------------[ cut here ]------------ kernel BUG at fs/ext4/ext4.h:2984! invalid opcode: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 884 Comm: syz.0.132 Not tainted 5.4.274-syzkaller-00002-g6f97bd951d82 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 RIP: 0010:ext4_get_group_info fs/ext4/ext4.h:2984 [inline] RIP: 0010:ext4_mb_find_by_goal+0xba1/0xbe0 fs/ext4/mballoc.c:1830 Code: fc ff ff 48 8b 4c 24 28 80 e1 07 80 c1 03 38 c1 0f 8c 22 fc ff ff 48 8b 7c 24 28 e8 99 74 c8 ff e9 13 fc ff ff e8 8f 8f 98 ff <0f> 0b e8 d8 44 6f ff e8 83 8f 98 ff 0f 0b e8 7c 8f 98 ff 0f 0b e8 RSP: 0000:ffff8881d2cb6fc0 EFLAGS: 00010293 RAX: ffffffff81cbac91 RBX: 0000000000000001 RCX: ffff8881ed808000 RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000001 RBP: ffff8881d2cb70d0 R08: ffffffff81cba211 R09: ffffed103d359f22 R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 R13: ffff8881dd77d3f0 R14: 0000000000000001 R15: 1ffff1103baefa7e FS: 00005555559a2500(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00000000200000c1 CR3: 00000001d9c8b000 CR4: 00000000003406a0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: ext4_mb_regular_allocator+0x229/0x10d0 fs/ext4/mballoc.c:2132 ext4_mb_new_blocks+0x59a/0x2d10 fs/ext4/mballoc.c:4604 ext4_alloc_branch fs/ext4/indirect.c:340 [inline] ext4_ind_map_blocks+0x124d/0x2e90 fs/ext4/indirect.c:620 ext4_map_blocks+0x9d6/0x1ba0 fs/ext4/inode.c:663 _ext4_get_block+0x21b/0x610 fs/ext4/inode.c:802 __block_write_begin_int+0x5bc/0x1630 fs/buffer.c:1980 __block_write_begin fs/buffer.c:2030 [inline] block_page_mkwrite+0x1f2/0x260 fs/buffer.c:2492 ext4_page_mkwrite+0xbda/0x1350 fs/ext4/inode.c:6482 do_page_mkwrite mm/memory.c:2333 [inline] do_shared_fault mm/memory.c:3733 [inline] do_fault mm/memory.c:3801 [inline] handle_pte_fault mm/memory.c:4028 [inline] __handle_mm_fault mm/memory.c:4152 [inline] handle_mm_fault+0x2cc3/0x4990 mm/memory.c:4189 do_user_addr_fault arch/x86/mm/fault.c:1469 [inline] __do_page_fault+0x509/0xbb0 arch/x86/mm/fault.c:1530 page_fault+0x2f/0x40 arch/x86/entry/entry_64.S:1206 RIP: 0033:0x7fc943dae66b Code: fa 10 73 2d 83 fa 08 73 46 83 fa 04 73 16 83 fa 01 7c 10 8a 0e 74 0a 0f b7 74 16 fe 66 89 74 17 fe 88 0f c3 8b 4c 16 fc 8b 36 <89> 4c 17 fc 89 37 c3 c5 fa 6f 06 c5 fa 6f 4c 16 f0 c5 fa 7f 07 c5 RSP: 002b:00007fffe3c6b4d8 EFLAGS: 00010202 RAX: 00000000200000c0 RBX: 0000000000000004 RCX: 0000000000746166 RDX: 0000000000000005 RSI: 0000000074616676 RDI: 00000000200000c0 RBP: fffffffffffffffe R08: 00007fc943c71000 R09: 0000000000000001 R10: 0000000000000001 R11: 0000000000000009 R12: 00007fc943f74fac R13: 0000000000000032 R14: 00007fc943f769a0 R15: 00007fc943f74fa0 Modules linked in: ---[ end trace da959930b539e192 ]--- RIP: 0010:ext4_get_group_info fs/ext4/ext4.h:2984 [inline] RIP: 0010:ext4_mb_find_by_goal+0xba1/0xbe0 fs/ext4/mballoc.c:1830 Code: fc ff ff 48 8b 4c 24 28 80 e1 07 80 c1 03 38 c1 0f 8c 22 fc ff ff 48 8b 7c 24 28 e8 99 74 c8 ff e9 13 fc ff ff e8 8f 8f 98 ff <0f> 0b e8 d8 44 6f ff e8 83 8f 98 ff 0f 0b e8 7c 8f 98 ff 0f 0b e8 RSP: 0000:ffff8881d2cb6fc0 EFLAGS: 00010293 RAX: ffffffff81cbac91 RBX: 0000000000000001 RCX: ffff8881ed808000 RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000001 RBP: ffff8881d2cb70d0 R08: ffffffff81cba211 R09: ffffed103d359f22 R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 R13: ffff8881dd77d3f0 R14: 0000000000000001 R15: 1ffff1103baefa7e FS: 00005555559a2500(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b31a10ff8 CR3: 00000001d9c8b000 CR4: 00000000003406b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400