------------[ cut here ]------------ WARNING: CPU: 0 PID: 4254 at fs/ext4/inode.c:3635 ext4_dirty_folio+0x12c/0x170 fs/ext4/inode.c:3635 Modules linked in: CPU: 0 PID: 4254 Comm: syz-executor262 Not tainted 6.1.53-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : ext4_dirty_folio+0x12c/0x170 fs/ext4/inode.c:3635 lr : ext4_dirty_folio+0x12c/0x170 fs/ext4/inode.c:3635 sp : ffff80001dfa7870 x29: ffff80001dfa7870 x28: 1fffff80007144c0 x27: 1fffff80007144c1 x26: dfff800000000000 x25: 05ffc80000000053 x24: 1fffff80007144c0 x23: 1fffff80007144c1 x22: dfff800000000000 x21: fffffc00038a2628 x20: ffff0000df4e6928 x19: fffffc00038a2600 x18: ffff80001dfa75a0 x17: ffff8000158ad000 x16: ffff800008303674 x15: 000000002034afa4 x14: 0000000000000000 x13: 0000000000000006 x12: 0000000000000001 x11: ff80800008e64110 x10: 0000000000000000 x9 : ffff800008e64110 x8 : ffff0000d74db780 x7 : ffff80000885f664 x6 : ffff0000e2898080 x5 : ffff0000e2899000 x4 : 000000000000000c x3 : ffff80000883747c x2 : 0000000000000001 x1 : 0000000000000001 x0 : 0000000000000000 Call trace: ext4_dirty_folio+0x12c/0x170 fs/ext4/inode.c:3635 folio_mark_dirty+0x118/0x198 mm/page-writeback.c:2749 unpin_user_pages_dirty_lock+0x244/0x464 mm/gup.c:343 process_vm_rw_single_vec mm/process_vm_access.c:126 [inline] process_vm_rw_core mm/process_vm_access.c:215 [inline] process_vm_rw+0x75c/0xa38 mm/process_vm_access.c:283 __do_sys_process_vm_writev mm/process_vm_access.c:303 [inline] __se_sys_process_vm_writev mm/process_vm_access.c:298 [inline] __arm64_sys_process_vm_writev+0xdc/0xf8 mm/process_vm_access.c:298 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2c0 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x64/0x218 arch/arm64/kernel/syscall.c:206 el0_svc+0x58/0x168 arch/arm64/kernel/entry-common.c:637 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655 el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:581 irq event stamp: 3514 hardirqs last enabled at (3513): [] __exit_to_kernel_mode arch/arm64/kernel/entry-common.c:84 [inline] hardirqs last enabled at (3513): [] exit_to_kernel_mode+0xe8/0x118 arch/arm64/kernel/entry-common.c:94 hardirqs last disabled at (3514): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405 softirqs last enabled at (1750): [] softirq_handle_end kernel/softirq.c:414 [inline] softirqs last enabled at (1750): [] __do_softirq+0xc14/0xea0 kernel/softirq.c:600 softirqs last disabled at (1737): [] ____do_softirq+0x14/0x20 arch/arm64/kernel/irq.c:79 ---[ end trace 0000000000000000 ]---