0x0, 0xe408}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000f00)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000004c0)={0x53, 0xffffffffffffffff, 0x2e, 0x6, @scatter={0x2, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000d40)=""/136, 0x88}, {&(0x7f0000000e00)=""/208, 0xd0}]}, &(0x7f00000001c0)="e49d028c0715e20b5104226936005973918fe159f86d8e030acfa71b168531e97c8c98e798097a3c8229ad24d9cb", &(0x7f0000000540)=""/101, 0x15, 0x10000, 0x2, &(0x7f0000000340)}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x10\'\\@$&\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055300)={0x8f7, [{0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r5}, {}, {}, {r3}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {r3}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, r4}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x0, "0d4abfd4b32220"}) r184 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000840)={0x0, 0xfaef, 0xffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r184, 0x0) r185 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r185, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r185, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0xfffffffffffffeff, 0x1) sendto$inet(r185, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b300)={0xffff, [{r71, r59}, {}, {r109}, {r160}, {}, {r171}, {}, {}, {r102}, {}, {r134}, {}, {0x0, r51}, {0x0, r39}, {0x0, r181}, {r126, r13}, {r159, r31}, {r176, r57}, {}, {r12, r175}, {0x0, r179}, {r10}, {r18, r23}, {r27}, {r128}, {0x0, r32}, {}, {}, {}, {r103, r48}, {}, {}, {r46}, {r115, r157}, {}, {r55}, {0x0, r37}, {0x0, r36}, {}, {}, {0x0, r173}, {}, {r103, r31}, {r125}, {r106, r142}, {0x0, r123}, {}, {}, {0x0, r60}, {}, {}, {0x0, r116}, {r115}, {r65}, {r88, r98}, {}, {}, {}, {r167}, {r33}, {r130, r151}, {}, {}, {r71}, {0x0, r95}, {}, {}, {0x0, r79}, {r77, r136}, {r40}, {0x0, r79}, {}, {0x0, r84}, {r54}, {0x0, r49}, {r24, r169}, {r6}, {r61}, {r178, r11}, {r174}, {0x0, r21}, {r16, r173}, {r45}, {}, {r138, r74}, {r35, r30}, {}, {}, {r139, r99}, {0x0, r91}, {r107}, {r68}, {r180}, {}, {}, {r160}, {r172}, {}, {0x0, r111}, {r100, r7}, {0x0, r143}, {r90}, {}, {r92}, {}, {r94}, {0x0, r113}, {0x0, r133}, {r114}, {}, {r22}, {0x0, r67}, {r50}, {0x0, r89}, {0x0, r108}, {r56, r166}, {0x0, r155}, {r14, r28}, {}, {r96}, {r100, r119}, {}, {r82, r116}, {}, {0x0, r101}, {}, {r180}, {}, {}, {}, {r70}, {r154, r148}, {}, {r153, r64}, {}, {r158, r78}, {0x0, r183}, {r137, r53}, {r41}, {}, {}, {0x0, r47}, {r38}, {}, {0x0, r17}, {r137}, {r164}, {r145}, {0x0, r142}, {}, {r69, r121}, {r19, r104}, {r118}, {r182}, {r112, r44}, {}, {}, {0x0, r99}, {r71}, {}, {0x0, r127}, {0x0, r80}, {r140}, {}, {r170, r83}, {r96}, {}, {r9, r37}, {r176}, {}, {r46, r105}, {0x0, r142}, {r112}, {}, {r144}, {r68}, {r56}, {0x0, r161}, {0x0, r34}, {r86}, {0x0, r52}, {}, {r117, r105}, {0x0, r75}, {r122, r149}, {r120}, {}, {}, {r8}, {}, {}, {}, {}, {}, {r150, r129}, {}, {r180, r34}, {r93, r89}, {r81}, {r71}, {r15}, {}, {r134, r43}, {0x0, r87}, {r122}, {r128}, {r97}, {}, {}, {0x0, r163}, {0x0, r26}, {r156}, {0x0, r62}, {0x0, r42}, {0x0, r58}, {0x0, r42}, {0x0, r26}, {r120, r66}, {}, {r85, r42}, {0x0, r165}, {r33}, {0x0, r72}, {r29, r147}, {}, {}, {}, {}, {0x0, r146}, {r55, r30}, {r114}, {r144, r20}, {r63}, {0x0, r141}, {}, {r135}, {}, {r132, r83}, {0x0, r163}, {0x0, r110}, {0x0, r124}, {0x0, r99}, {}, {0x0, r177}, {r15}, {r178, r152}, {}, {r61, r32}, {r162, r168}, {}, {}, {r25}, {0x0, r73}, {r55, r131}, {r76}], 0x0, "e8da0117d3c471"}) 02:22:04 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f0000000000000002035f0006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:22:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200060000002000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:22:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006c02000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:22:04 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000008000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:22:04 