syz-executor393[289]: segfault at 7fffdafa9d58 ip 00007ffa4060d0a8 sp 00007fffdafa9d60 error 7 in syz-executor3935023343[7ffa405dd000+7b000] likely on CPU 0 (core 0, socket 0) Code: 84 e4 74 66 e8 89 04 00 00 41 89 c4 85 c0 0f 84 4e 01 00 00 49 c7 c5 b8 ff ff ff 64 45 8b 75 00 48 89 da 89 ee bf 02 00 00 00 93 09 00 00 45 85 e4 79 05 64 45 89 75 00 48 8b 84 24 c8 00 00 BUG: scheduling while atomic: syz-executor393/289/0x00000002 Modules linked in: Preemption disabled at: [] spin_lock include/linux/spinlock.h:350 [inline] [] ext4_do_update_inode fs/ext4/inode.c:5192 [inline] [] ext4_mark_iloc_dirty+0x1d6/0x1970 fs/ext4/inode.c:5841 CPU: 0 PID: 289 Comm: syz-executor393 Not tainted 6.1.75-syzkaller-00023-gb76ed1185975 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x151/0x1b7 lib/dump_stack.c:106 dump_stack+0x15/0x1b lib/dump_stack.c:113 __schedule_bug+0x195/0x260 kernel/sched/core.c:5960 schedule_debug kernel/sched/core.c:5987 [inline] __schedule+0xcf7/0x1550 kernel/sched/core.c:6622 schedule+0xc3/0x180 kernel/sched/core.c:6805 exit_to_user_mode_loop+0x4e/0xa0 kernel/entry/common.c:159 exit_to_user_mode_prepare+0x5a/0xa0 kernel/entry/common.c:204 irqentry_exit_to_user_mode+0x9/0x20 kernel/entry/common.c:310 irqentry_exit+0x12/0x40 kernel/entry/common.c:413 exc_page_fault+0x4f3/0x700 arch/x86/mm/fault.c:1565 asm_exc_page_fault+0x27/0x30 arch/x86/include/asm/idtentry.h:570 RIP: 0033:0x7ffa4060d0a8 Code: 84 e4 74 66 e8 89 04 00 00 41 89 c4 85 c0 0f 84 4e 01 00 00 49 c7 c5 b8 ff ff ff 64 45 8b 75 00 48 89 da 89 ee bf 02 00 00 00 93 09 00 00 45 85 e4 79 05 64 45 89 75 00 48 8b 84 24 c8 00 00 RSP: 002b:00007fffdafa9d60 EFLAGS: 00010206 RAX: 0000000000000428 RBX: 0000000000000000 RCX: 00007ffa4060d533 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000002 RBP: 0000000000000000 R08: 0000000000000000 R09: 00007fffdafa9bf5 R10: 000055555660a650 R11: 0000000000000246 R12: 0000000000000428 R13: ffffffffffffffb8 R14: 0000000000000016 R15: 0000000000000098 ---------------- Code disassembly (best guess): 0: 84 e4 test %ah,%ah 2: 74 66 je 0x6a 4: e8 89 04 00 00 call 0x492 9: 41 89 c4 mov %eax,%r12d c: 85 c0 test %eax,%eax e: 0f 84 4e 01 00 00 je 0x162 14: 49 c7 c5 b8 ff ff ff mov $0xffffffffffffffb8,%r13 1b: 64 45 8b 75 00 mov %fs:0x0(%r13),%r14d 20: 48 89 da mov %rbx,%rdx 23: 89 ee mov %ebp,%esi 25: bf 02 00 00 00 mov $0x2,%edi * 2a: e8 93 09 00 00 call 0x9c2 <-- trapping instruction 2f: 45 85 e4 test %r12d,%r12d 32: 79 05 jns 0x39 34: 64 45 89 75 00 mov %r14d,%fs:0x0(%r13) 39: 48 rex.W 3a: 8b .byte 0x8b 3b: 84 24 c8 test %ah,(%rax,%rcx,8)