------------[ cut here ]------------ WARNING: CPU: 1 PID: 12115 at fs/ext4/ext4_jbd2.c:73 __ext4_journal_start_sb+0x434/0x92c fs/ext4/ext4_jbd2.c:105 Modules linked in: CPU: 1 UID: 0 PID: 12115 Comm: syz-executor.0 Not tainted 6.12.0-syzkaller-00237-g7b1d1d4cfac0 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : __ext4_journal_start_sb+0x434/0x92c fs/ext4/ext4_jbd2.c:105 lr : ext4_journal_check_start fs/ext4/ext4_jbd2.c:73 [inline] lr : __ext4_journal_start_sb+0x430/0x92c fs/ext4/ext4_jbd2.c:105 sp : ffff8000a13b7490 x29: ffff8000a13b74a0 x28: 1fffe00019e8e4c7 x27: dfff800000000000 x26: 0000000070818001 x25: ffff0000cf472638 x24: ffff0000cf472000 x23: 0000000000000001 x22: 0000000000000000 x21: 0000000000000000 x20: ffffffffffffffe2 x19: ffff0000d4005180 x18: 1fffe000366c8076 x17: ffff80008f8cd000 x16: ffff8000803541a4 x15: 0000000000000001 x14: 1fffe0001b6748c8 x13: 0000000000000000 x12: 0000000000000000 x11: ffff60001b6748c9 x10: 0000000000ff0100 x9 : 0000000000000000 x8 : ffff0000cee73c80 x7 : ffff800080cadf04 x6 : 0000000000000008 x5 : 0000000000000000 x4 : 0000000000000001 x3 : 0000000000000000 x2 : 0000000000000000 x1 : 0000000000000001 x0 : 0000000000000000 Call trace: __ext4_journal_start_sb+0x434/0x92c fs/ext4/ext4_jbd2.c:105 (P) ext4_journal_check_start fs/ext4/ext4_jbd2.c:73 [inline] (L) __ext4_journal_start_sb+0x430/0x92c fs/ext4/ext4_jbd2.c:105 (L) ext4_sample_last_mounted fs/ext4/file.c:837 [inline] ext4_file_open+0x3c8/0x5b8 fs/ext4/file.c:865 do_dentry_open+0x798/0x109c fs/open.c:958 vfs_open+0x48/0x2d4 fs/open.c:1088 do_open fs/namei.c:3774 [inline] path_openat+0x2300/0x2b14 fs/namei.c:3933 do_filp_open+0x1bc/0x3cc fs/namei.c:3960 do_sys_openat2+0x124/0x1b8 fs/open.c:1415 do_sys_open fs/open.c:1430 [inline] __do_sys_openat fs/open.c:1446 [inline] __se_sys_openat fs/open.c:1441 [inline] __arm64_sys_openat+0x1f0/0x240 fs/open.c:1441 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:744 el0t_64_sync_handler+0x84/0x108 arch/arm64/kernel/entry-common.c:762 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600 irq event stamp: 182 hardirqs last enabled at (181): [] seqcount_lockdep_reader_access+0x80/0x100 include/linux/seqlock.h:74 hardirqs last disabled at (182): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:488 softirqs last enabled at (8): [] local_bh_enable+0x10/0x34 include/linux/bottom_half.h:32 softirqs last disabled at (6): [] local_bh_disable+0x10/0x34 include/linux/bottom_half.h:19 ---[ end trace 0000000000000000 ]---