------------[ cut here ]------------ kernel BUG at fs/ext4/ext4.h:3331! invalid opcode: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 19321 Comm: syz-executor.5 Not tainted 6.1.29-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/28/2023 RIP: 0010:ext4_get_group_info+0x399/0x3a0 fs/ext4/ext4.h:3331 Code: 4f ff 8b 74 24 04 48 c7 c7 80 d9 0b 8d 4c 89 f2 e8 bc fe 24 02 43 80 3c 2c 00 0f 85 23 fd ff ff e9 26 fd ff ff e8 67 8c 4f ff <0f> 0b 0f 1f 44 00 00 55 41 57 41 56 41 54 53 48 89 fb 49 bf 00 00 RSP: 0018:ffffc90003aefad0 EFLAGS: 00010293 RAX: ffffffff823a3869 RBX: 00000000ffffffff RCX: ffff888028ecd940 RDX: 0000000000000000 RSI: 00000000ffffffff RDI: 0000000000000001 RBP: 0000000000000001 R08: ffffffff823a3539 R09: ffffed10112015fb R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffff11010dd64cf R13: dffffc0000000000 R14: ffff888086eb4000 R15: ffff888086eb2678 FS: 0000555557327400(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b33528000 CR3: 000000007ec98000 CR4: 00000000003506f0 DR0: 00000000ffff070c DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 Call Trace: ext4_mb_load_buddy_gfp+0xc3/0x820 fs/ext4/mballoc.c:1448 ext4_discard_preallocations+0x851/0x1150 fs/ext4/mballoc.c:5025 ext4_release_file+0x16a/0x300 fs/ext4/file.c:166 __fput+0x3b7/0x890 fs/file_table.c:320 task_work_run+0x246/0x300 kernel/task_work.c:179 resume_user_mode_work include/linux/resume_user_mode.h:49 [inline] exit_to_user_mode_loop+0xd9/0x100 kernel/entry/common.c:171 exit_to_user_mode_prepare+0xb1/0x140 kernel/entry/common.c:204 __syscall_exit_to_user_mode_work kernel/entry/common.c:286 [inline] syscall_exit_to_user_mode+0x60/0x270 kernel/entry/common.c:297 do_syscall_64+0x49/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7f019703e01b Code: 0f 05 48 3d 00 f0 ff ff 77 45 c3 0f 1f 40 00 48 83 ec 18 89 7c 24 0c e8 63 fc ff ff 8b 7c 24 0c 41 89 c0 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 35 44 89 c7 89 44 24 0c e8 a1 fc ff ff 8b 44 RSP: 002b:00007ffcce0794c0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 RAX: 0000000000000000 RBX: 0000000000000006 RCX: 00007f019703e01b RDX: 0000000000000000 RSI: 0000001b335265a4 RDI: 0000000000000005 RBP: 00007f01971ad980 R08: 0000000000000000 R09: 0000000032d6035a R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000118d8b R13: 00007ffcce0795c0 R14: 00007f01971ac050 R15: 0000000000000032 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:ext4_get_group_info+0x399/0x3a0 fs/ext4/ext4.h:3331 Code: 4f ff 8b 74 24 04 48 c7 c7 80 d9 0b 8d 4c 89 f2 e8 bc fe 24 02 43 80 3c 2c 00 0f 85 23 fd ff ff e9 26 fd ff ff e8 67 8c 4f ff <0f> 0b 0f 1f 44 00 00 55 41 57 41 56 41 54 53 48 89 fb 49 bf 00 00 RSP: 0018:ffffc90003aefad0 EFLAGS: 00010293 RAX: ffffffff823a3869 RBX: 00000000ffffffff RCX: ffff888028ecd940 RDX: 0000000000000000 RSI: 00000000ffffffff RDI: 0000000000000001 RBP: 0000000000000001 R08: ffffffff823a3539 R09: ffffed10112015fb R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffff11010dd64cf R13: dffffc0000000000 R14: ffff888086eb4000 R15: ffff888086eb2678 FS: 0000555557327400(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b33827000 CR3: 000000007ec98000 CR4: 00000000003506f0 DR0: 00000000ffff070c DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400