------------[ cut here ]------------ WARNING: CPU: 0 PID: 4549 at fs/ext4/inode.c:3618 ext4_set_page_dirty+0x234/0x2c8 fs/ext4/inode.c:3618 Modules linked in: CPU: 0 PID: 4549 Comm: syz-executor.0 Not tainted 5.15.170-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : ext4_set_page_dirty+0x234/0x2c8 fs/ext4/inode.c:3618 lr : ext4_set_page_dirty+0x234/0x2c8 fs/ext4/inode.c:3618 sp : ffff80001f9a7810 x29: ffff80001f9a7810 x28: 0000000000000001 x27: fffffc000380ec48 x26: fffffc000380ec48 x25: fffffc000380ec48 x24: 1fffff8000701c59 x23: dfff800000000000 x22: 0000000000000000 x21: 1fffff8000701c58 x20: 05ffc00000000031 x19: fffffc000380e2c0 x18: 0000000000000000 x17: 0000000000000000 x16: ffff8000082eada8 x15: 000000002034afa4 x14: 1ffff0000295806a x13: dfff800000000000 x12: 0000000000000001 x11: 0000000000000000 x10: 0000000000000000 x9 : ffff0000ce14b680 x8 : ffff800008dabde0 x7 : ffff8000087dac5c x6 : ffff0000e038b080 x5 : ffff0000e038c000 x4 : 000000000000000c x3 : ffff80000870a008 x2 : 0000000000000001 x1 : 0000000000000000 x0 : 0000000000000000 Call trace: ext4_set_page_dirty+0x234/0x2c8 fs/ext4/inode.c:3618 set_page_dirty+0x23c/0x544 mm/page-writeback.c:2631 set_page_dirty_lock+0xe8/0x144 mm/page-writeback.c:2656 unpin_user_pages_dirty_lock+0x210/0x3c0 mm/gup.c:365 process_vm_rw_single_vec mm/process_vm_access.c:126 [inline] process_vm_rw_core mm/process_vm_access.c:215 [inline] process_vm_rw+0x744/0xa38 mm/process_vm_access.c:283 __do_sys_process_vm_writev mm/process_vm_access.c:303 [inline] __se_sys_process_vm_writev mm/process_vm_access.c:298 [inline] __arm64_sys_process_vm_writev+0xdc/0xf8 mm/process_vm_access.c:298 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181 el0_svc+0x7c/0x1f0 arch/arm64/kernel/entry-common.c:608 el0t_64_sync_handler+0x84/0xe4 arch/arm64/kernel/entry-common.c:626 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 irq event stamp: 10700 hardirqs last enabled at (10699): [] __exit_to_kernel_mode arch/arm64/kernel/entry-common.c:81 [inline] hardirqs last enabled at (10699): [] exit_to_kernel_mode+0x100/0x178 arch/arm64/kernel/entry-common.c:91 hardirqs last disabled at (10700): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (9480): [] softirq_handle_end kernel/softirq.c:401 [inline] softirqs last enabled at (9480): [] handle_softirqs+0xb88/0xdbc kernel/softirq.c:586 softirqs last disabled at (9353): [] __do_softirq kernel/softirq.c:592 [inline] softirqs last disabled at (9353): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (9353): [] invoke_softirq kernel/softirq.c:439 [inline] softirqs last disabled at (9353): [] __irq_exit_rcu+0x268/0x4d8 kernel/softirq.c:641 ---[ end trace 28fed52dee9a412d ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 4549 at mm/page-writeback.c:2521 __set_page_dirty+0xdc/0xc7c Modules linked in: CPU: 0 PID: 4549 Comm: syz-executor.0 Tainted: G W 5.15.170-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 pstate: 804000c5 (Nzcv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : __set_page_dirty+0xdc/0xc7c lr : __set_page_dirty+0xdc/0xc7c sp : ffff80001f9a7750 x29: ffff80001f9a7760 x28: 0000000000000000 x27: fffffc000380ec48 x26: dfff800000000000 x25: fffffc000380ec48 x24: fffffc000380e2d8 x23: ffff0000e1d54098 x22: fffffc000380e2c0 x21: 05ffc00000000039 x20: ffff0000e1d540a0 x19: fffffc000380e2c0 x18: ffff80001f9a7480 x17: 0000000000000000 x16: ffff8000083052d8 x15: 000000000001b3bc x14: 1ffff0000295806a x13: dfff800000000000 x12: ffff700003f34ed0 x11: 0000000000000001 x10: 0000000000000000 x9 : ffff0000ce14b680 x8 : ffff800008708794 x7 : ffff800008708700 x6 : 0000000000000000 x5 : 0000000000000080 x4 : 0000000000000001 x3 : ffff800008305408 x2 : 0000000000000001 x1 : 0000000000000000 x0 : 0000000000000000 Call trace: __set_page_dirty+0xdc/0xc7c __set_page_dirty_buffers+0x288/0x4b4 fs/buffer.c:643 ext4_set_page_dirty+0x1fc/0x2c8 fs/ext4/inode.c:3619 set_page_dirty+0x23c/0x544 mm/page-writeback.c:2631 set_page_dirty_lock+0xe8/0x144 mm/page-writeback.c:2656 unpin_user_pages_dirty_lock+0x210/0x3c0 mm/gup.c:365 process_vm_rw_single_vec mm/process_vm_access.c:126 [inline] process_vm_rw_core mm/process_vm_access.c:215 [inline] process_vm_rw+0x744/0xa38 mm/process_vm_access.c:283 __do_sys_process_vm_writev mm/process_vm_access.c:303 [inline] __se_sys_process_vm_writev mm/process_vm_access.c:298 [inline] __arm64_sys_process_vm_writev+0xdc/0xf8 mm/process_vm_access.c:298 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181 el0_svc+0x7c/0x1f0 arch/arm64/kernel/entry-common.c:608 el0t_64_sync_handler+0x84/0xe4 arch/arm64/kernel/entry-common.c:626 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 irq event stamp: 11010 hardirqs last enabled at (11009): [] lock_page_memcg+0x11c/0x244 mm/memcontrol.c:2056 hardirqs last disabled at (11010): [] __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:108 [inline] hardirqs last disabled at (11010): [] _raw_spin_lock_irqsave+0xfc/0x14c kernel/locking/spinlock.c:162 softirqs last enabled at (11002): [] softirq_handle_end kernel/softirq.c:401 [inline] softirqs last enabled at (11002): [] handle_softirqs+0xb88/0xdbc kernel/softirq.c:586 softirqs last disabled at (10703): [] __do_softirq kernel/softirq.c:592 [inline] softirqs last disabled at (10703): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (10703): [] invoke_softirq kernel/softirq.c:439 [inline] softirqs last disabled at (10703): [] __irq_exit_rcu+0x268/0x4d8 kernel/softirq.c:641 ---[ end trace 28fed52dee9a412e ]---