BUG: scheduling while atomic: syz-executor.0/32437/0x00000002 Modules linked in: Preemption disabled at: [] spin_lock include/linux/spinlock.h:350 [inline] [] try_to_free_buffers+0x14a/0x290 fs/buffer.c:2878 CPU: 0 PID: 32437 Comm: syz-executor.0 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x151/0x1b7 lib/dump_stack.c:106 dump_stack+0x15/0x1b lib/dump_stack.c:113 __schedule_bug+0x195/0x260 kernel/sched/core.c:5960 schedule_debug kernel/sched/core.c:5987 [inline] __schedule+0xcf7/0x1550 kernel/sched/core.c:6622 schedule+0xc3/0x180 kernel/sched/core.c:6805 io_schedule+0x8f/0x120 kernel/sched/core.c:8984 bit_wait_io+0x15/0xd0 kernel/sched/wait_bit.c:209 __wait_on_bit+0xaa/0x330 kernel/sched/wait_bit.c:49 out_of_line_wait_on_bit+0x1ab/0x230 kernel/sched/wait_bit.c:64 wait_on_bit_io include/linux/wait_bit.h:101 [inline] do_get_write_access+0x124/0xdb0 fs/jbd2/transaction.c:1115 jbd2_journal_get_write_access+0x195/0x2d0 fs/jbd2/transaction.c:1250 __ext4_journal_get_write_access+0x23f/0x690 fs/ext4/ext4_jbd2.c:235 ext4_reserve_inode_write+0x26d/0x360 fs/ext4/inode.c:5863 __ext4_mark_inode_dirty+0x12e/0x7d0 fs/ext4/inode.c:6037 ext4_evict_inode+0xc68/0x1550 fs/ext4/inode.c:279 evict+0x2a3/0x630 fs/inode.c:666 iput_final fs/inode.c:1791 [inline] iput+0x642/0x870 fs/inode.c:1817 dentry_unlink_inode+0x34f/0x440 fs/dcache.c:401 __dentry_kill+0x447/0x650 fs/dcache.c:607 dentry_kill+0xc0/0x2a0 dput+0x160/0x310 fs/dcache.c:913 __fput+0x5f0/0x870 fs/file_table.c:328 ____fput+0x15/0x20 fs/file_table.c:348 task_work_run+0x24d/0x2e0 kernel/task_work.c:179 exit_task_work include/linux/task_work.h:38 [inline] do_exit+0xbd5/0x2b80 kernel/exit.c:875 do_group_exit+0x21a/0x2d0 kernel/exit.c:1025 get_signal+0x169d/0x1820 kernel/signal.c:2880 arch_do_signal_or_restart+0xb0/0x16f0 arch/x86/kernel/signal.c:871 exit_to_user_mode_loop+0x74/0xa0 kernel/entry/common.c:168 exit_to_user_mode_prepare+0x5a/0xa0 kernel/entry/common.c:204 irqentry_exit_to_user_mode+0x9/0x20 kernel/entry/common.c:310 irqentry_exit+0x12/0x40 kernel/entry/common.c:413 exc_page_fault+0x4f3/0x700 arch/x86/mm/fault.c:1565 asm_exc_page_fault+0x27/0x30 arch/x86/include/asm/idtentry.h:570 RIP: 0033:0x7f078787deb1 Code: Unable to access opcode bytes at 0x7f078787de87. RSP: 002b:00000000000003b0 EFLAGS: 00010217 RAX: 0000000000000000 RBX: 00007f07879abf80 RCX: 00007f078787dea9 RDX: 0000000000000000 RSI: 00000000000003b0 RDI: 0000000075848400 RBP: 00007f07878ca4a4 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 R13: 000000000000000b R14: 00007f07879abf80 R15: 00007fff0705be58