------------[ cut here ]------------ WARNING: CPU: 0 PID: 5075 at fs/buffer.c:1124 mark_buffer_dirty+0x376/0x3e0 fs/buffer.c:1124 Modules linked in: CPU: 0 PID: 5075 Comm: syz-executor245 Not tainted 6.3.0-rc2-syzkaller-00047-g6015b1aca1a2 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 RIP: 0010:mark_buffer_dirty+0x376/0x3e0 fs/buffer.c:1124 Code: e9 cf 70 90 ff e8 ca 70 90 ff 48 89 ef e8 22 49 e8 ff 5b 5d e9 bb 70 90 ff e8 b6 70 90 ff 0f 0b e9 10 fe ff ff e8 aa 70 90 ff <0f> 0b e9 b7 fc ff ff e8 9e 70 90 ff 0f 0b e9 d6 fc ff ff 48 89 df RSP: 0018:ffffc900033ff010 EFLAGS: 00010293 RAX: 0000000000000000 RBX: ffff888070e63dd8 RCX: 0000000000000000 RDX: ffff88802b142240 RSI: ffffffff81f19506 RDI: 0000000000000001 RBP: ffff888070dca200 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: ffff88802b54c000 R13: ffffed10056a982c R14: ffff888070e63dd8 R15: 0000000000000016 FS: 00005555564cb300(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000000 CR3: 0000000078da8000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: bfs_move_block fs/bfs/file.c:43 [inline] bfs_move_blocks fs/bfs/file.c:56 [inline] bfs_get_block+0x39b/0xdd0 fs/bfs/file.c:125 __block_write_begin_int+0x3bd/0x14b0 fs/buffer.c:2034 __block_write_begin fs/buffer.c:2084 [inline] block_write_begin+0xb9/0x4d0 fs/buffer.c:2145 bfs_write_begin+0x31/0xd0 fs/bfs/file.c:177 generic_perform_write+0x256/0x570 mm/filemap.c:3926 __generic_file_write_iter+0x2ae/0x500 mm/filemap.c:4054 generic_file_write_iter+0xe3/0x350 mm/filemap.c:4086 __kernel_write_iter+0x262/0x7a0 fs/read_write.c:517 dump_emit_page fs/coredump.c:885 [inline] dump_user_range+0x234/0x700 fs/coredump.c:912 elf_core_dump+0x277e/0x36e0 fs/binfmt_elf.c:2142 do_coredump+0x2d28/0x3cc0 fs/coredump.c:762 get_signal+0x1bff/0x25b0 kernel/signal.c:2845 arch_do_signal_or_restart+0x79/0x5c0 arch/x86/kernel/signal.c:306 exit_to_user_mode_loop kernel/entry/common.c:168 [inline] exit_to_user_mode_prepare+0x15f/0x250 kernel/entry/common.c:203 irqentry_exit_to_user_mode+0x9/0x40 kernel/entry/common.c:309 exc_page_fault+0xc0/0x170 arch/x86/mm/fault.c:1557 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:570 RIP: 0033:0x0 Code: Unable to access opcode bytes at 0xffffffffffffffd6. RSP: 002b:0000000020000008 EFLAGS: 00010217 RAX: 0000000000000000 RBX: 000000000000001f RCX: 00007fcaec91f069 RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000000 RBP: 00007ffe57cfe5d0 R08: 0000000000000000 R09: 000000ff00ff000d R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffe57cfe5b8 R13: 00007ffe57cfe5d0 R14: 0000000000000000 R15: 0000000000000003