------------[ cut here ]------------ kernel BUG at fs/ext4/ext4.h:3241! invalid opcode: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 5334 Comm: syz-executor.1 Not tainted 6.4.0-rc1-syzkaller-00012-g16a8829130ca #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023 RIP: 0010:ext4_get_group_info+0x399/0x3a0 fs/ext4/ext4.h:3241 Code: 4c ff 8b 74 24 04 48 c7 c7 40 34 0c 8d 4c 89 f2 e8 6c 0b 2e 02 43 80 3c 2c 00 0f 85 23 fd ff ff e9 26 fd ff ff e8 17 cb 4c ff <0f> 0b 0f 1f 44 00 00 55 41 57 41 56 41 54 53 48 89 fb 49 bf 00 00 RSP: 0018:ffffc900052076b8 EFLAGS: 00010293 RAX: ffffffff823e9c29 RBX: 00000000ffffebac RCX: ffff888076ed9dc0 RDX: 0000000000000000 RSI: 00000000ffffebac RDI: 0000000000000001 RBP: 0000000000000001 R08: ffffffff823e98f9 R09: fffffbfff1cab806 R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffff110033630cf R13: dffffc0000000000 R14: ffff888023240000 R15: ffff888019b18678 FS: 0000000000000000(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00005599d90d3560 CR3: 0000000045899000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: ext4_mb_load_buddy_gfp+0xc6/0x850 fs/ext4/mballoc.c:1446 ext4_discard_preallocations+0x744/0x1090 fs/ext4/mballoc.c:5226 ext4_release_file+0x16e/0x300 fs/ext4/file.c:166 __fput+0x3b7/0x890 fs/file_table.c:321 task_work_run+0x24a/0x300 kernel/task_work.c:179 exit_task_work include/linux/task_work.h:38 [inline] do_exit+0x68f/0x2290 kernel/exit.c:871 do_group_exit+0x206/0x2c0 kernel/exit.c:1021 get_signal+0x1701/0x17e0 kernel/signal.c:2874 arch_do_signal_or_restart+0x91/0x670 arch/x86/kernel/signal.c:306 exit_to_user_mode_loop+0x6a/0x100 kernel/entry/common.c:168 exit_to_user_mode_prepare+0xb1/0x140 kernel/entry/common.c:204 __syscall_exit_to_user_mode_work kernel/entry/common.c:286 [inline] syscall_exit_to_user_mode+0x64/0x280 kernel/entry/common.c:297 do_syscall_64+0x4d/0xc0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7f485168c169 Code: Unable to access opcode bytes at 0x7f485168c13f. RSP: 002b:00007f485241e218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: 0000000000000001 RBX: 00007f48517ac058 RCX: 00007f485168c169 RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f48517ac05c RBP: 00007f48517ac050 R08: 0000000000000010 R09: 0000000000000000 R10: ffffffffffffffff R11: 0000000000000246 R12: 00007f48517ac05c R13: 00007ffc1f7276cf R14: 00007f485241e300 R15: 0000000000022000 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:ext4_get_group_info+0x399/0x3a0 fs/ext4/ext4.h:3241 Code: 4c ff 8b 74 24 04 48 c7 c7 40 34 0c 8d 4c 89 f2 e8 6c 0b 2e 02 43 80 3c 2c 00 0f 85 23 fd ff ff e9 26 fd ff ff e8 17 cb 4c ff <0f> 0b 0f 1f 44 00 00 55 41 57 41 56 41 54 53 48 89 fb 49 bf 00 00 RSP: 0018:ffffc900052076b8 EFLAGS: 00010293 RAX: ffffffff823e9c29 RBX: 00000000ffffebac RCX: ffff888076ed9dc0 RDX: 0000000000000000 RSI: 00000000ffffebac RDI: 0000000000000001 RBP: 0000000000000001 R08: ffffffff823e98f9 R09: fffffbfff1cab806 R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffff110033630cf R13: dffffc0000000000 R14: ffff888023240000 R15: ffff888019b18678 FS: 0000000000000000(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ffcf766bf78 CR3: 0000000044a6c000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400