------------[ cut here ]------------ kernel BUG at fs/ocfs2/journal.c:1027! Internal error: Oops - BUG: 00000000f2000800 [#1] SMP Modules linked in: CPU: 1 UID: 0 PID: 8587 Comm: syz.3.401 Tainted: G L syzkaller #0 PREEMPT Tainted: [L]=SOFTLOCKUP Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/03/2025 pstate: 63400005 (nZCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--) pc : ocfs2_journal_toggle_dirty+0x2fc/0x300 fs/ocfs2/journal.c:1027 lr : ocfs2_journal_toggle_dirty+0x2fc/0x300 fs/ocfs2/journal.c:1027 sp : ffff80009eff6d20 x29: ffff80009eff6da0 x28: ffff0000f8b79800 x27: 1fffe0001efe0822 x26: dfff800000000000 x25: 00000000ffffffff x24: 0000000000000000 x23: ffff0000e5a9ba00 x22: 0000000000000000 x21: ffff0000f7f04110 x20: ffff0000f7f040e8 x19: ffff0000cfc34000 x18: 1fffe00033781890 x17: ffff80008f86e000 x16: ffff80008af6aedc x15: 0000000000000001 x14: 00000000ffff8000 x13: 00000000cbc48415 x12: 0000000000000049 x11: 0000000000080000 x10: 000000000007ffff x9 : ffff8000a573d000 x8 : 0000000000080000 x7 : 0000000000000000 x6 : 000000000000003f x5 : 0000000000000040 x4 : 0000000000000001 x3 : 0000000000000010 x2 : 0000000000000000 x1 : 00000000ffffffff x0 : 0000000000000000 Call trace: ocfs2_journal_toggle_dirty+0x2fc/0x300 fs/ocfs2/journal.c:1027 (P) ocfs2_journal_shutdown+0x4b0/0xae0 fs/ocfs2/journal.c:1109 ocfs2_mount_volume fs/ocfs2/super.c:1785 [inline] ocfs2_fill_super+0x4598/0x532c fs/ocfs2/super.c:1083 get_tree_bdev_flags+0x360/0x414 fs/super.c:1691 get_tree_bdev+0x2c/0x3c fs/super.c:1714 ocfs2_get_tree+0x28/0x38 fs/ocfs2/super.c:1184 vfs_get_tree+0x90/0x28c fs/super.c:1751 fc_mount fs/namespace.c:1199 [inline] do_new_mount_fc fs/namespace.c:3636 [inline] do_new_mount+0x284/0x944 fs/namespace.c:3712 path_mount+0x5b4/0xdfc fs/namespace.c:4022 do_mount fs/namespace.c:4035 [inline] __do_sys_mount fs/namespace.c:4224 [inline] __se_sys_mount fs/namespace.c:4201 [inline] __arm64_sys_mount+0x3e8/0x468 fs/namespace.c:4201 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x254 arch/arm64/kernel/syscall.c:49 el0_svc_common+0xe8/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x5c/0x26c arch/arm64/kernel/entry-common.c:724 el0t_64_sync_handler+0x84/0x12c arch/arm64/kernel/entry-common.c:743 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:596 Code: aa1603e0 97ab2d25 17ffff94 9795c53c (d4210000) ---[ end trace 0000000000000000 ]---