------------[ cut here ]------------ WARNING: CPU: 1 PID: 3996 at fs/ext4/inode.c:3607 ext4_set_page_dirty+0x234/0x2c8 fs/ext4/inode.c:3607 Modules linked in: CPU: 1 PID: 3996 Comm: syz-executor831 Not tainted 5.15.131-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : ext4_set_page_dirty+0x234/0x2c8 fs/ext4/inode.c:3607 lr : ext4_set_page_dirty+0x234/0x2c8 fs/ext4/inode.c:3607 sp : ffff80001cc87810 x29: ffff80001cc87810 x28: 0000000000000001 x27: fffffc0003802308 x26: fffffc0003802308 x25: fffffc0003802308 x24: 1fffff80006fdbd9 x23: dfff800000000000 x22: 0000000000000000 x21: 1fffff80006fdbd8 x20: 05ffc00000000031 x19: fffffc00037edec0 x18: 0000000000000000 x17: ff8080000a94aed4 x16: ffff8000082e8aa0 x15: 000000002034afa4 x14: 1ffff0000292006a x13: ffffffffffffffff x12: 0000000000000000 x11: ff80800008d98ca4 x10: 0000000000000000 x9 : ffff800008d98ca4 x8 : ffff0000c8249b40 x7 : ffff8000087cefc4 x6 : ffff0000dfb7b080 x5 : ffff0000dfb7c000 x4 : 000000000000000c x3 : ffff8000086febd0 x2 : 0000000000000001 x1 : 0000000000000000 x0 : 0000000000000000 Call trace: ext4_set_page_dirty+0x234/0x2c8 fs/ext4/inode.c:3607 set_page_dirty+0x23c/0x544 mm/page-writeback.c:2609 set_page_dirty_lock+0xe8/0x144 mm/page-writeback.c:2634 unpin_user_pages_dirty_lock+0x210/0x3c0 mm/gup.c:365 process_vm_rw_single_vec mm/process_vm_access.c:126 [inline] process_vm_rw_core mm/process_vm_access.c:215 [inline] process_vm_rw+0x744/0xa38 mm/process_vm_access.c:283 __do_sys_process_vm_writev mm/process_vm_access.c:303 [inline] __se_sys_process_vm_writev mm/process_vm_access.c:298 [inline] __arm64_sys_process_vm_writev+0xdc/0xf8 mm/process_vm_access.c:298 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181 el0_svc+0x7c/0x1f0 arch/arm64/kernel/entry-common.c:596 el0t_64_sync_handler+0x84/0xe4 arch/arm64/kernel/entry-common.c:614 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 irq event stamp: 4174 hardirqs last enabled at (4173): [] __exit_to_kernel_mode arch/arm64/kernel/entry-common.c:81 [inline] hardirqs last enabled at (4173): [] exit_to_kernel_mode+0x100/0x178 arch/arm64/kernel/entry-common.c:91 hardirqs last disabled at (4174): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:387 softirqs last enabled at (4066): [] softirq_handle_end kernel/softirq.c:401 [inline] softirqs last enabled at (4066): [] __do_softirq+0xb5c/0xe20 kernel/softirq.c:587 softirqs last disabled at (4031): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (4031): [] invoke_softirq kernel/softirq.c:439 [inline] softirqs last disabled at (4031): [] __irq_exit_rcu+0x28c/0x534 kernel/softirq.c:637 ---[ end trace 86ecf3cc18fa1ca6 ]--- ------------[ cut here ]------------ WARNING: CPU: 1 PID: 3996 at mm/page-writeback.c:2499 __set_page_dirty+0xdc/0xc7c Modules linked in: CPU: 1 PID: 3996 Comm: syz-executor831 Tainted: G W 5.15.131-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 pstate: 804000c5 (Nzcv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : __set_page_dirty+0xdc/0xc7c lr : __set_page_dirty+0xdc/0xc7c sp : ffff80001cc87750 x29: ffff80001cc87760 x28: 0000000000000000 x27: fffffc0003802308 x26: dfff800000000000 x25: fffffc0003802308 x24: fffffc00037eded8 x23: ffff0000dc9ce878 x22: fffffc00037edec0 x21: 05ffc00000000039 x20: ffff0000dc9ce880 x19: fffffc00037edec0 x18: ffff80001cc87480 x17: ff8080000a94aed4 x16: ffff800008302fc0 x15: 000000000000bd7f x14: 1ffff0000292006a x13: ffffffffffffffff x12: 0000000000000000 x11: ff808000086fd35c x10: 0000000000000000 x9 : ffff8000086fd35c x8 : ffff0000c8249b40 x7 : ffff8000086fd2c8 x6 : 0000000000000000 x5 : 0000000000000080 x4 : 0000000000000001 x3 : ffff8000083030f0 x2 : 0000000000000001 x1 : 0000000000000000 x0 : 0000000000000000 Call trace: __set_page_dirty+0xdc/0xc7c __set_page_dirty_buffers+0x288/0x4b4 fs/buffer.c:643 ext4_set_page_dirty+0x1fc/0x2c8 fs/ext4/inode.c:3608 set_page_dirty+0x23c/0x544 mm/page-writeback.c:2609 set_page_dirty_lock+0xe8/0x144 mm/page-writeback.c:2634 unpin_user_pages_dirty_lock+0x210/0x3c0 mm/gup.c:365 process_vm_rw_single_vec mm/process_vm_access.c:126 [inline] process_vm_rw_core mm/process_vm_access.c:215 [inline] process_vm_rw+0x744/0xa38 mm/process_vm_access.c:283 __do_sys_process_vm_writev mm/process_vm_access.c:303 [inline] __se_sys_process_vm_writev mm/process_vm_access.c:298 [inline] __arm64_sys_process_vm_writev+0xdc/0xf8 mm/process_vm_access.c:298 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181 el0_svc+0x7c/0x1f0 arch/arm64/kernel/entry-common.c:596 el0t_64_sync_handler+0x84/0xe4 arch/arm64/kernel/entry-common.c:614 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 irq event stamp: 4196 hardirqs last enabled at (4195): [] lock_page_memcg+0x11c/0x244 mm/memcontrol.c:2056 hardirqs last disabled at (4196): [] __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:108 [inline] hardirqs last disabled at (4196): [] _raw_spin_lock_irqsave+0xfc/0x14c kernel/locking/spinlock.c:162 softirqs last enabled at (4188): [] softirq_handle_end kernel/softirq.c:401 [inline] softirqs last enabled at (4188): [] __do_softirq+0xb5c/0xe20 kernel/softirq.c:587 softirqs last disabled at (4177): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (4177): [] invoke_softirq kernel/softirq.c:439 [inline] softirqs last disabled at (4177): [] __irq_exit_rcu+0x28c/0x534 kernel/softirq.c:637 ---[ end trace 86ecf3cc18fa1ca7 ]---