BUG: scheduling while atomic: syz-executor.4/4363/0x00000002 Modules linked in: Preemption disabled at: [] rmqueue_pcplist mm/page_alloc.c:3893 [inline] [] rmqueue mm/page_alloc.c:3942 [inline] [] get_page_from_freelist+0x554/0x2870 mm/page_alloc.c:4394 CPU: 0 PID: 4363 Comm: syz-executor.4 Tainted: G W 6.1.68-syzkaller-00171-gba97ad7b91bb #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x151/0x1b7 lib/dump_stack.c:106 dump_stack+0x15/0x1b lib/dump_stack.c:113 __schedule_bug+0x195/0x260 kernel/sched/core.c:5960 schedule_debug kernel/sched/core.c:5987 [inline] __schedule+0xce9/0x1540 kernel/sched/core.c:6622 schedule+0xc3/0x180 kernel/sched/core.c:6805 io_schedule+0x8f/0x120 kernel/sched/core.c:8984 bit_wait_io+0x15/0xd0 kernel/sched/wait_bit.c:209 __wait_on_bit+0xaa/0x330 kernel/sched/wait_bit.c:49 out_of_line_wait_on_bit+0x1ab/0x230 kernel/sched/wait_bit.c:64 wait_on_bit_io include/linux/wait_bit.h:101 [inline] do_get_write_access+0x124/0xdb0 fs/jbd2/transaction.c:1115 jbd2_journal_get_write_access+0x195/0x2d0 fs/jbd2/transaction.c:1250 __ext4_journal_get_write_access+0x23f/0x690 fs/ext4/ext4_jbd2.c:235 ext4_reserve_inode_write+0x26d/0x360 fs/ext4/inode.c:5863 __ext4_mark_inode_dirty+0x12e/0x7d0 fs/ext4/inode.c:6037 ext4_dirty_inode+0xbd/0x100 fs/ext4/inode.c:6074 __mark_inode_dirty+0x200/0xa60 fs/fs-writeback.c:2433 mark_inode_dirty include/linux/fs.h:2534 [inline] generic_write_end+0x202/0x300 fs/buffer.c:2227 ext4_da_write_end+0x707/0x9a0 fs/ext4/inode.c:3109 generic_perform_write+0x3e6/0x5c0 mm/filemap.c:3840 ext4_buffered_write_iter+0x360/0x640 fs/ext4/file.c:285 ext4_file_write_iter+0x194/0x1570 __kernel_write_iter+0x2ff/0x710 fs/read_write.c:517 dump_emit_page fs/coredump.c:881 [inline] dump_user_range+0x469/0x6f0 fs/coredump.c:908 elf_core_dump+0x3746/0x4030 fs/binfmt_elf.c:2312 do_coredump+0x1909/0x2730 fs/coredump.c:755 get_signal+0x13ff/0x1820 kernel/signal.c:2865 arch_do_signal_or_restart+0xb0/0x16f0 arch/x86/kernel/signal.c:871 exit_to_user_mode_loop+0x74/0xa0 kernel/entry/common.c:168 exit_to_user_mode_prepare+0x5a/0xa0 kernel/entry/common.c:204 irqentry_exit_to_user_mode+0x9/0x20 kernel/entry/common.c:310 irqentry_exit+0x12/0x40 kernel/entry/common.c:413 exc_general_protection+0x32d/0x4c0 arch/x86/kernel/traps.c:729 asm_exc_general_protection+0x27/0x30 arch/x86/include/asm/idtentry.h:564 RIP: 0033:0x7f420ce7ddb1 Code: c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 48 3d 01 f0 ff ff 73 01 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f RSP: 002b:00000000200000e0 EFLAGS: 00010217 RAX: 0000000000000000 RBX: 00007f420cfabf80 RCX: 00007f420ce7dda9 RDX: 0000000020000100 RSI: 00000000200000e0 RDI: 0000000042229000 RBP: 00007f420ceca47a R08: 0000000020000180 R09: 0000000020000180 R10: 0000000020000140 R11: 0000000000000206 R12: 0000000000000000 R13: 000000000000000b R14: 00007f420cfabf80 R15: 00007ffcdbf36938