------------[ cut here ]------------ WARNING: CPU: 1 PID: 28849 at fs/ext4/inode.c:3635 ext4_dirty_folio+0xf0/0x208 fs/ext4/inode.c:3635 Modules linked in: CPU: 1 PID: 28849 Comm: syz-executor342 Not tainted 6.1.0-rc6-syzkaller-32662-g6d464646530f #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/30/2022 pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : ext4_dirty_folio+0xf0/0x208 fs/ext4/inode.c:3635 lr : ext4_dirty_folio+0xf0/0x208 fs/ext4/inode.c:3635 sp : ffff80001a4ab9b0 x29: ffff80001a4ab9b0 x28: 00000000000001ed x27: fffffc00034bb6c8 x26: 0000000000000001 x25: 0000000000000007 x24: 05ffc00000000014 x23: 0000000000000001 x22: fffffc0003486f80 x21: 05ffc00000000015 x20: ffff0000d00ed158 x19: fffffc0003486f80 x18: 000000000000035a x17: ffff80000c0cd83c x16: 0000000000000000 x15: 0000000000000000 x14: 0000000000000000 x13: 0000000000000006 x12: ffff80000d65e068 x11: ff808000087ed34c x10: 0000000000000000 x9 : ffff8000087ed34c x8 : ffff0000d0990000 x7 : ffff800008478020 x6 : 0000000000000000 x5 : ffff0000d278d000 x4 : 000000002034bf24 x3 : 0000000000000000 x2 : 0000000000000000 x1 : 0000000000000001 x0 : 0000000000000000 Call trace: ext4_dirty_folio+0xf0/0x208 fs/ext4/inode.c:3635 folio_mark_dirty+0xbc/0x218 mm/page-writeback.c:2749 unpin_user_pages_dirty_lock+0x220/0x430 mm/gup.c:343 process_vm_rw_single_vec+0x294/0x390 mm/process_vm_access.c:126 process_vm_rw_core+0x33c/0x4b8 mm/process_vm_access.c:215 process_vm_rw+0x180/0x1e4 mm/process_vm_access.c:283 __do_sys_process_vm_writev mm/process_vm_access.c:303 [inline] __se_sys_process_vm_writev mm/process_vm_access.c:298 [inline] __arm64_sys_process_vm_writev+0x30/0x40 mm/process_vm_access.c:298 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall arch/arm64/kernel/syscall.c:52 [inline] el0_svc_common+0x138/0x220 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x48/0x164 arch/arm64/kernel/syscall.c:206 el0_svc+0x58/0x150 arch/arm64/kernel/entry-common.c:637 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:584 irq event stamp: 19252 hardirqs last enabled at (19251): [] __exit_to_kernel_mode arch/arm64/kernel/entry-common.c:84 [inline] hardirqs last enabled at (19251): [] exit_to_kernel_mode+0xe8/0x118 arch/arm64/kernel/entry-common.c:94 hardirqs last disabled at (19252): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405 softirqs last enabled at (17754): [] _stext+0x2e4/0x37c softirqs last disabled at (17713): [] ____do_softirq+0x14/0x20 arch/arm64/kernel/irq.c:80 ---[ end trace 0000000000000000 ]---