======================================================= ocfs2: Slot 0 on device (7,0) was already allocated to this node! ocfs2: Mounting device (7,0) on (node local, slot 0) with ordered data mode. ------------[ cut here ]------------ kernel BUG at fs/ocfs2/suballoc.c:1441! Oops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN PTI CPU: 0 UID: 0 PID: 5826 Comm: syz-executor310 Not tainted 6.14.0-rc1-syzkaller-00187-g8f6629c004b1 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 RIP: 0010:ocfs2_find_victim_chain fs/ocfs2/suballoc.c:1441 [inline] RIP: 0010:ocfs2_claim_suballoc_bits+0x240c/0x2560 fs/ocfs2/suballoc.c:1982 Code: ba c9 03 fe 90 0f 0b e8 b2 c9 03 fe 90 0f 0b e8 aa c9 03 fe 90 0f 0b e8 a2 c9 03 fe 90 0f 0b e8 3a 74 32 08 e8 95 c9 03 fe 90 <0f> 0b e8 8d c9 03 fe 90 0f 0b f3 0f 1e fa 4d 89 f5 65 8b 1d c8 40 RSP: 0018:ffffc90003f3f220 EFLAGS: 00010293 RAX: ffffffff83bb942b RBX: 0000000000000000 RCX: ffff88807b2c8000 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: ffffc90003f3f4d0 R08: ffffffff83bb7f15 R09: 0000000000000000 R10: ffffc90003f3f560 R11: fffff520007e7eb1 R12: dffffc0000000000 R13: ffff888144332b08 R14: ffff888075d67400 R15: 0000000000000002 FS: 00005555807fa380(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000400000002040 CR3: 000000007d08a000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: ocfs2_claim_new_inode+0x338/0x870 fs/ocfs2/suballoc.c:2267 ocfs2_mknod_locked+0x17a/0x3b0 fs/ocfs2/namei.c:634 ocfs2_mknod+0x17d4/0x2b30 fs/ocfs2/namei.c:381 ocfs2_mkdir+0x1ab/0x470 fs/ocfs2/namei.c:656 vfs_mkdir+0x2f9/0x4f0 fs/namei.c:4313 do_mkdirat+0x264/0x3a0 fs/namei.c:4336 __do_sys_mkdirat fs/namei.c:4351 [inline] __se_sys_mkdirat fs/namei.c:4349 [inline] __x64_sys_mkdirat+0x87/0xa0 fs/namei.c:4349 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f7800093a99 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 17 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffc82fe5058 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 RAX: ffffffffffffffda RBX: 0030656c69662f2e RCX: 00007f7800093a99 RDX: 0000000000000000 RSI: 0000400000002040 RDI: 00000000ffffff9c RBP: 00007f780010b5f0 R08: 000000000000444d R09: 00005555807fb4c0 R10: 00007ffc82fe4f20 R11: 0000000000000246 R12: 00007ffc82fe5080 R13: 00007ffc82fe52a8 R14: 431bde82d7b634db R15: 00007f78000dc03b Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:ocfs2_find_victim_chain fs/ocfs2/suballoc.c:1441 [inline] RIP: 0010:ocfs2_claim_suballoc_bits+0x240c/0x2560 fs/ocfs2/suballoc.c:1982 Code: ba c9 03 fe 90 0f 0b e8 b2 c9 03 fe 90 0f 0b e8 aa c9 03 fe 90 0f 0b e8 a2 c9 03 fe 90 0f 0b e8 3a 74 32 08 e8 95 c9 03 fe 90 <0f> 0b e8 8d c9 03 fe 90 0f 0b f3 0f 1e fa 4d 89 f5 65 8b 1d c8 40 RSP: 0018:ffffc90003f3f220 EFLAGS: 00010293 RAX: ffffffff83bb942b RBX: 0000000000000000 RCX: ffff88807b2c8000 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: ffffc90003f3f4d0 R08: ffffffff83bb7f15 R09: 0000000000000000 R10: ffffc90003f3f560 R11: fffff520007e7eb1 R12: dffffc0000000000 R13: ffff888144332b08 R14: ffff888075d67400 R15: 0000000000000002 FS: 00005555807fa380(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000017134538 CR3: 000000007d08a000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400