------------[ cut here ]------------ kernel BUG at fs/ext4/ext4.h:3331! invalid opcode: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 21746 Comm: syz-executor.3 Not tainted 6.1.25-syzkaller-00019-g7c793b4d8fff #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 RIP: 0010:ext4_get_group_info fs/ext4/ext4.h:3331 [inline] RIP: 0010:ext4_mb_load_buddy_gfp+0xef8/0xf10 fs/ext4/mballoc.c:1448 Code: fe 2e c6 ff e9 de f3 ff ff e8 64 cf 7f ff 48 c7 c7 a0 ff cb 86 4c 89 ee 48 89 da e8 f2 70 a9 00 e9 50 f2 ff ff e8 48 cf 7f ff <0f> 0b e8 41 cf 7f ff 0f 0b e8 3a cf 7f ff 0f 0b 0f 1f 84 00 00 00 RSP: 0018:ffffc9000d8bf988 EFLAGS: 00010293 RAX: ffffffff81f51198 RBX: 0000000000000001 RCX: ffff88810ebfbcc0 RDX: 0000000000000000 RSI: 00000000ffffc8bb RDI: 0000000000000001 RBP: ffffc9000d8bfa10 R08: ffffffff81f5038c R09: ffffed10271b3867 R10: 0000000000000000 R11: dffffc0000000001 R12: 00000000ffffc8bb R13: ffff8881354aa000 R14: ffff88812a9de3c8 R15: ffff88812a9de018 FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b30b2c000 CR3: 000000012ac2b000 CR4: 00000000003506a0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: ext4_discard_preallocations+0x79c/0xef0 fs/ext4/mballoc.c:5021 ext4_release_file+0x16e/0x310 fs/ext4/file.c:166 __fput+0x3ab/0x870 fs/file_table.c:320 ____fput+0x15/0x20 fs/file_table.c:348 task_work_run+0x24d/0x2e0 kernel/task_work.c:179 exit_task_work include/linux/task_work.h:38 [inline] do_exit+0xbd5/0x2b80 kernel/exit.c:875 do_group_exit+0x21a/0x2d0 kernel/exit.c:1025 __do_sys_exit_group kernel/exit.c:1036 [inline] __se_sys_exit_group kernel/exit.c:1034 [inline] __x64_sys_exit_group+0x3f/0x40 kernel/exit.c:1034 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7f7ce0c7cae9 Code: Unable to access opcode bytes at 0x7f7ce0c7cabf. RSP: 002b:00007ffcba790d98 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007f7ce0c7cae9 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 0000000000000001 R08: 0000000000000006 R09: 0000000000000000 R10: 0000001b33c20000 R11: 0000000000000246 R12: 0000000000000001 R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000001 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:ext4_get_group_info fs/ext4/ext4.h:3331 [inline] RIP: 0010:ext4_mb_load_buddy_gfp+0xef8/0xf10 fs/ext4/mballoc.c:1448 Code: fe 2e c6 ff e9 de f3 ff ff e8 64 cf 7f ff 48 c7 c7 a0 ff cb 86 4c 89 ee 48 89 da e8 f2 70 a9 00 e9 50 f2 ff ff e8 48 cf 7f ff <0f> 0b e8 41 cf 7f ff 0f 0b e8 3a cf 7f ff 0f 0b 0f 1f 84 00 00 00 RSP: 0018:ffffc9000d8bf988 EFLAGS: 00010293 RAX: ffffffff81f51198 RBX: 0000000000000001 RCX: ffff88810ebfbcc0 RDX: 0000000000000000 RSI: 00000000ffffc8bb RDI: 0000000000000001 RBP: ffffc9000d8bfa10 R08: ffffffff81f5038c R09: ffffed10271b3867 R10: 0000000000000000 R11: dffffc0000000001 R12: 00000000ffffc8bb R13: ffff8881354aa000 R14: ffff88812a9de3c8 R15: ffff88812a9de018 FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b2ea24000 CR3: 000000012ac2b000 CR4: 00000000003506b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400