bcachefs (loop2): stripes_read... done bcachefs (loop2): snapshots_read... done ------------[ cut here ]------------ kernel BUG at fs/bcachefs/journal.c:370! Internal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP Modules linked in: CPU: 1 PID: 10603 Comm: syz-executor.2 Not tainted 6.9.0-rc7-syzkaller-g1c9135d29e9e #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : journal_entry_open fs/bcachefs/journal.c:370 [inline] pc : __journal_res_get+0x1d64/0x1f6c fs/bcachefs/journal.c:555 lr : journal_entry_open fs/bcachefs/journal.c:370 [inline] lr : __journal_res_get+0x1d64/0x1f6c fs/bcachefs/journal.c:555 sp : ffff80009b136980 x29: ffff80009b136be0 x28: ffff80009b136b20 x27: 00000000003ffffe x26: ffff0000fe1ca7c0 x25: ffff0000fe180870 x24: ffff0000fe1ca7b8 x23: dfff800000000000 x22: 1fffe0001fc394d5 x21: 0111110080100107 x20: 1fffe0001fc39430 x19: ffff0000fe1ca180 x18: ffff80009b136880 x17: 0000000000046f43 x16: ffff800080331e9c x15: 0000000000000001 x14: 1fffe0001fc394f7 x13: 0000000000000000 x12: 0000000000000000 x11: 0000000000040000 x10: 000000000003ffff x9 : ffff800099b29000 x8 : 0000000000040000 x7 : ffff8000828e150c x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000001 x3 : ffff8000828e163c x2 : 0000000000000000 x1 : 0000000000000002 x0 : 0000000000000000 Call trace: journal_entry_open fs/bcachefs/journal.c:370 [inline] __journal_res_get+0x1d64/0x1f6c fs/bcachefs/journal.c:555 bch2_journal_res_get_slowpath+0x9c/0x2a4 fs/bcachefs/journal.c:617 bch2_journal_res_get+0x124/0x1b4 fs/bcachefs/journal.h:382 bch2_journal_meta+0x9c/0x268 fs/bcachefs/journal.c:832 bch2_fs_recovery+0x2f4c/0x4854 fs/bcachefs/recovery.c:798 bch2_fs_start+0x30c/0x53c fs/bcachefs/super.c:1043 bch2_fs_open+0x8b4/0xb64 fs/bcachefs/super.c:2102 bch2_mount+0x558/0xe10 fs/bcachefs/fs.c:1903 legacy_get_tree+0xd4/0x16c fs/fs_context.c:662 vfs_get_tree+0x90/0x288 fs/super.c:1779 do_new_mount+0x278/0x900 fs/namespace.c:3352 path_mount+0x590/0xe04 fs/namespace.c:3679 do_mount fs/namespace.c:3692 [inline] __do_sys_mount fs/namespace.c:3898 [inline] __se_sys_mount fs/namespace.c:3875 [inline] __arm64_sys_mount+0x45c/0x594 fs/namespace.c:3875 __invoke_syscall arch/arm64/kernel/syscall.c:34 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:48 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:133 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:152 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 Code: 17ffff9c 9771bacd d4210000 9771bacb (d4210000) ---[ end trace 0000000000000000 ]---