------------[ cut here ]------------ WARNING: CPU: 1 PID: 6243 at fs/ext4/inode.c:3617 ext4_set_page_dirty+0x258/0x2c8 fs/ext4/inode.c:3617 Modules linked in: CPU: 1 PID: 6243 Comm: syz.8.355 Not tainted 5.15.173-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : ext4_set_page_dirty+0x258/0x2c8 fs/ext4/inode.c:3617 lr : ext4_set_page_dirty+0x258/0x2c8 fs/ext4/inode.c:3617 sp : ffff8000222e7180 x29: ffff8000222e7180 x28: ffff8000222e7630 x27: 0000000000000000 x26: ffff0000c9332020 x25: ffff0000c9332020 x24: 1fffff80006f8311 x23: dfff800000000000 x22: ffff0000c9332020 x21: 05ffc00000002016 x20: 05ffc00000002016 x19: fffffc00037c1880 x18: ffff0000c156de18 x17: 0000000000000000 x16: ffff8000083052d8 x15: 00000000fffffe00 x14: 1ffff0000295806a x13: dfff800000000000 x12: 0000000000000001 x11: 0000000000000001 x10: 0000000000000000 x9 : ffff0000c2299b40 x8 : ffff800008dac150 x7 : ffff8000087c9a38 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000001 x3 : ffff8000087c9b3c x2 : 0000000000000001 x1 : 0000000000000000 x0 : 0000000000000000 Call trace: ext4_set_page_dirty+0x258/0x2c8 fs/ext4/inode.c:3617 set_page_dirty+0x23c/0x544 mm/page-writeback.c:2631 zap_pte_range mm/memory.c:1377 [inline] zap_pmd_range mm/memory.c:1505 [inline] zap_pud_range mm/memory.c:1534 [inline] zap_p4d_range mm/memory.c:1555 [inline] unmap_page_range+0xbe4/0x19d4 mm/memory.c:1576 unmap_single_vma+0x13c/0x1e4 mm/memory.c:1621 unmap_vmas+0x1ac/0x320 mm/memory.c:1653 exit_mmap+0x2c8/0x558 mm/mmap.c:3186 __mmput+0xec/0x3b8 kernel/fork.c:1127 mmput+0x80/0xc8 kernel/fork.c:1148 exit_mm+0x5f0/0x70c kernel/exit.c:550 do_exit+0x4d4/0x20bc kernel/exit.c:861 do_group_exit+0x110/0x268 kernel/exit.c:996 get_signal+0x634/0x1550 kernel/signal.c:2900 do_signal arch/arm64/kernel/signal.c:890 [inline] do_notify_resume+0x3d0/0x32b8 arch/arm64/kernel/signal.c:943 prepare_exit_to_user_mode arch/arm64/kernel/entry-common.c:133 [inline] exit_to_user_mode arch/arm64/kernel/entry-common.c:138 [inline] el0_svc+0xfc/0x1f0 arch/arm64/kernel/entry-common.c:609 el0t_64_sync_handler+0x84/0xe4 arch/arm64/kernel/entry-common.c:626 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 irq event stamp: 13702 hardirqs last enabled at (13701): [] free_unref_page_list+0x71c/0x7a8 mm/page_alloc.c:3478 hardirqs last disabled at (13702): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (13590): [] spin_unlock_bh include/linux/spinlock.h:408 [inline] softirqs last enabled at (13590): [] sctp_close+0x638/0x800 net/sctp/socket.c:1550 softirqs last disabled at (13558): [] spin_lock_bh include/linux/spinlock.h:368 [inline] softirqs last disabled at (13558): [] sctp_close+0x5c0/0x800 net/sctp/socket.c:1540 ---[ end trace 18e50001272f11bc ]---