loop0: detected capacity change from 0 to 512 ------------[ cut here ]------------ EA inode 11 i_nlink=2 WARNING: fs/ext4/xattr.c:1057 at ext4_xattr_inode_update_ref+0x477/0x590 fs/ext4/xattr.c:1057, CPU#1: syz.0.478/7619 Modules linked in: CPU: 1 UID: 0 PID: 7619 Comm: syz.0.478 Not tainted syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 RIP: 0010:ext4_xattr_inode_update_ref+0x47e/0x590 fs/ext4/xattr.c:1057 Code: 40 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 0a 01 00 00 48 8d 3d 59 bd fb 0d 48 8b 73 40 44 89 e2 <67> 48 0f b9 3a eb a6 e8 96 cb 25 ff 48 8d 7b 40 48 b8 00 00 00 00 RSP: 0018:ffffc900044a73d8 EFLAGS: 00010246 RAX: dffffc0000000000 RBX: ffff888077a272b8 RCX: ffffc90013a1a000 RDX: 0000000000000002 RSI: 000000000000000b RDI: ffffffff90de5c10 RBP: ffffc900044a74a0 R08: 0000000000000005 R09: 0000000000000001 R10: 0000000000000002 R11: 0000000000000000 R12: 0000000000000002 R13: 1ffff92000894e7e R14: 00000000ffffffff R15: 0000000000000000 FS: 00007f50addd56c0(0000) GS:ffff888124477000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007faf15636000 CR3: 000000003aae0000 CR4: 0000000000350ef0 Call Trace: ext4_xattr_inode_dec_ref fs/ext4/xattr.c:1082 [inline] ext4_xattr_inode_dec_ref_all+0x526/0xef0 fs/ext4/xattr.c:1228 ext4_xattr_delete_inode+0x4ef/0xbb0 fs/ext4/xattr.c:2952 ext4_evict_inode+0x8ce/0x1a30 fs/ext4/inode.c:284 evict+0x3c2/0xad0 fs/inode.c:841 iput_final fs/inode.c:1960 [inline] iput.part.0+0x605/0xf50 fs/inode.c:2009 iput+0x35/0x40 fs/inode.c:1975 ext4_orphan_cleanup+0x71e/0x11e0 fs/ext4/orphan.c:472 __ext4_fill_super fs/ext4/super.c:5701 [inline] ext4_fill_super+0x916c/0xb5d0 fs/ext4/super.c:5824 get_tree_bdev_flags+0x38c/0x620 fs/super.c:1694 vfs_get_tree+0x92/0x320 fs/super.c:1754 fc_mount fs/namespace.c:1193 [inline] do_new_mount_fc fs/namespace.c:3758 [inline] do_new_mount fs/namespace.c:3834 [inline] path_mount+0x7d0/0x23d0 fs/namespace.c:4154 do_mount fs/namespace.c:4167 [inline] __do_sys_mount fs/namespace.c:4383 [inline] __se_sys_mount fs/namespace.c:4360 [inline] __x64_sys_mount+0x293/0x310 fs/namespace.c:4360 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x10b/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f50afb9e04a Code: 48 c7 c2 e8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f50addd4e58 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007f50addd4ee0 RCX: 00007f50afb9e04a RDX: 0000200000000180 RSI: 00002000000001c0 RDI: 00007f50addd4ea0 RBP: 0000200000000180 R08: 00007f50addd4ee0 R09: 0000000000800718 R10: 0000000000800718 R11: 0000000000000246 R12: 00002000000001c0 R13: 00007f50addd4ea0 R14: 0000000000000484 R15: 0000200000000000 ---------------- Code disassembly (best guess): 0: 40 rex 1: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 8: fc ff df b: 48 89 fa mov %rdi,%rdx e: 48 c1 ea 03 shr $0x3,%rdx 12: 80 3c 02 00 cmpb $0x0,(%rdx,%rax,1) 16: 0f 85 0a 01 00 00 jne 0x126 1c: 48 8d 3d 59 bd fb 0d lea 0xdfbbd59(%rip),%rdi # 0xdfbbd7c 23: 48 8b 73 40 mov 0x40(%rbx),%rsi 27: 44 89 e2 mov %r12d,%edx * 2a: 67 48 0f b9 3a ud1 (%edx),%rdi <-- trapping instruction 2f: eb a6 jmp 0xffffffd7 31: e8 96 cb 25 ff call 0xff25cbcc 36: 48 8d 7b 40 lea 0x40(%rbx),%rdi 3a: 48 rex.W 3b: b8 00 00 00 00 mov $0x0,%eax