------------[ cut here ]------------ kernel BUG at fs/ext4/ext4.h:3248! invalid opcode: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 418 Comm: syz-executor111 Not tainted 5.10.161-syzkaller-00019-g416c4356f372 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 RIP: 0010:ext4_get_group_info fs/ext4/ext4.h:3248 [inline] RIP: 0010:ext4_mb_load_buddy_gfp+0xe54/0xec0 fs/ext4/mballoc.c:1174 Code: ff e8 40 13 c8 ff e9 c8 f3 ff ff 89 f9 80 e1 07 80 c1 03 38 c1 0f 8c 14 f4 ff ff e8 46 13 c8 ff e9 0a f4 ff ff e8 ec 10 8e ff <0f> 0b e8 e5 10 8e ff 4c 89 ef e8 5d 64 cd ff e9 34 fc ff ff e8 d3 RSP: 0018:ffffc90000e377d8 EFLAGS: 00010293 RAX: ffffffff81df10c4 RBX: 0000000000000001 RCX: ffff888103f8a780 RDX: 0000000000000000 RSI: 00000000ffffd331 RDI: 0000000000000001 RBP: ffffc90000e37870 R08: ffffffff81df034c R09: ffffed10235e1a29 R10: ffffed10235e1a29 R11: 1ffff110235e1a28 R12: 1ffff11021497679 R13: ffff88810a4bd000 R14: 00000000ffffd331 R15: dffffc0000000000 FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000001ffffc40 CR3: 000000010b797000 CR4: 00000000003506a0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: ext4_discard_preallocations+0x803/0xf10 fs/ext4/mballoc.c:4451 ext4_release_file+0x17a/0x320 fs/ext4/file.c:152 __fput+0x348/0x7c0 fs/file_table.c:281 ____fput+0x15/0x20 fs/file_table.c:314 task_work_run+0x147/0x1b0 kernel/task_work.c:154 exit_task_work include/linux/task_work.h:30 [inline] do_exit+0x63c/0x2340 kernel/exit.c:813 do_group_exit+0x13a/0x300 kernel/exit.c:910 get_signal+0xe17/0x1440 kernel/signal.c:2780 arch_do_signal+0x8e/0x650 arch/x86/kernel/signal.c:805 exit_to_user_mode_loop+0xa3/0xe0 kernel/entry/common.c:161 exit_to_user_mode_prepare kernel/entry/common.c:191 [inline] irqentry_exit_to_user_mode+0x56/0x80 kernel/entry/common.c:279 irqentry_exit+0x12/0x60 kernel/entry/common.c:367 exc_page_fault+0x7e/0x1b0 arch/x86/mm/fault.c:1521 asm_exc_page_fault+0x1e/0x30 arch/x86/include/asm/idtentry.h:571 RIP: 0033:0x0 Code: Unable to access opcode bytes at RIP 0xffffffffffffffd6. RSP: 002b:0000000020000008 EFLAGS: 00010217 RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f5ed4b22b79 RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000041808000 RBP: 00007f5ed4ba1780 R08: 0000000000000000 R09: 00007f5ed4ba1788 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5ed4ba178c R13: 00007ffc82e5fccf R14: 00007f5ed4ac5300 R15: 0000000000022000 Modules linked in: ---[ end trace 763050db398b4684 ]--- RIP: 0010:ext4_get_group_info fs/ext4/ext4.h:3248 [inline] RIP: 0010:ext4_mb_load_buddy_gfp+0xe54/0xec0 fs/ext4/mballoc.c:1174 Code: ff e8 40 13 c8 ff e9 c8 f3 ff ff 89 f9 80 e1 07 80 c1 03 38 c1 0f 8c 14 f4 ff ff e8 46 13 c8 ff e9 0a f4 ff ff e8 ec 10 8e ff <0f> 0b e8 e5 10 8e ff 4c 89 ef e8 5d 64 cd ff e9 34 fc ff ff e8 d3 RSP: 0018:ffffc90000e377d8 EFLAGS: 00010293 RAX: ffffffff81df10c4 RBX: 0000000000000001 RCX: ffff888103f8a780 RDX: 0000000000000000 RSI: 00000000ffffd331 RDI: 0000000000000001 RBP: ffffc90000e37870 R08: ffffffff81df034c R09: ffffed10235e1a29 R10: ffffed10235e1a29 R11: 1ffff110235e1a28 R12: 1ffff11021497679 R13: ffff88810a4bd000 R14: 00000000ffffd331 R15: dffffc0000000000 FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f5ed4b6c348 CR3: 0000000119e88000 CR4: 00000000003506b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400