EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. BUG: unable to handle page fault for address: ffff88801ae40000 #PF: supervisor write access in kernel mode #PF: error_code(0x0003) - permissions violation PGD 17801067 P4D 17801067 PUD 17802067 PMD 1c657063 PTE 800000001ae40161 Oops: 0003 [#1] PREEMPT SMP KASAN CPU: 0 PID: 4453 Comm: syz.2.18 Not tainted 6.1.128-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 RIP: 0010:__memmove+0x19c/0x1a0 arch/x86/lib/memmove_64.S:211 Code: fa 02 72 16 66 44 8b 1e 66 44 8b 54 16 fe 66 44 89 1f 66 44 89 54 17 fe eb 0c 48 83 fa 01 72 06 44 8a 1e 44 88 1f c3 48 89 d1 a4 c3 cc eb 2e 0f 1f 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 RSP: 0018:ffffc900033c7418 EFLAGS: 00010286 RAX: ffff88801aaea070 RBX: 0000000000000020 RCX: ffffffffffcaa044 RDX: ffffffffffffffd4 RSI: ffff88801ae3ffe0 RDI: ffff88801ae40000 RBP: ffffc900033c7590 R08: ffff88801aaea024 R09: 0000000000000001 R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 R13: ffffffffffffffd4 R14: ffff88801aaea050 R15: 0000000000000001 FS: 00007f2f224626c0(0000) GS:ffff8880b8e00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffff88801ae40000 CR3: 00000000743ac000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: ext4_xattr_set_entry+0x8ca/0x1f30 fs/ext4/xattr.c:1732 ext4_xattr_block_set+0xa58/0x3920 fs/ext4/xattr.c:1979 ext4_xattr_move_to_block fs/ext4/xattr.c:2616 [inline] ext4_xattr_make_inode_space fs/ext4/xattr.c:2691 [inline] ext4_expand_extra_isize_ea+0x10d5/0x1bb0 fs/ext4/xattr.c:2783 __ext4_expand_extra_isize+0x2f7/0x3d0 fs/ext4/inode.c:5936 ext4_try_to_expand_extra_isize fs/ext4/inode.c:5979 [inline] __ext4_mark_inode_dirty+0x54f/0x920 fs/ext4/inode.c:6057 __ext4_unlink+0x6ed/0xba0 fs/ext4/namei.c:3341 ext4_unlink+0x1d5/0x670 fs/ext4/namei.c:3370 vfs_unlink+0x359/0x5f0 fs/namei.c:4322 do_unlinkat+0x4a5/0x820 fs/namei.c:4390 __do_sys_unlink fs/namei.c:4438 [inline] __se_sys_unlink fs/namei.c:4436 [inline] __x64_sys_unlink+0x45/0x50 fs/namei.c:4436 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x3b/0xb0 arch/x86/entry/common.c:81 entry_SYSCALL_64_after_hwframe+0x68/0xd2 RIP: 0033:0x7f2f2158cde9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f2f22462038 EFLAGS: 00000246 ORIG_RAX: 0000000000000057 RAX: ffffffffffffffda RBX: 00007f2f217a5fa0 RCX: 00007f2f2158cde9 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000400000000180 RBP: 00007f2f2160e2a0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007f2f217a5fa0 R15: 00007ffcfd9ec2f8 Modules linked in: CR2: ffff88801ae40000 ---[ end trace 0000000000000000 ]--- RIP: 0010:__memmove+0x19c/0x1a0 arch/x86/lib/memmove_64.S:211 Code: fa 02 72 16 66 44 8b 1e 66 44 8b 54 16 fe 66 44 89 1f 66 44 89 54 17 fe eb 0c 48 83 fa 01 72 06 44 8a 1e 44 88 1f c3 48 89 d1 a4 c3 cc eb 2e 0f 1f 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 RSP: 0018:ffffc900033c7418 EFLAGS: 00010286 RAX: ffff88801aaea070 RBX: 0000000000000020 RCX: ffffffffffcaa044 RDX: ffffffffffffffd4 RSI: ffff88801ae3ffe0 RDI: ffff88801ae40000 RBP: ffffc900033c7590 R08: ffff88801aaea024 R09: 0000000000000001 R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 R13: ffffffffffffffd4 R14: ffff88801aaea050 R15: 0000000000000001 FS: 00007f2f224626c0(0000) GS:ffff8880b8e00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffff88801ae40000 CR3: 00000000743ac000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: fa cli 1: 02 72 16 add 0x16(%rdx),%dh 4: 66 44 8b 1e mov (%rsi),%r11w 8: 66 44 8b 54 16 fe mov -0x2(%rsi,%rdx,1),%r10w e: 66 44 89 1f mov %r11w,(%rdi) 12: 66 44 89 54 17 fe mov %r10w,-0x2(%rdi,%rdx,1) 18: eb 0c jmp 0x26 1a: 48 83 fa 01 cmp $0x1,%rdx 1e: 72 06 jb 0x26 20: 44 8a 1e mov (%rsi),%r11b 23: 44 88 1f mov %r11b,(%rdi) 26: c3 ret 27: 48 89 d1 mov %rdx,%rcx * 2a: f3 a4 rep movsb %ds:(%rsi),%es:(%rdi) <-- trapping instruction 2c: c3 ret 2d: cc int3 2e: eb 2e jmp 0x5e 30: 0f 1f 00 nopl (%rax) 33: 49 89 f9 mov %rdi,%r9 36: 48 89 d1 mov %rdx,%rcx 39: 83 e2 07 and $0x7,%edx 3c: 48 c1 e9 03 shr $0x3,%rcx