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20fffffdfd02000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 949.193679][T15986] loop2: detected capacity change from 0 to 4096 [ 949.200513][T15988] loop1: detected capacity change from 0 to 4 [ 949.208449][T15989] loop3: detected capacity change from 0 to 4096 [ 949.211710][T15987] loop4: detected capacity change from 0 to 4096 [ 949.231153][T15986] EXT4-fs (loop2): bad geometry: first data block 33816576 is beyond end of filesystem (512) [ 949.243657][ C1] sd 0:0:1:0: tag#5284 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 949.251761][T15988] EXT4-fs (loop1): #clusters per group too big: 32768 [ 949.253609][ C1] sd 0:0:1:0: tag#5284 CDB: opcode=0xe5 (vendor) [ 949.253628][ C1] sd 0:0:1:0: tag#5284 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 949.275738][ C1] sd 0:0:1:0: tag#5284 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 949.283377][T15987] EXT4-fs (loop4): Invalid log block size: 6226690 02:22:04 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000018000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 949.284807][ C1] sd 0:0:1:0: tag#5284 CDB[20]: ba [ 949.296429][T15989] EXT4-fs (loop3): bad geometry: block count 765 exceeds size of device (512 blocks) [ 949.301431][ C1] sd 0:0:1:0: tag#5285 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 949.315750][ C1] sd 0:0:1:0: tag#5285 CDB: opcode=0xe4 (vendor) [ 949.322075][ C1] sd 0:0:1:0: tag#5285 CDB[00]: e4 9d 02 8c 07 15 e2 0b 51 04 22 69 36 00 59 73 [ 949.331134][ C1] sd 0:0:1:0: tag#5285 CDB[10]: 91 8f e1 59 f8 6d 8e 03 0a cf a7 1b 16 85 31 e9 02:22:04 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000001c000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 949.340189][ C1] sd 0:0:1:0: tag#5285 CDB[20]: 7c 8c 98 e7 98 09 7a 3c 82 29 ad 24 d9 cb 02:22:04 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20fffffffd02000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:22:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200068000002000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:22:04 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200600006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 949.373402][T15988] loop1: detected capacity change from 0 to 4 [ 949.403380][T15988] EXT4-fs (loop1): #clusters per group too big: 32768 02:22:04 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000026000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 949.424755][T16025] loop3: detected capacity change from 0 to 4096 [ 949.460841][T16025] EXT4-fs (loop3): bad geometry: block count 765 exceeds size of device (512 blocks) [ 949.471406][T16034] loop2: detected capacity change from 0 to 4096 [ 949.481480][T16034] EXT4-fs (loop2): bad geometry: first data block 33816576 is beyond end of filesystem (512) [ 949.502783][T16037] loop4: detected capacity change from 0 to 4096 [ 949.514162][T16037] EXT4-fs (loop4): Invalid log block size: 6291458 [ 949.534143][T16034] loop2: detected capacity change from 0 to 4096 [ 949.541599][T16034] EXT4-fs (loop2): bad geometry: first data block 33816576 is beyond end of filesystem (512) 02:22:05 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x97, 0x0, 0x7, 0x0, 0x0, 0x28300, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x418, 0x0, @perf_config_ext={0x4118, 0x100}, 0x800, 0x7, 0x0, 0x8, 0x0, 0xed7, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x3b, 0x5, 0x0, 0x0, 0xcc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xcb8, 0x80}, 0x480, 0xffffffffffffffe0, 0x0, 0x0, 0x20, 0x0, 0x173, 0x0, 0x4bf, 0x0, 0xe408}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000f00)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000004c0)={0x53, 0xffffffffffffffff, 0x2e, 0x6, @scatter={0x2, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000d40)=""/136, 0x88}, {&(0x7f0000000e00)=""/208, 0xd0}]}, &(0x7f00000001c0)="e49d028c0715e20b5104226936005973918fe159f86d8e030acfa71b168531e97c8c98e798097a3c8229ad24d9cb", &(0x7f0000000540)=""/101, 0x15, 0x10000, 