------------[ cut here ]------------ kernel BUG at fs/ocfs2/suballoc.c:1387! Internal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP Modules linked in: CPU: 1 PID: 6650 Comm: syz.0.497 Not tainted syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 pstate: 82400005 (Nzcv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) pc : ocfs2_find_victim_chain fs/ocfs2/suballoc.c:1387 [inline] pc : ocfs2_claim_suballoc_bits+0x1a34/0x1bfc fs/ocfs2/suballoc.c:1927 lr : ocfs2_find_victim_chain fs/ocfs2/suballoc.c:1387 [inline] lr : ocfs2_claim_suballoc_bits+0x1a34/0x1bfc fs/ocfs2/suballoc.c:1927 sp : ffff800022296d00 x29: ffff800022296f40 x28: 1fffe000205ccfa1 x27: 1fffe000205ccfa6 x26: ffff800022296dc0 x25: 0000000000000000 x24: dfff800000000000 x23: ffff700004452db8 x22: 0000000000000001 x21: ffff000102e67d30 x20: ffff0000ff907400 x19: ffff0000ff9074c6 x18: 0000000000000000 x17: 0000000000000000 x16: ffff8000082d25b8 x15: 0000000000000002 x14: 0000000000000002 x13: 1ffff00002a180b1 x12: 0000000000080000 x11: 0000000000006eb3 x10: ffff80002276a000 x9 : ffff800009db982c x8 : 0000000000006eb4 x7 : 0000000000000000 x6 : ffff800022297160 x5 : ffff800022297180 x4 : ffff800022297000 x3 : 0000000000000001 x2 : 0000000000000001 x1 : 0000000000000000 x0 : 0000000000000000 Call trace: ocfs2_find_victim_chain fs/ocfs2/suballoc.c:1387 [inline] ocfs2_claim_suballoc_bits+0x1a34/0x1bfc fs/ocfs2/suballoc.c:1927 ocfs2_claim_new_inode+0x2e8/0x700 fs/ocfs2/suballoc.c:2210 ocfs2_mknod_locked+0xfc/0x228 fs/ocfs2/namei.c:635 ocfs2_mknod+0xe64/0x1f18 fs/ocfs2/namei.c:381 ocfs2_create+0x19c/0x4f0 fs/ocfs2/namei.c:674 lookup_open fs/namei.c:3490 [inline] open_last_lookups fs/namei.c:3558 [inline] path_openat+0x112c/0x2680 fs/namei.c:3788 do_filp_open+0x174/0x344 fs/namei.c:3818 do_sys_openat2+0x128/0x3d8 fs/open.c:1318 do_sys_open fs/open.c:1334 [inline] __do_sys_openat fs/open.c:1350 [inline] __se_sys_openat fs/open.c:1345 [inline] __arm64_sys_openat+0x120/0x154 fs/open.c:1345 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2bc arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:140 do_el0_svc+0x58/0x13c arch/arm64/kernel/syscall.c:204 el0_svc+0x58/0x138 arch/arm64/kernel/entry-common.c:637 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655 el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:585 Code: d4210000 979ba0d4 d4210000 979ba0d2 (d4210000) ---[ end trace 0000000000000000 ]---