EXT4-fs (loop0): mounted filesystem without journal. Quota mode: none. EXT4-fs warning (device loop0): ext4_update_dynamic_rev:1089: updating to rev 1 because of new feature flag, running e2fsck is recommended ------------[ cut here ]------------ kernel BUG at fs/ext4/ext4.h:3328! Internal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP Modules linked in: CPU: 0 PID: 3029 Comm: syz-executor249 Not tainted 6.0.0-rc7-syzkaller-18095-gbbed346d5a96 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/26/2022 pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : ext4_get_group_info+0x1f8/0x1fc fs/ext4/ext4.h:3328 lr : ext4_get_group_info+0x1f8/0x1fc fs/ext4/ext4.h:3328 sp : ffff800012993800 x29: ffff800012993800 x28: dead000000000100 x27: ffff0000ca81b000 x26: ffff800012993b68 x25: 0000000000000c40 x24: 0000000000000400 x23: 00000000ffffffff x22: ffff0000ca81b000 x21: 0000000000000001 x20: ffff0000ca81e000 x19: 0000000000000001 x18: 0000000000000000 x17: 00000000c0c0583b x16: ffff80000db49158 x15: ffff0000c3cd9a80 x14: 0000000000000090 x13: 0000000000000000 x12: ffff0000c3cd9a80 x11: ff808000087e3f70 x10: 0000000000000000 x9 : ffff8000087e3f70 x8 : ffff0000c3cd9a80 x7 : ffff8000087f1dec x6 : 0000000000000000 x5 : ffff800012993a48 x4 : ffff8000087b0b60 x3 : 0000000000000c40 x2 : 0000000000000000 x1 : 0000000000000001 x0 : 0000000000000001 Call trace: ext4_get_group_info+0x1f8/0x1fc fs/ext4/ext4.h:3328 ext4_mb_load_buddy_gfp+0x60/0x133c fs/ext4/mballoc.c:1449 ext4_mb_load_buddy fs/ext4/mballoc.c:1571 [inline] ext4_mballoc_query_range+0x70/0x524 fs/ext4/mballoc.c:6580 ext4_getfsmap_datadev+0x718/0x95c fs/ext4/fsmap.c:537 ext4_getfsmap+0x590/0x59c fs/ext4/fsmap.c:708 ext4_ioc_getfsmap fs/ext4/ioctl.c:899 [inline] __ext4_ioctl fs/ext4/ioctl.c:1223 [inline] ext4_ioctl+0x1f2c/0x236c fs/ext4/ioctl.c:1606 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:870 [inline] __se_sys_ioctl fs/ioctl.c:856 [inline] __arm64_sys_ioctl+0xd0/0x140 fs/ioctl.c:856 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall arch/arm64/kernel/syscall.c:52 [inline] el0_svc_common+0x138/0x220 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x48/0x164 arch/arm64/kernel/syscall.c:206 el0_svc+0x58/0x150 arch/arm64/kernel/entry-common.c:636 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:654 el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:581 Code: 39364a88 97e6ecbc 17ffffbe 97eaef2a (d4210000) ---[ end trace 0000000000000000 ]---