------------[ cut here ]------------ WARNING: CPU: 0 PID: 4562 at fs/ext4/inode.c:3619 ext4_set_page_dirty+0x234/0x2c8 fs/ext4/inode.c:3619 Modules linked in: CPU: 0 PID: 4562 Comm: syz-executor.2 Not tainted 5.15.185-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : ext4_set_page_dirty+0x234/0x2c8 fs/ext4/inode.c:3619 lr : ext4_set_page_dirty+0x234/0x2c8 fs/ext4/inode.c:3619 sp : ffff80001fa87870 x29: ffff80001fa87870 x28: ffff700003f50f44 x27: fffffc0003974508 x26: fffffc0003974508 x25: fffffc0003974508 x24: 1fffff80006e7669 x23: dfff800000000000 x22: 0000000000000000 x21: 1fffff80006e7668 x20: 05ffc00000000031 x19: fffffc000373b340 x18: 0000000000000000 x17: 0000000000000000 x16: ffff8000082bdf08 x15: 000000002034afa4 x14: 0000000000ff0100 x13: 1ffff0000282c06b x12: 0000000000ff0100 x11: 0000000000000000 x10: 0000000000000000 x9 : ffff800008ccd76c x8 : ffff0000cd813680 x7 : ffff800008760b34 x6 : ffff0000dcecd080 x5 : ffff0000dcece000 x4 : 000000000000000c x3 : ffff80000869eb64 x2 : 0000000000000001 x1 : 0000000000000000 x0 : 0000000000000000 Call trace: ext4_set_page_dirty+0x234/0x2c8 fs/ext4/inode.c:3619 set_page_dirty+0x23c/0x4f0 mm/page-writeback.c:2631 set_page_dirty_lock+0xe8/0x144 mm/page-writeback.c:2656 unpin_user_pages_dirty_lock+0x430/0x5f4 mm/gup.c:365 process_vm_rw_single_vec mm/process_vm_access.c:126 [inline] process_vm_rw_core mm/process_vm_access.c:215 [inline] process_vm_rw+0x758/0x9c4 mm/process_vm_access.c:283 __do_sys_process_vm_writev mm/process_vm_access.c:303 [inline] __se_sys_process_vm_writev mm/process_vm_access.c:298 [inline] __arm64_sys_process_vm_writev+0xdc/0xf8 mm/process_vm_access.c:298 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181 el0_svc+0x78/0x1e0 arch/arm64/kernel/entry-common.c:608 el0t_64_sync_handler+0xcc/0xe4 arch/arm64/kernel/entry-common.c:626 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 irq event stamp: 5578 hardirqs last enabled at (5577): [] __exit_to_kernel_mode arch/arm64/kernel/entry-common.c:81 [inline] hardirqs last enabled at (5577): [] exit_to_kernel_mode+0xe0/0x168 arch/arm64/kernel/entry-common.c:91 hardirqs last disabled at (5578): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (5526): [] softirq_handle_end kernel/softirq.c:419 [inline] softirqs last enabled at (5526): [] handle_softirqs+0xa4c/0xbf0 kernel/softirq.c:604 softirqs last disabled at (5521): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (5521): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (5521): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (5521): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace a4f92412f34e20c3 ]---