loop3: rw=0, sector=32768, nr_sectors = 8 limit=32768 gfs2: fsid=syz:syz.s: Error parsing journal for spectator mount. gfs2: fsid=syz:syz.s: G: s:UN n:2/13 f:n t:UN d:EX/0 a:0 v:0 r:-128 m:20 p:1 ------------[ cut here ]------------ kernel BUG at fs/gfs2/glock.c:289! Internal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP Modules linked in: CPU: 1 PID: 12108 Comm: syz.3.3540 Not tainted syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/03/2025 pstate: 62400005 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) pc : __gfs2_glock_put+0x498/0x51c fs/gfs2/glock.c:289 lr : __gfs2_glock_put+0x498/0x51c fs/gfs2/glock.c:289 sp : ffff8000211d71f0 x29: ffff8000211d71f0 x28: ffff70000423ae54 x27: dfff800000000000 x26: 0000000000000001 x25: 00000000000000c0 x24: 1fffe0001b7b6815 x23: ffff0000dbdb4000 x22: dfff800000000000 x21: ffff0000f56c82a0 x20: ffff0000f56c82f0 x19: ffff0000f56c8000 x18: ffff800011b7bf60 x17: 3a7220303a762030 x16: ffff8000082d9364 x15: 0000000000000002 x14: 0000000000000001 x13: 1fffe00033eaeda3 x12: 0000000000080000 x11: 000000000007ffff x10: ffff80002aff2000 x9 : 89a453599002d600 x8 : 89a453599002d600 x7 : 0000000000000000 x6 : 0000000000000001 x5 : ffff8000211d67f8 x4 : 0000000000000004 x3 : 0000000000000030 x2 : 000000000000000c x1 : 0000000000000000 x0 : ffff70000423adec Call trace: __gfs2_glock_put+0x498/0x51c fs/gfs2/glock.c:289 gfs2_glock_put+0x48/0x58 fs/gfs2/glock.c:314 gfs2_glock_put_eventually fs/gfs2/super.c:1255 [inline] gfs2_evict_inode+0xb84/0xe44 fs/gfs2/super.c:1532 evict+0x3e0/0x828 fs/inode.c:705 iput_final fs/inode.c:1834 [inline] iput+0x754/0x7e4 fs/inode.c:1860 gfs2_jindex_free+0x2d4/0x38c fs/gfs2/super.c:75 init_journal+0x7c4/0x1e94 fs/gfs2/ops_fstype.c:871 init_inodes+0xe0/0x2d4 fs/gfs2/ops_fstype.c:889 gfs2_fill_super+0x11c0/0x194c fs/gfs2/ops_fstype.c:1246 get_tree_bdev+0x358/0x544 fs/super.c:1366 gfs2_get_tree+0x54/0x1b4 fs/gfs2/ops_fstype.c:1327 vfs_get_tree+0x90/0x274 fs/super.c:1573 do_new_mount+0x228/0x810 fs/namespace.c:3078 path_mount+0x5bc/0xe80 fs/namespace.c:3408 do_mount fs/namespace.c:3421 [inline] __do_sys_mount fs/namespace.c:3629 [inline] __se_sys_mount fs/namespace.c:3606 [inline] __arm64_sys_mount+0x49c/0x59c fs/namespace.c:3606 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2b4 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:140 do_el0_svc+0x58/0x130 arch/arm64/kernel/syscall.c:204 el0_svc+0x58/0x128 arch/arm64/kernel/entry-common.c:637 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655 el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:585 Code: aa1f03e0 aa1303e1 52800022 97fff7f8 (d4210000) ---[ end trace 0000000000000000 ]---