0x2, &(0x7f0000000340)}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x10\'\\@$&\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055300)={0x8f7, [{0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r5}, {}, {}, {r3}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {r3}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, r4}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x0, "0d4abfd4b32220"}) r184 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000840)={0x0, 0xfaef, 0xffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r184, 0x0) r185 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r185, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r185, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0xfffffffffffffeff, 0x1) sendto$inet(r185, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b300)={0xffff, [{r71, r59}, {}, {r109}, {r160}, {}, {r171}, {}, {}, {r102}, {}, {r134}, {}, {0x0, r51}, {0x0, r39}, {0x0, r181}, {r126, r13}, {r159, r31}, {r176, r57}, {}, {r12, r175}, {0x0, r179}, {r10}, {r18, r23}, {r27}, {r128}, {0x0, r32}, {}, {}, {}, {r103, r48}, {}, {}, {r46}, {r115, r157}, {}, {r55}, {0x0, r37}, {0x0, r36}, {}, {}, {0x0, r173}, {}, {r103, r31}, {r125}, {r106, r142}, {0x0, r123}, {}, {}, {0x0, r60}, {}, {}, {0x0, r116}, {r115}, {r65}, {r88, r98}, {}, {}, {}, {r167}, {r33}, {r130, r151}, {}, {}, {r71}, {0x0, r95}, {}, {}, {0x0, r79}, {r77, r136}, {r40}, {0x0, r79}, {}, {0x0, r84}, {r54}, {0x0, r49}, {r24, r169}, {r6}, {r61}, {r178, r11}, {r174}, {0x0, r21}, {r16, r173}, {r45}, {}, {r138, r74}, {r35, r30}, {}, {}, {r139, r99}, {0x0, r91}, {r107}, {r68}, {r180}, {}, {}, {r160}, {r172}, {}, {0x0, r111}, {r100, r7}, {0x0, r143}, {r90}, {}, {r92}, {}, {r94}, {0x0, r113}, {0x0, r133}, {r114}, {}, {r22}, {0x0, r67}, {r50}, {0x0, r89}, {0x0, r108}, {r56, r166}, {0x0, r155}, {r14, r28}, {}, {r96}, {r100, r119}, {}, {r82, r116}, {}, {0x0, r101}, {}, {r180}, {}, {}, {}, {r70}, {r154, r148}, {}, {r153, r64}, {}, {r158, r78}, {0x0, r183}, {r137, r53}, {r41}, {}, {}, {0x0, r47}, {r38}, {}, {0x0, r17}, {r137}, {r164}, {r145}, {0x0, r142}, {}, {r69, r121}, {r19, r104}, {r118}, {r182}, {r112, r44}, {}, {}, {0x0, r99}, {r71}, {}, {0x0, r127}, {0x0, r80}, {r140}, {}, {r170, r83}, {r96}, {}, {r9, r37}, {r176}, {}, {r46, r105}, {0x0, r142}, {r112}, {}, {r144}, {r68}, {r56}, {0x0, r161}, {0x0, r34}, {r86}, {0x0, r52}, {}, {r117, r105}, {0x0, r75}, {r122, r149}, {r120}, {}, {}, {r8}, {}, {}, {}, {}, {}, {r150, r129}, {}, {r180, r34}, {r93, r89}, {r81}, {r71}, {r15}, {}, {r134, r43}, {0x0, r87}, {r122}, {r128}, {r97}, {}, {}, {0x0, r163}, {0x0, r26}, {r156}, {0x0, r62}, {0x0, r42}, {0x0, r58}, {0x0, r42}, {0x0, r26}, {r120, r66}, {}, {r85, r42}, {0x0, r165}, {r33}, {0x0, r72}, {r29, r147}, {}, {}, {}, {}, {0x0, r146}, {r55, r30}, {r114}, {r144, r20}, {r63}, {0x0, r141}, {}, {r135}, {}, {r132, r83}, {0x0, r163}, {0x0, r110}, {0x0, r124}, {0x0, r99}, {}, {0x0, r177}, {r15}, {r178, r152}, {}, {r61, r32}, {r162, r168}, {}, {}, {r25}, {0x0, r73}, {r55, r131}, {r76}], 0x0, "e8da0117d3c471"}) 02:22:05 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000052a000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:22:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000007402000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:22:05 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20fffffffe02000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:22:05 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200680006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:22:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20006c000002000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:22:05 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000003f000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 949.678509][T16064] loop2: detected capacity change from 0 to 4096 [ 949.689539][T16068] loop4: detected capacity change from 0 to 4096 [ 949.691048][T16072] loop3: detected capacity change from 0 to 4096 [ 949.704811][ C0] sd 0:0:1:0: tag#5286 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 949.705840][T16069] loop1: