------------[ cut here ]------------ WARNING: CPU: 0 PID: 3622 at fs/buffer.c:1081 mark_buffer_dirty+0x67b/0xa40 fs/buffer.c:1081 Modules linked in: CPU: 0 PID: 3622 Comm: syz-executor269 Not tainted 6.1.0-rc3-syzkaller-00152-gf2f32f8af2b0 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/11/2022 RIP: 0010:mark_buffer_dirty+0x67b/0xa40 fs/buffer.c:1081 Code: 89 f5 41 83 e5 01 4c 89 ee e8 e1 6b 94 ff 4d 85 ed 0f 84 d3 fd ff ff e8 e3 6e 94 ff 49 8d 5e ff e9 c5 fd ff ff e8 d5 6e 94 ff <0f> 0b e9 b4 f9 ff ff e8 c9 6e 94 ff 0f 0b e9 06 fa ff ff e8 bd 6e RSP: 0018:ffffc90003b9ef28 EFLAGS: 00010293 RAX: 0000000000000000 RBX: ffff8880723d7cb0 RCX: 0000000000000000 RDX: ffff88801e9e3a80 RSI: ffffffff81e83dbb RDI: 0000000000000001 RBP: ffff88806f068a00 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: ffff888022480000 R13: ffffed100449002c R14: ffff8880723d7cb0 R15: 0000000000000012 FS: 0000555556e8a300(0000) GS:ffff8880b9a00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000000 CR3: 000000001c514000 CR4: 0000000000350ef0 Call Trace: bfs_move_block fs/bfs/file.c:43 [inline] bfs_move_blocks fs/bfs/file.c:56 [inline] bfs_get_block+0x394/0xdc0 fs/bfs/file.c:125 __block_write_begin_int+0x3b9/0x14b0 fs/buffer.c:1991 __block_write_begin fs/buffer.c:2041 [inline] block_write_begin+0xb5/0x4d0 fs/buffer.c:2102 bfs_write_begin+0x2d/0xd0 fs/bfs/file.c:177 generic_perform_write+0x252/0x570 mm/filemap.c:3753 __generic_file_write_iter+0x2aa/0x4d0 mm/filemap.c:3881 generic_file_write_iter+0xdf/0x350 mm/filemap.c:3913 __kernel_write_iter+0x25e/0x730 fs/read_write.c:517 __kernel_write+0xc7/0x110 fs/read_write.c:537 __dump_emit fs/coredump.c:804 [inline] dump_emit+0x219/0x340 fs/coredump.c:874 elf_core_dump+0x2006/0x3510 fs/binfmt_elf.c:2291 do_coredump+0x26c5/0x3bc0 fs/coredump.c:755 get_signal+0x1be1/0x2430 kernel/signal.c:2844 arch_do_signal_or_restart+0x82/0x2300 arch/x86/kernel/signal.c:869 exit_to_user_mode_loop kernel/entry/common.c:168 [inline] exit_to_user_mode_prepare+0x15f/0x250 kernel/entry/common.c:203 irqentry_exit_to_user_mode+0x5/0x30 kernel/entry/common.c:309 exc_page_fault+0xbc/0x170 arch/x86/mm/fault.c:1578 asm_exc_page_fault+0x22/0x30 arch/x86/include/asm/idtentry.h:570 RIP: 0033:0x0 Code: Unable to access opcode bytes at 0xffffffffffffffd6. RSP: 002b:00000000200000c8 EFLAGS: 00010217 RAX: 0000000000000000 RBX: 000000000000dd4d RCX: 00007f85c36eb2b9 RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000400 RBP: 0000000000000000 R08: 0000000000000000 R09: 00007ffd87f84c10 R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffd87f84c0c R13: 00007ffd87f84c40 R14: 00007ffd87f84c20 R15: 0000000000000005