------------[ cut here ]------------ kernel BUG at fs/ext4/ext4.h:3247! invalid opcode: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 8061 Comm: syz-executor.4 Not tainted 5.10.178-syzkaller-00238-g8a30c9beebe8 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 RIP: 0010:ext4_get_group_info fs/ext4/ext4.h:3247 [inline] RIP: 0010:ext4_mb_load_buddy_gfp+0xf5d/0x1020 fs/ext4/mballoc.c:1174 Code: ff e8 47 3b c8 ff e9 f0 f2 ff ff 89 f9 80 e1 07 80 c1 03 38 c1 0f 8c 52 f3 ff ff e8 4d 3b c8 ff e9 48 f3 ff ff e8 e3 2a 8b ff <0f> 0b e9 62 00 00 00 e8 d7 2a 8b ff e9 ef fb ff ff e9 65 00 00 00 RSP: 0018:ffffc900054af710 EFLAGS: 00010293 RAX: ffffffff81df4ecd RBX: 00000000fffdfd72 RCX: ffff88810de593c0 RDX: 0000000000000000 RSI: 00000000fffdfd72 RDI: 0000000000000001 RBP: ffffc900054af790 R08: ffffffff81df405c R09: ffffed10238e8c60 R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000001 R13: ffff88811e92a000 R14: 1ffff1102c6fa279 R15: ffff8881637d13c8 FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000555557105728 CR3: 0000000110b73000 CR4: 00000000003526b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: ext4_discard_preallocations+0x79c/0xef0 fs/ext4/mballoc.c:4451 ext4_release_file+0x16e/0x310 fs/ext4/file.c:152 __fput+0x309/0x760 fs/file_table.c:281 ____fput+0x15/0x20 fs/file_table.c:314 task_work_run+0x129/0x190 kernel/task_work.c:164 exit_task_work include/linux/task_work.h:32 [inline] do_exit+0xc83/0x2a50 kernel/exit.c:861 do_group_exit+0x141/0x310 kernel/exit.c:983 get_signal+0x10a0/0x1410 kernel/signal.c:2782 arch_do_signal_or_restart+0xbd/0x17c0 arch/x86/kernel/signal.c:805 handle_signal_work kernel/entry/common.c:145 [inline] exit_to_user_mode_loop+0x9b/0xd0 kernel/entry/common.c:169 exit_to_user_mode_prepare kernel/entry/common.c:199 [inline] syscall_exit_to_user_mode+0xbc/0x1d0 kernel/entry/common.c:274 do_syscall_64+0x40/0x70 arch/x86/entry/common.c:56 entry_SYSCALL_64_after_hwframe+0x61/0xc6 RIP: 0033:0x7fe0b582f0b1 Code: Unable to access opcode bytes at RIP 0x7fe0b582f087. RSP: 002b:00007fe0ac17b0b0 EFLAGS: 00000293 ORIG_RAX: 00000000000000e6 RAX: fffffffffffffdfc RBX: 00007fe0b592a120 RCX: 00007fe0b582f0b1 RDX: 00007fe0ac17b0f0 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 00007fe0b5855493 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 R13: 00007ffc4173c4cf R14: 00007fe0ac17b300 R15: 0000000000022000 Modules linked in: ---[ end trace d1e5eba60cc87687 ]--- RIP: 0010:ext4_get_group_info fs/ext4/ext4.h:3247 [inline] RIP: 0010:ext4_mb_load_buddy_gfp+0xf5d/0x1020 fs/ext4/mballoc.c:1174 Code: ff e8 47 3b c8 ff e9 f0 f2 ff ff 89 f9 80 e1 07 80 c1 03 38 c1 0f 8c 52 f3 ff ff e8 4d 3b c8 ff e9 48 f3 ff ff e8 e3 2a 8b ff <0f> 0b e9 62 00 00 00 e8 d7 2a 8b ff e9 ef fb ff ff e9 65 00 00 00 RSP: 0018:ffffc900054af710 EFLAGS: 00010293 RAX: ffffffff81df4ecd RBX: 00000000fffdfd72 RCX: ffff88810de593c0 RDX: 0000000000000000 RSI: 00000000fffdfd72 RDI: 0000000000000001 RBP: ffffc900054af790 R08: ffffffff81df405c R09: ffffed10238e8c60 R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000001 R13: ffff88811e92a000 R14: 1ffff1102c6fa279 R15: ffff8881637d13c8 FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000555557105728 CR3: 000000010ba08000 CR4: 00000000003526b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400