detected capacity change from 0 to 4 [ 949.714646][ C0] sd 0:0:1:0: tag#5286 CDB: opcode=0xe5 (vendor) [ 949.727021][ C0] sd 0:0:1:0: tag#5286 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 949.736082][ C0] sd 0:0:1:0: tag#5286 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 949.745131][ C0] sd 0:0:1:0: tag#5286 CDB[20]: ba [ 949.756055][T16069] EXT4-fs (loop1): #clusters per group too big: 32768 [ 949.770622][T16068] EXT4-fs (loop4): Invalid log block size: 6815746 [ 949.777735][T16064] EXT4-fs (loop2): bad geometry: first data block 33816576 is beyond end of filesystem (512) [ 949.786230][ C1] sd 0:0:1:0: tag#5287 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 949.790354][T16072] EXT4-fs (loop3): bad geometry: block count 766 exceeds size of device (512 blocks) [ 949.798025][ C1] sd 0:0:1:0: tag#5287 CDB: opcode=0xe4 (vendor) [ 949.798050][ C1] sd 0:0:1:0: tag#5287 CDB[00]: e4 9d 02 8c 07 15 e2 0b 51 04 22 69 36 00 59 73 02:22:05 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000040000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:22:05 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f0000000000000002006c0006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:22:05 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000001ff02000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:22:05 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000080040000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 949.822967][ C1] sd 0:0:1:0: tag#5287 CDB[10]: 91 8f e1 59 f8 6d 8e 03 0a cf a7 1b 16 85 31 e9 [ 949.832066][ C1] sd 0:0:1:0: tag#5287 CDB[20]: 7c 8c 98 e7 98 09 7a 3c 82 29 ad 24 d9 cb [ 949.883373][T16069] loop1: detected capacity change from 0 to 4 [ 949.885972][T16064] loop2: detected capacity change from 0 to 4096 [ 949.890060][T16069] EXT4-fs (loop1): #clusters per group too big: 32768 [ 949.905826][T16088] loop3: detected capacity change from 0 to 4096 [ 949.912267][T16064] EXT4-fs (loop2): bad geometry: first data block 33816576 is beyond end of filesystem (512) 02:22:05 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000480000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 949.946247][T16088] EXT4-fs (loop3): bad geometry: block count 767 exceeds size of device (512 blocks) [ 949.971912][T16108] loop4: detected capacity change from 0 to 4096 [ 950.005702][T16108] EXT4-fs (loop4): Invalid log block size: 7077890 02:22:05 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000fffffff6000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:22:05 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000fff02000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:22:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200074000002000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:22:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000007a02000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:22:05 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x97, 0x0, 0x7, 0x0, 0x0, 0x28300, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x418, 0x0, @perf_config_ext={0x4118, 0x100}, 0x800, 0x7, 0x0, 0x8, 0x0, 0xed7, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x3b, 0x5, 0x0, 0x0, 0xcc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xcb8, 0x80}, 0x480, 0xffffffffffffffe0, 0x0, 0x0, 0x20, 0x0, 0x173, 0x0, 0x4bf, 0x0, 0xe408}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000f00)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000004c0)={0x53, 0xffffffffffffffff, 0x2e, 0x6, @scatter={0x2, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000d40)=""/136, 0x88}, {&(0x7f0000000e00)=""/208, 0xd0}]}, &(0x7f00000001c0)="e49d028c0715e20b5104226936005973918fe159f86d8e030acfa71b168531e97c8c98e798097a3c8229ad24d9cb", &(0x7f0000000540)=""/101, 0x15, 0x10000, 0x2, &(0x7f0000000340)}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x10\'\\@$&\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055300)={0x8f7, [{0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r5}, {}, {}, {r3}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {r3}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, r4}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0, r4}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x0, "0d4abfd4b32220"}) r184 