------------[ cut here ]------------
kernel BUG at fs/jbd2/transaction.c:1267!
invalid opcode: 0000 [#1] PREEMPT SMP KASAN
CPU: 1 PID: 379 Comm: syz-executor.0 Not tainted 5.10.149-syzkaller-01350-g0118fb827bc7 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
RIP: 0010:jbd2_journal_get_create_access+0x492/0x4a0 fs/jbd2/transaction.c:1264
Code: ff ff ff 48 89 df e8 2d d5 b7 ff e9 21 ff ff ff e8 23 b5 7d ff 0f 0b e8 1c b5 7d ff 0f 0b e8 15 b5 7d ff 0f 0b e8 0e b5 7d ff <0f> 0b 66 66 2e 0f 1f 84 00 00 00 00 00 90 55 48 89 e5 41 57 41 56
RSP: 0018:ffffc90000c87830 EFLAGS: 00010293
RAX: ffffffff81ef3572 RBX: 0000000000000003 RCX: ffff8881067e8000
RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000002
RBP: ffffc90000c87890 R08: ffffffff81ef3294 R09: 0000000000000003
R10: fffff52000190ef5 R11: 1ffff92000190ef4 R12: ffff888108fe9bb0
R13: ffff88811ae81268 R14: dffffc0000000000 R15: ffff88810ba1d500
FS: 000055555562a400(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000555555633728 CR3: 000000010618f000 CR4: 00000000003506a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
__ext4_journal_get_create_access+0x9b/0x300 fs/ext4/ext4_jbd2.c:314
ext4_getblk+0x3b2/0x650 fs/ext4/inode.c:873
ext4_bread+0x2f/0x1b0 fs/ext4/inode.c:901
ext4_append+0x295/0x4d0 fs/ext4/namei.c:83
ext4_init_new_dir+0x337/0xa10 fs/ext4/namei.c:2912
ext4_mkdir+0x475/0xbb0 fs/ext4/namei.c:2957
vfs_mkdir+0x435/0x610 fs/namei.c:3729
do_mkdirat+0x1b6/0x2d0 fs/namei.c:3752
__do_sys_mkdirat fs/namei.c:3763 [inline]
__se_sys_mkdirat fs/namei.c:3761 [inline]
__x64_sys_mkdirat+0x7b/0x90 fs/namei.c:3761
do_syscall_64+0x34/0x70 arch/x86/entry/common.c:46
entry_SYSCALL_64_after_hwframe+0x61/0xc6
RIP: 0033:0x7fe9c0742627
Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffd6b7c5b18 EFLAGS: 00000206 ORIG_RAX: 0000000000000102
RAX: ffffffffffffffda RBX: 00007ffd6b7c5ba0 RCX: 00007fe9c0742627
RDX: 00000000000001ff RSI: 00007ffd6b7c5ba0 RDI: 00000000ffffff9c
RBP: 00007ffd6b7c5b7c R08: 0000000000000000 R09: 0000000000000003
R10: 00007ffd6b7c58b7 R11: 0000000000000206 R12: 0000000000000032
R13: 000000000000f201 R14: 0000000000000011 R15: 00007ffd6b7c5be0
Modules linked in:
---[ end trace 43336138dedbccd7 ]---
RIP: 0010:jbd2_journal_get_create_access+0x492/0x4a0 fs/jbd2/transaction.c:1264
Code: ff ff ff 48 89 df e8 2d d5 b7 ff e9 21 ff ff ff e8 23 b5 7d ff 0f 0b e8 1c b5 7d ff 0f 0b e8 15 b5 7d ff 0f 0b e8 0e b5 7d ff <0f> 0b 66 66 2e 0f 1f 84 00 00 00 00 00 90 55 48 89 e5 41 57 41 56
RSP: 0018:ffffc90000c87830 EFLAGS: 00010293
RAX: ffffffff81ef3572 RBX: 0000000000000003 RCX: ffff8881067e8000
RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000002
RBP: ffffc90000c87890 R08: ffffffff81ef3294 R09: 0000000000000003
R10: fffff52000190ef5 R11: 1ffff92000190ef4 R12: ffff888108fe9bb0
R13: ffff88811ae81268 R14: dffffc0000000000 R15: ffff88810ba1d500
FS: 000055555562a400(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000555555633728 CR3: 000000010618f000 CR4: 00000000003506a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400