------------[ cut here ]------------ kernel BUG at fs/reiserfs/journal.c:3644! Internal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP Modules linked in: CPU: 1 PID: 4698 Comm: syz-executor.3 Not tainted 5.15.167-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : check_journal_end fs/reiserfs/journal.c:3644 [inline] pc : do_journal_end+0x3b04/0x3c50 fs/reiserfs/journal.c:4040 lr : check_journal_end fs/reiserfs/journal.c:3644 [inline] lr : do_journal_end+0x3b04/0x3c50 fs/reiserfs/journal.c:4040 sp : ffff800021d27520 x29: ffff800021d27680 x28: 0000000000000000 x27: 1ffff000043b0e0b x26: ffff0000d21be678 x25: 0000000000000000 x24: ffff800021d87058 x23: 1ffff000043b0e06 x22: ffff800021d87000 x21: ffff800021d87030 x20: ffff800021d87048 x19: dfff800000000000 x18: 1ffff000043b0e05 x17: 1fffe00036835d8e x16: ffff80000824ecc0 x15: ffff800014b5ef40 x14: 1ffff0000295806a x13: dfff800000000000 x12: 0000000000000001 x11: 0000000000000000 x10: 0000000000000000 x9 : ffff0000cc620000 x8 : ffff800008d00bc4 x7 : ffff800008d15de4 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000001 x3 : ffff800008cfd554 x2 : 0000000000000001 x1 : 0000000000000000 x0 : 0000000000000000 Call trace: check_journal_end fs/reiserfs/journal.c:3644 [inline] do_journal_end+0x3b04/0x3c50 fs/reiserfs/journal.c:4040 journal_end+0x1bc/0x260 fs/reiserfs/journal.c:3414 reiserfs_fill_super+0x1a80/0x1e8c fs/reiserfs/super.c:2170 mount_bdev+0x274/0x370 fs/super.c:1398 get_super_block+0x44/0x58 fs/reiserfs/super.c:2608 legacy_get_tree+0xd4/0x16c fs/fs_context.c:611 vfs_get_tree+0x90/0x274 fs/super.c:1528 do_new_mount+0x278/0x8fc fs/namespace.c:3005 path_mount+0x594/0x101c fs/namespace.c:3335 do_mount fs/namespace.c:3348 [inline] __do_sys_mount fs/namespace.c:3556 [inline] __se_sys_mount fs/namespace.c:3533 [inline] __arm64_sys_mount+0x510/0x5e0 fs/namespace.c:3533 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181 el0_svc+0x7c/0x1f0 arch/arm64/kernel/entry-common.c:608 el0t_64_sync_handler+0x84/0xe4 arch/arm64/kernel/entry-common.c:626 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 Code: d4210000 97df14c0 d4210000 97df14be (d4210000) ---[ end trace 73fe893ed2933b37 ]---