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000840)={0x0, 0xfaef, 0xffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r184, 0x0) r185 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r185, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r185, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0xfffffffffffffeff, 0x1) sendto$inet(r185, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b300)={0xffff, [{r71, r59}, {}, {r109}, {r160}, {}, {r171}, {}, {}, {r102}, {}, {r134}, {}, {0x0, r51}, {0x0, r39}, {0x0, r181}, {r126, r13}, {r159, r31}, {r176, r57}, {}, {r12, r175}, {0x0, r179}, {r10}, {r18, r23}, {r27}, {r128}, {0x0, r32}, {}, {}, {}, {r103, r48}, {}, {}, {r46}, {r115, r157}, {}, {r55}, {0x0, r37}, {0x0, r36}, {}, {}, {0x0, r173}, {}, {r103, r31}, {r125}, {r106, r142}, {0x0, r123}, {}, {}, {0x0, r60}, {}, {}, {0x0, r116}, {r115}, {r65}, {r88, r98}, {}, {}, {}, {r167}, {r33}, {r130, r151}, {}, {}, {r71}, {0x0, r95}, {}, {}, {0x0, r79}, {r77, r136}, {r40}, {0x0, r79}, {}, {0x0, r84}, {r54}, {0x0, r49}, {r24, r169}, {r6}, {r61}, {r178, r11}, {r174}, {0x0, r21}, {r16, r173}, {r45}, {}, {r138, r74}, {r35, r30}, {}, {}, {r139, r99}, {0x0, r91}, {r107}, {r68}, {r180}, {}, {}, {r160}, {r172}, {}, {0x0, r111}, {r100, r7}, {0x0, r143}, {r90}, {}, {r92}, {}, {r94}, {0x0, r113}, {0x0, r133}, {r114}, {}, {r22}, {0x0, r67}, {r50}, {0x0, r89}, {0x0, r108}, {r56, r166}, {0x0, r155}, {r14, r28}, {}, {r96}, {r100, r119}, {}, {r82, r116}, {}, {0x0, r101}, {}, {r180}, {}, {}, {}, {r70}, {r154, r148}, {}, {r153, r64}, {}, {r158, r78}, {0x0, r183}, {r137, r53}, {r41}, {}, {}, {0x0, r47}, {r38}, {}, {0x0, r17}, {r137}, {r164}, {r145}, {0x0, r142}, {}, {r69, r121}, {r19, r104}, {r118}, {r182}, {r112, r44}, {}, {}, {0x0, r99}, {r71}, {}, {0x0, r127}, {0x0, r80}, {r140}, {}, {r170, r83}, {r96}, {}, {r9, r37}, {r176}, {}, {r46, r105}, {0x0, r142}, {r112}, {}, {r144}, {r68}, {r56}, {0x0, r161}, {0x0, r34}, {r86}, {0x0, r52}, {}, {r117, r105}, {0x0, r75}, {r122, r149}, {r120}, {}, {}, {r8}, {}, {}, {}, {}, {}, {r150, r129}, {}, {r180, r34}, {r93, r89}, {r81}, {r71}, {r15}, {}, {r134, r43}, {0x0, r87}, {r122}, {r128}, {r97}, {}, {}, {0x0, r163}, {0x0, r26}, {r156}, {0x0, r62}, {0x0, r42}, {0x0, r58}, {0x0, r42}, {0x0, r26}, {r120, r66}, {}, {r85, r42}, {0x0, r165}, {r33}, {0x0, r72}, {r29, r147}, {}, {}, {}, {}, {0x0, r146}, {r55, r30}, {r114}, {r144, r20}, {r63}, {0x0, r141}, {}, {r135}, {}, {r132, r83}, {0x0, r163}, {0x0, r110}, {0x0, r124}, {0x0, r99}, {}, {0x0, r177}, {r15}, {r178, r152}, {}, {r61, r32}, {r162, r168}, {}, {}, {r25}, {0x0, r73}, {r55, r131}, {r76}], 0x0, "e8da0117d3c471"}) 02:22:05 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200740006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 950.565541][T16133] loop4: detected capacity change from 0 to 4096 [ 950.580991][T16138] loop2: detected capacity change from 0 to 4096 [ 950.588865][T16139] loop3: detected capacity change from 0 to 4096 [ 950.596963][ C1] sd 0:0:1:0: tag#5288 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 950.604075][T16144] loop1: detected capacity change from 0 to 4 02:22:06 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000fffffffe000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 950.606829][ C1] sd 0:0:1:0: tag#5288 CDB: opcode=0xe5 (vendor) [ 950.619286][ C1] sd 0:0:1:0: tag#5288 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 950.628681][ C1] sd 0:0:1:0: tag#5288 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 950.632466][T16133] EXT4-fs (loop4): Invalid log block size: 7602178 [ 950.637724][ C1] sd 0:0:1:0: tag#5288 CDB[20]: ba [ 950.653619][ C1] sd 0:0:1:0: tag#5289 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 950.663467][ C1] sd 0:0:1:0: tag#5289 CDB: opcode=0xe4 (vendor) [ 950.669811][ C1] sd 0:0:1:0: tag#5289 CDB[00]: e4 9d 02 8c 07 