------------[ cut here ]------------ kernel BUG at fs/ext4/extents.c:2140! invalid opcode: 0000 [#2] PREEMPT SMP KASAN CPU: 0 PID: 1358 Comm: syz.1.46 Tainted: G D syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 RIP: 0010:ext4_ext_insert_extent+0x477e/0x47c0 fs/ext4/extents.c:2140 Code: ff 44 89 f1 80 e1 07 fe c1 38 c1 0f 8c a5 e8 ff ff 4c 89 f7 e8 f3 7b d5 ff e9 98 e8 ff ff e8 39 2f 99 ff 0f 0b e8 32 2f 99 ff <0f> 0b e8 2b 2f 99 ff 0f 0b 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c 19 RSP: 0018:ffffc900012663c0 EFLAGS: 00010293 RAX: ffffffff81cece2e RBX: ffff8881282f2400 RCX: ffff8881159e6600 RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000006 RBP: ffffc90001266570 R08: ffff88812d7e8937 R09: 1ffff11025afd126 R10: dffffc0000000000 R11: ffffed1025afd127 R12: 0000000000000006 R13: ffff88812d79f3b8 R14: ffff8881282f243c R15: 0000000000000006 FS: 00007ff21982e6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00005555915c3988 CR3: 0000000110663000 CR4: 00000000003506b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: ext4_ext_map_blocks+0x186c/0x61e0 fs/ext4/extents.c:4362 ext4_map_blocks+0x988/0x1b30 fs/ext4/inode.c:673 _ext4_get_block+0x1ea/0x540 fs/ext4/inode.c:816 ext4_get_block_unwritten+0x2a/0x40 fs/ext4/inode.c:847 ext4_block_write_begin+0x563/0x1160 fs/ext4/inode.c:1101 ext4_write_begin+0x614/0xfe0 fs/ext4/ext4_jbd2.h:-1 ext4_da_write_begin+0x41c/0x900 fs/ext4/inode.c:2975 generic_perform_write+0x2b3/0x540 mm/filemap.c:3785 ext4_buffered_write_iter+0x4ed/0x670 fs/ext4/file.c:268 ext4_file_write_iter+0x436/0x1590 include/linux/fs.h:-1 __kernel_write+0x510/0x950 fs/read_write.c:539 __dump_emit+0x246/0x370 fs/coredump.c:943 dump_emit+0x383/0x3f0 fs/coredump.c:980 dump_user_range+0x86/0x1c0 fs/coredump.c:1017 elf_core_dump+0x2a8f/0x2fd0 fs/binfmt_elf.c:2285 do_coredump+0x1515/0x2a10 fs/coredump.c:894 get_signal+0x387/0x1470 kernel/signal.c:2886 arch_do_signal_or_restart+0xdf/0x11c0 arch/x86/kernel/signal.c:867 handle_signal_work kernel/entry/common.c:154 [inline] exit_to_user_mode_loop+0xa7/0xe0 kernel/entry/common.c:178 exit_to_user_mode_prepare+0x87/0xd0 kernel/entry/common.c:214 irqentry_exit_to_user_mode+0x9/0x10 kernel/entry/common.c:320 irqentry_exit+0x12/0x40 kernel/entry/common.c:411 exc_page_fault+0x5e/0xb0 arch/x86/mm/fault.c:1504 asm_exc_page_fault+0x27/0x30 arch/x86/include/asm/idtentry.h:606 RIP: 0033:0x7ff2199c9eb9 Code: Unable to access opcode bytes at RIP 0x7ff2199c9e8f. RSP: 002b:00007ff21982dfd8 EFLAGS: 00010206 RAX: 0000000000000000 RBX: 00007ff219c44fa0 RCX: 00007ff2199c9eb9 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000a000 RBP: 00007ff219a37c1f R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 R13: 00007ff219c45038 R14: 00007ff219c44fa0 R15: 00007ffe7fa3cab8 Modules linked in: