------------[ cut here ]------------ WARNING: CPU: 0 PID: 4532 at fs/ext4/inode.c:3618 ext4_set_page_dirty+0x234/0x2c8 fs/ext4/inode.c:3618 Modules linked in: CPU: 0 PID: 4532 Comm: syz-executor.3 Not tainted 5.15.179-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : ext4_set_page_dirty+0x234/0x2c8 fs/ext4/inode.c:3618 lr : ext4_set_page_dirty+0x234/0x2c8 fs/ext4/inode.c:3618 sp : ffff8000203d7810 x29: ffff8000203d7810 x28: 0000000000000001 x27: fffffc0003805688 x26: fffffc0003805688 x25: fffffc0003805688 x24: 1fffff80007010c9 x23: dfff800000000000 x22: 0000000000000000 x21: 1fffff80007010c8 x20: 05ffc00000000031 x19: fffffc0003808640 x18: 0000000000000000 x17: 0000000000000000 x16: ffff8000082eb59c x15: 000000002034afa4 x14: 1ffff0000296e06c x13: dfff800000000000 x12: 0000000000000001 x11: 0000000000000000 x10: 0000000000000000 x9 : ffff0000d407d1c0 x8 : ffff800008daebb0 x7 : ffff8000087dc06c x6 : ffff0000e0219080 x5 : ffff0000e021a000 x4 : 000000000000000c x3 : ffff80000870c21c x2 : 0000000000000001 x1 : 0000000000000000 x0 : 0000000000000000 Call trace: ext4_set_page_dirty+0x234/0x2c8 fs/ext4/inode.c:3618 set_page_dirty+0x23c/0x544 mm/page-writeback.c:2631 set_page_dirty_lock+0xe8/0x144 mm/page-writeback.c:2656 unpin_user_pages_dirty_lock+0x210/0x3c0 mm/gup.c:365 process_vm_rw_single_vec mm/process_vm_access.c:126 [inline] process_vm_rw_core mm/process_vm_access.c:215 [inline] process_vm_rw+0x744/0xa38 mm/process_vm_access.c:283 __do_sys_process_vm_writev mm/process_vm_access.c:303 [inline] __se_sys_process_vm_writev mm/process_vm_access.c:298 [inline] __arm64_sys_process_vm_writev+0xdc/0xf8 mm/process_vm_access.c:298 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181 el0_svc+0x7c/0x1f0 arch/arm64/kernel/entry-common.c:608 el0t_64_sync_handler+0x84/0xe4 arch/arm64/kernel/entry-common.c:626 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 irq event stamp: 2102 hardirqs last enabled at (2101): [] __exit_to_kernel_mode arch/arm64/kernel/entry-common.c:81 [inline] hardirqs last enabled at (2101): [] exit_to_kernel_mode+0x100/0x178 arch/arm64/kernel/entry-common.c:91 hardirqs last disabled at (2102): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (352): [] local_bh_enable+0x10/0x34 include/linux/bottom_half.h:31 softirqs last disabled at (350): [] local_bh_disable+0x10/0x34 include/linux/bottom_half.h:18 ---[ end trace 78057e291798c92a ]--- ------------[ cut here ]------------ WARNING: CPU: 1 PID: 4532 at mm/page-writeback.c:2521 __set_page_dirty+0xdc/0xc7c mm/page-writeback.c:-1 Modules linked in: CPU: 1 PID: 4532 Comm: syz-executor.3 Tainted: G W 5.15.179-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 pstate: 804000c5 (Nzcv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : __set_page_dirty+0xdc/0xc7c mm/page-writeback.c:-1 lr : __set_page_dirty+0xdc/0xc7c mm/page-writeback.c:-1 sp : ffff8000203d7750 x29: ffff8000203d7760 x28: 0000000000000000 x27: fffffc0003805688 x26: dfff800000000000 x25: fffffc0003805688 x24: fffffc0003808658 x23: ffff0000e1ef84c8 x22: fffffc0003808640 x21: 05ffc00000000039 x20: ffff0000e1ef84d0 x19: fffffc0003808640 x18: ffff8000203d7480 x17: 0000000000000000 x16: ffff800008305acc x15: 000000000001aa1f x14: 1ffff0000296e06c x13: dfff800000000000 x12: ffff70000407aed0 x11: 0000000000000001 x10: 0000000000000000 x9 : ffff0000d407d1c0 x8 : ffff80000870a9a8 x7 : ffff80000870a914 x6 : 0000000000000000 x5 : 0000000000000080 x4 : 0000000000000001 x3 : ffff800008305bfc x2 : 0000000000000001 x1 : 0000000000000000 x0 : 0000000000000000 Call trace: __set_page_dirty+0xdc/0xc7c mm/page-writeback.c:-1 __set_page_dirty_buffers+0x288/0x4b4 fs/buffer.c:643 ext4_set_page_dirty+0x1fc/0x2c8 fs/ext4/inode.c:3619 set_page_dirty+0x23c/0x544 mm/page-writeback.c:2631 set_page_dirty_lock+0xe8/0x144 mm/page-writeback.c:2656 unpin_user_pages_dirty_lock+0x210/0x3c0 mm/gup.c:365 process_vm_rw_single_vec mm/process_vm_access.c:126 [inline] process_vm_rw_core mm/process_vm_access.c:215 [inline] process_vm_rw+0x744/0xa38 mm/process_vm_access.c:283 __do_sys_process_vm_writev mm/process_vm_access.c:303 [inline] __se_sys_process_vm_writev mm/process_vm_access.c:298 [inline] __arm64_sys_process_vm_writev+0xdc/0xf8 mm/process_vm_access.c:298 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181 el0_svc+0x7c/0x1f0 arch/arm64/kernel/entry-common.c:608 el0t_64_sync_handler+0x84/0xe4 arch/arm64/kernel/entry-common.c:626 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 irq event stamp: 2250 hardirqs last enabled at (2249): [] lock_page_memcg+0x11c/0x244 mm/memcontrol.c:2061 hardirqs last disabled at (2250): [] __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:108 [inline] hardirqs last disabled at (2250): [] _raw_spin_lock_irqsave+0xfc/0x14c kernel/locking/spinlock.c:162 softirqs last enabled at (2242): [] softirq_handle_end kernel/softirq.c:401 [inline] softirqs last enabled at (2242): [] handle_softirqs+0xb88/0xdbc kernel/softirq.c:586 softirqs last disabled at (2105): [] __do_softirq kernel/softirq.c:592 [inline] softirqs last disabled at (2105): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (2105): [] invoke_softirq kernel/softirq.c:439 [inline] softirqs last disabled at (2105): [] __irq_exit_rcu+0x268/0x4d8 kernel/softirq.c:641 ---[ end trace 78057e291798c92b ]---