EXT4-fs (loop2): can't get journal size EXT4-fs (loop2): warning: mounting fs with errors, running e2fsck is recommended BUG: kernel NULL pointer dereference, address: 000000000000000a #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 800000002f290067 P4D 800000002f290067 PUD 339e0067 PMD 0 Oops: Oops: 0000 [#1] PREEMPT SMP KASAN PTI CPU: 0 UID: 0 PID: 6251 Comm: syz.2.48 Not tainted 6.13.0-rc6-syzkaller-00231-g77a903cd8e5a #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 RIP: 0010:const_folio_flags include/linux/page-flags.h:309 [inline] RIP: 0010:folio_test_active include/linux/page-flags.h:518 [inline] RIP: 0010:slab_test_pfmemalloc mm/slab.h:176 [inline] RIP: 0010:pfmemalloc_match mm/slub.c:3562 [inline] RIP: 0010:___slab_alloc+0x1f1/0x14a0 mm/slub.c:3703 Code: 68 f7 44 24 68 00 02 00 00 0f 85 04 06 00 00 41 f7 c4 00 02 00 00 4c 8b 24 24 8b 54 24 10 0f 84 5c fe ff ff fb e9 56 fe ff ff <41> f6 46 08 01 0f 85 7e 11 00 00 49 f7 06 00 01 00 00 0f 85 21 02 RSP: 0018:ffffc9000b29f6c8 EFLAGS: 00010246 RAX: a959e4778ec7cd00 RBX: ffffe8ffffc78750 RCX: ffffffff825a1223 RDX: 00000000ffffffff RSI: 0000000000000d40 RDI: ffff888033f0ec80 RBP: ffff888033f0ec80 R08: ffffe8ffffc78750 R09: 0000000000000120 R10: dffffc0000000000 R11: fffffbfff2030b0f R12: ffff888033f0ec80 R13: 0000000000000d40 R14: 0000000000000002 R15: 00000000ffffffff FS: 00007f8944a066c0(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000000000000a CR3: 000000003342e000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: __slab_alloc+0x58/0xa0 mm/slub.c:3920 __slab_alloc_node mm/slub.c:3995 [inline] slab_alloc_node mm/slub.c:4156 [inline] kmem_cache_alloc_noprof+0x268/0x380 mm/slub.c:4175 ext4_mb_add_groupinfo+0x6c3/0xfa0 fs/ext4/mballoc.c:3356 ext4_mb_init_backend fs/ext4/mballoc.c:3435 [inline] ext4_mb_init+0x15ab/0x27e0 fs/ext4/mballoc.c:3733 __ext4_fill_super fs/ext4/super.c:5559 [inline] ext4_fill_super+0x5f54/0x6e60 fs/ext4/super.c:5733 get_tree_bdev_flags+0x48c/0x5c0 fs/super.c:1636 vfs_get_tree+0x90/0x2b0 fs/super.c:1814 do_new_mount+0x2be/0xb40 fs/namespace.c:3511 do_mount fs/namespace.c:3851 [inline] __do_sys_mount fs/namespace.c:4061 [inline] __se_sys_mount+0x2d6/0x3c0 fs/namespace.c:4038 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f8943b874ca Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 1a 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f8944a05e68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007f8944a05ef0 RCX: 00007f8943b874ca RDX: 0000000020000080 RSI: 0000000020000140 RDI: 00007f8944a05eb0 RBP: 0000000020000080 R08: 00007f8944a05ef0 R09: 000000000000008a R10: 000000000000008a R11: 0000000000000246 R12: 0000000020000140 R13: 00007f8944a05eb0 R14: 0000000000000464 R15: 00000000200002c0 Modules linked in: CR2: 000000000000000a ---[ end trace 0000000000000000 ]--- RIP: 0010:const_folio_flags include/linux/page-flags.h:309 [inline] RIP: 0010:folio_test_active include/linux/page-flags.h:518 [inline] RIP: 0010:slab_test_pfmemalloc mm/slab.h:176 [inline] RIP: 0010:pfmemalloc_match mm/slub.c:3562 [inline] RIP: 0010:___slab_alloc+0x1f1/0x14a0 mm/slub.c:3703 Code: 68 f7 44 24 68 00 02 00 00 0f 85 04 06 00 00 41 f7 c4 00 02 00 00 4c 8b 24 24 8b 54 24 10 0f 84 5c fe ff ff fb e9 56 fe ff ff <41> f6 46 08 01 0f 85 7e 11 00 00 49 f7 06 00 01 00 00 0f 85 21 02 RSP: 0018:ffffc9000b29f6c8 EFLAGS: 00010246 RAX: a959e4778ec7cd00 RBX: ffffe8ffffc78750 RCX: ffffffff825a1223 RDX: 00000000ffffffff RSI: 0000000000000d40 RDI: ffff888033f0ec80 RBP: ffff888033f0ec80 R08: ffffe8ffffc78750 R09: 0000000000000120 R10: dffffc0000000000 R11: fffffbfff2030b0f R12: ffff888033f0ec80 R13: 0000000000000d40 R14: 0000000000000002 R15: 00000000ffffffff FS: 00007f8944a066c0(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000000000000a CR3: 000000003342e000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 68 f7 44 24 68 push $0x682444f7 5: 00 02 add %al,(%rdx) 7: 00 00 add %al,(%rax) 9: 0f 85 04 06 00 00 jne 0x613 f: 41 f7 c4 00 02 00 00 test $0x200,%r12d 16: 4c 8b 24 24 mov (%rsp),%r12 1a: 8b 54 24 10 mov 0x10(%rsp),%edx 1e: 0f 84 5c fe ff ff je 0xfffffe80 24: fb sti 25: e9 56 fe ff ff jmp 0xfffffe80 * 2a: 41 f6 46 08 01 testb $0x1,0x8(%r14) <-- trapping instruction 2f: 0f 85 7e 11 00 00 jne 0x11b3 35: 49 f7 06 00 01 00 00 testq $0x100,(%r14) 3c: 0f .byte 0xf 3d: 85 21 test %esp,(%rcx) 3f: 02 .byte 0x2