BUG: scheduling while atomic: syz-executor.1/4019/0x00000002 Modules linked in: Preemption disabled at: [] __up_write kernel/locking/rwsem.c:1418 [inline] [] up_write+0x27/0x1f0 kernel/locking/rwsem.c:1672 CPU: 0 PID: 4019 Comm: syz-executor.1 Tainted: G W 6.1.68-syzkaller-00059-gef39f76e4d24 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x151/0x1b7 lib/dump_stack.c:106 dump_stack+0x15/0x1b lib/dump_stack.c:113 __schedule_bug+0x195/0x260 kernel/sched/core.c:5960 schedule_debug kernel/sched/core.c:5987 [inline] __schedule+0xcf7/0x1550 kernel/sched/core.c:6622 do_task_dead+0x99/0xa0 kernel/sched/core.c:6747 do_exit+0x202a/0x2b80 kernel/exit.c:927 do_group_exit+0x21a/0x2d0 kernel/exit.c:1025 get_signal+0x169d/0x1820 kernel/signal.c:2879 arch_do_signal_or_restart+0xb0/0x16f0 arch/x86/kernel/signal.c:871 exit_to_user_mode_loop+0x74/0xa0 kernel/entry/common.c:168 exit_to_user_mode_prepare+0x5a/0xa0 kernel/entry/common.c:204 __syscall_exit_to_user_mode_work kernel/entry/common.c:286 [inline] syscall_exit_to_user_mode+0x26/0x140 kernel/entry/common.c:297 do_syscall_64+0x49/0xb0 arch/x86/entry/common.c:87 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7f1b7e67dda9 Code: Unable to access opcode bytes at 0x7f1b7e67dd7f. RSP: 002b:00007f1b7f354178 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: fffffffffffffe00 RBX: 00007f1b7e7abf88 RCX: 00007f1b7e67dda9 RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f1b7e7abf88 RBP: 00007f1b7e7abf80 R08: 00007f1b7f3546c0 R09: 00007f1b7f3546c0 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1b7e7abf8c R13: 000000000000000b R14: 00007ffc3bcfeaf0 R15: 00007ffc3bcfebd8