Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f09b9ba6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007f09bbbc5fa0 RCX: 00007f09bb94acb9 RDX: 0000200000000040 RSI: 00000000c028660f RDI: 0000000000000006 RBP: 00007f09b9ba6090 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 R13: 00007f09bbbc6038 R14: 00007f09bbbc5fa0 R15: 00007fff9ca272b8 ------------[ cut here ]------------ kernel BUG at fs/ext4/extents.c:5683! Oops: invalid opcode: 0000 [#1] SMP KASAN PTI CPU: 1 UID: 0 PID: 6612 Comm: syz.0.114 Not tainted syzkaller #0 PREEMPT_{RT,(full)} Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 RIP: 0010:ext4_swap_extents+0x19d8/0x1a10 fs/ext4/extents.c:5683 Code: fe c1 38 c1 0f 8c 0a fe ff ff e8 23 9e b6 ff e9 00 fe ff ff e8 49 8c 53 ff 90 0f 0b e8 41 8c 53 ff 90 0f 0b e8 39 8c 53 ff 90 <0f> 0b e8 31 8c 53 ff 90 0f 0b e8 29 8c 53 ff 90 0f 0b e8 21 8c 53 RSP: 0018:ffffc9000ddbf2e0 EFLAGS: 00010293 RAX: ffffffff826dbcb7 RBX: 0000000080000000 RCX: ffff8880265a3c80 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: dffffc0000000000 R08: 0000000000000000 R09: 0000000000000000 R10: dffffc0000000000 R11: ffffed100b85c4ce R12: 0000000000000002 R13: 0000000000000000 R14: 000000000000001a R15: 0000000000000002 FS: 00007f09b9ba66c0(0000) GS:ffff8881269d9000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f09bb998400 CR3: 000000002b4b0000 CR4: 00000000003526f0 Call Trace: mext_move_extent fs/ext4/move_extent.c:396 [inline] ext4_move_extents+0x2d31/0x3900 fs/ext4/move_extent.c:616 __ext4_ioctl fs/ext4/ioctl.c:1652 [inline] ext4_ioctl+0x3040/0x4af0 fs/ext4/ioctl.c:1917 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:597 [inline] __se_sys_ioctl+0xff/0x170 fs/ioctl.c:583 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xe2/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f09bb94acb9 Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f09b9ba6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007f09bbbc5fa0 RCX: 00007f09bb94acb9 RDX: 0000200000000040 RSI: 00000000c028660f RDI: 0000000000000006 RBP: 00007f09b9ba6090 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 R13: 00007f09bbbc6038 R14: 00007f09bbbc5fa0 R15: 00007fff9ca272b8 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:ext4_swap_extents+0x19d8/0x1a10 fs/ext4/extents.c:5683 Code: fe c1 38 c1 0f 8c 0a fe ff ff e8 23 9e b6 ff e9 00 fe ff ff e8 49 8c 53 ff 90 0f 0b e8 41 8c 53 ff 90 0f 0b e8 39 8c 53 ff 90 <0f> 0b e8 31 8c 53 ff 90 0f 0b e8 29 8c 53 ff 90 0f 0b e8 21 8c 53 RSP: 0018:ffffc9000ddbf2e0 EFLAGS: 00010293 RAX: ffffffff826dbcb7 RBX: 0000000080000000 RCX: ffff8880265a3c80 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: dffffc0000000000 R08: 0000000000000000 R09: 0000000000000000 R10: dffffc0000000000 R11: ffffed100b85c4ce R12: 0000000000000002 R13: 0000000000000000 R14: 000000000000001a R15: 0000000000000002 FS: 00007f09b9ba66c0(0000) GS:ffff8881269d9000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f79f31b8000 CR3: 000000002b4b0000 CR4: 00000000003526f0 ---------------- Code disassembly (best guess): 0: ff c3 inc %ebx 2: 66 2e 0f 1f 84 00 00 cs nopw 0x0(%rax,%rax,1) 9: 00 00 00 c: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) 11: 48 89 f8 mov %rdi,%rax 14: 48 89 f7 mov %rsi,%rdi 17: 48 89 d6 mov %rdx,%rsi 1a: 48 89 ca mov %rcx,%rdx 1d: 4d 89 c2 mov %r8,%r10 20: 4d 89 c8 mov %r9,%r8 23: 4c 8b 4c 24 08 mov 0x8(%rsp),%r9 28: 0f 05 syscall * 2a: 48 3d 01 f0 ff ff cmp $0xfffffffffffff001,%rax <-- trapping instruction 30: 73 01 jae 0x33 32: c3 ret 33: 48 c7 c1 e8 ff ff ff mov $0xffffffffffffffe8,%rcx 3a: f7 d8 neg %eax 3c: 64 89 01 mov %eax,%fs:(%rcx) 3f: 48 rex.W