15 e2 0b 51 04 22 69 36 00 59 73 [ 950.674268][T16138] EXT4-fs (loop2): bad geometry: first data block 33816576 is beyond end of filesystem (512) [ 950.678888][ C1] sd 0:0:1:0: tag#5289 CDB[10]: 91 8f e1 59 f8 6d 8e 03 0a cf a7 1b 16 85 31 e9 [ 950.678906][ C1] sd 0:0:1:0: tag#5289 CDB[20]: 7c 8c 98 e7 98 09 7a 3c 82 29 ad 24 d9 cb 02:22:06 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000f6ffffff000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:22:06 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f0000feffffff000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:22:06 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000000030000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 950.723027][T16144] EXT4-fs (loop1): #clusters per group too big: 32768 [ 950.724514][T16139] EXT4-fs (loop3): bad geometry: block count 767 exceeds size of device (512 blocks) 02:22:06 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20ffffefff02000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:22:06 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000000040000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:22:06 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000203780006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 950.776586][T16138] loop2: detected capacity change from 0 to 4096 [ 950.786167][T16144] loop1: detected capacity change from 0 to 4 [ 950.793082][T16138] EXT4-fs (loop2): bad geometry: first data block 33816576 is beyond end of filesystem (512) [ 950.793389][T16133] loop4: detected capacity change from 0 to 4096 [ 950.810575][T16144] EXT4-fs (loop1): #clusters per group too big: 32768 02:22:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20007a000002000019000000900100000f000000000004020200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:22:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008202000019000000900100000f000000000008000000000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 950.865603][T16180] loop3: detected capacity change from 0 to 4096 [ 950.892925][T16190] loop4: detected capacity change from 0 to 4096 [ 950.901561][T16190] EXT4-fs (loop4): Invalid log block size: 7865090 02:22:06 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000000090000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) [ 950.913582][T16180] EXT4-fs (loop3): bad geometry: block count 767 exceeds size of device (512 blocks) [ 950.926569][T16199] loop2: detected capacity change from 0 to 4096 [ 950.944541][T16198] loop1: detected capacity change from 0 to 4 02:22:06 executing program 4: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000203790006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:22:06 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x7fff, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20fffffbff02000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 02:22:06 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x97, 0x0, 0x7, 0x0, 0x0, 0x28300, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x418, 0x0, @perf_config_ext={0x4118, 0x100}, 0x800, 0x7, 0x0, 0x8, 0x0, 0xed7, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x9) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x3b, 0x5, 0x0, 0x0, 0xcc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xcb8, 0x80}, 0x480, 0xffffffffffffffe0, 0x0, 0x0, 0x20, 0x0, 0x173, 0x0, 0x4bf, 0x0, 0xe408}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000f00)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000004c0)={0x53, 0xffffffffffffffff, 0x2e, 0x6, @scatter={0x2, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000d40)=""/136, 0x88}, {&(0x7f0000000e00)=""/208, 0xd0}]}, &(0x7f00000001c0)="e49d028c0715e20b5104226936005973918fe159f86d8e030acfa71b168531e97c8c98e798097a3c8229ad24d9cb", &(0x7f0000000540)=""/101, 0x15, 0x10000, 0x2, &(0x7f0000000340)}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000300)='\x10\'\\@$&\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055300)={0x8f7, [{0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0