loop0: detected capacity change from 0 to 1024 ------------[ cut here ]------------ kernel BUG at fs/buffer.c:2666! Internal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP Modules linked in: CPU: 1 PID: 15064 Comm: syz.0.2372 Not tainted 6.1.128-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : submit_bh_wbc+0x3f4/0x468 fs/buffer.c:2666 lr : submit_bh_wbc+0x3f4/0x468 fs/buffer.c:2666 sp : ffff8000217374f0 x29: ffff800021737500 x28: dfff800000000000 x27: dfff800000000000 x26: 1ffff000042e6ec0 x25: 0000000000000000 x24: 1fffe0002072f6e8 x23: 1fffe0002072f6e8 x22: dfff800000000000 x21: 0000000000003000 x20: ffff00010397b740 x19: 0000000000000004 x18: 1fffe0001b4243ff x17: ffff80019e2a1000 x16: ffff800008300a74 x15: 0000000000010000 x14: 1ffff00002b5e0b2 x13: dfff800000000000 x12: 0000000000080000 x11: 000000000000ae6d x10: ffff8000265aa000 x9 : ffff800008b39af8 x8 : 000000000000ae6e x7 : 0000000000000000 x6 : 000000000000003f x5 : 0000000000000040 x4 : ffffffffffffffe0 x3 : ffff800008f13c70 x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000 Call trace: submit_bh_wbc+0x3f4/0x468 fs/buffer.c:2666 submit_bh+0x2c/0x3c fs/buffer.c:2707 __ext4_read_bh fs/ext4/super.c:174 [inline] ext4_read_bh+0x160/0x268 fs/ext4/super.c:198 read_mmp_block+0x224/0x708 fs/ext4/mmp.c:97 ext4_multi_mount_protect+0x50c/0x8b0 fs/ext4/mmp.c:378 __ext4_fill_super fs/ext4/super.c:5278 [inline] ext4_fill_super+0x4e60/0x73a4 fs/ext4/super.c:5654 get_tree_bdev+0x360/0x54c fs/super.c:1366 ext4_get_tree+0x28/0x38 fs/ext4/super.c:5684 vfs_get_tree+0x90/0x274 fs/super.c:1573 do_new_mount+0x278/0x8fc fs/namespace.c:3056 path_mount+0x590/0xe5c fs/namespace.c:3386 do_mount fs/namespace.c:3399 [inline] __do_sys_mount fs/namespace.c:3607 [inline] __se_sys_mount fs/namespace.c:3584 [inline] __arm64_sys_mount+0x498/0x588 fs/namespace.c:3584 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2bc arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:140 do_el0_svc+0x58/0x13c arch/arm64/kernel/syscall.c:204 el0_svc+0x58/0x168 arch/arm64/kernel/entry-common.c:637 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655 el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:585 Code: 17ffffad 97e6ea14 d4210000 97e6ea12 (d4210000) ---[ end trace 0000000000000000 ]---