------------[ cut here ]------------ kernel BUG at fs/jbd2/transaction.c:1267! invalid opcode: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 379 Comm: syz-executor.0 Not tainted 5.10.149-syzkaller-01350-g0118fb827bc7 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 RIP: 0010:jbd2_journal_get_create_access+0x492/0x4a0 fs/jbd2/transaction.c:1264 Code: ff ff ff 48 89 df e8 2d d5 b7 ff e9 21 ff ff ff e8 23 b5 7d ff 0f 0b e8 1c b5 7d ff 0f 0b e8 15 b5 7d ff 0f 0b e8 0e b5 7d ff <0f> 0b 66 66 2e 0f 1f 84 00 00 00 00 00 90 55 48 89 e5 41 57 41 56 RSP: 0018:ffffc90000c87830 EFLAGS: 00010293 RAX: ffffffff81ef3572 RBX: 0000000000000003 RCX: ffff8881067e8000 RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000002 RBP: ffffc90000c87890 R08: ffffffff81ef3294 R09: 0000000000000003 R10: fffff52000190ef5 R11: 1ffff92000190ef4 R12: ffff888108fe9bb0 R13: ffff88811ae81268 R14: dffffc0000000000 R15: ffff88810ba1d500 FS: 000055555562a400(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000555555633728 CR3: 000000010618f000 CR4: 00000000003506a0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: __ext4_journal_get_create_access+0x9b/0x300 fs/ext4/ext4_jbd2.c:314 ext4_getblk+0x3b2/0x650 fs/ext4/inode.c:873 ext4_bread+0x2f/0x1b0 fs/ext4/inode.c:901 ext4_append+0x295/0x4d0 fs/ext4/namei.c:83 ext4_init_new_dir+0x337/0xa10 fs/ext4/namei.c:2912 ext4_mkdir+0x475/0xbb0 fs/ext4/namei.c:2957 vfs_mkdir+0x435/0x610 fs/namei.c:3729 do_mkdirat+0x1b6/0x2d0 fs/namei.c:3752 __do_sys_mkdirat fs/namei.c:3763 [inline] __se_sys_mkdirat fs/namei.c:3761 [inline] __x64_sys_mkdirat+0x7b/0x90 fs/namei.c:3761 do_syscall_64+0x34/0x70 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x61/0xc6 RIP: 0033:0x7fe9c0742627 Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffd6b7c5b18 EFLAGS: 00000206 ORIG_RAX: 0000000000000102 RAX: ffffffffffffffda RBX: 00007ffd6b7c5ba0 RCX: 00007fe9c0742627 RDX: 00000000000001ff RSI: 00007ffd6b7c5ba0 RDI: 00000000ffffff9c RBP: 00007ffd6b7c5b7c R08: 0000000000000000 R09: 0000000000000003 R10: 00007ffd6b7c58b7 R11: 0000000000000206 R12: 0000000000000032 R13: 000000000000f201 R14: 0000000000000011 R15: 00007ffd6b7c5be0 Modules linked in: ---[ end trace 43336138dedbccd7 ]--- RIP: 0010:jbd2_journal_get_create_access+0x492/0x4a0 fs/jbd2/transaction.c:1264 Code: ff ff ff 48 89 df e8 2d d5 b7 ff e9 21 ff ff ff e8 23 b5 7d ff 0f 0b e8 1c b5 7d ff 0f 0b e8 15 b5 7d ff 0f 0b e8 0e b5 7d ff <0f> 0b 66 66 2e 0f 1f 84 00 00 00 00 00 90 55 48 89 e5 41 57 41 56 RSP: 0018:ffffc90000c87830 EFLAGS: 00010293 RAX: ffffffff81ef3572 RBX: 0000000000000003 RCX: ffff8881067e8000 RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000002 RBP: ffffc90000c87890 R08: ffffffff81ef3294 R09: 0000000000000003 R10: fffff52000190ef5 R11: 1ffff92000190ef4 R12: ffff888108fe9bb0 R13: ffff88811ae81268 R14: dffffc0000000000 R15: ffff88810ba1d500 FS: 000055555562a400(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000555555633728 CR3: 000000010618f000 CR4: 00000000003506a0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400