BUG: sleeping function called from invalid context at mm/migrate.c:1432 in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 31, name: kcompactd0 preempt_count: 1, expected: 0 RCU nest depth: 0, expected: 0 no locks held by kcompactd0/31. Preemption disabled at: [] free_unref_page+0x1e5/0x440 CPU: 0 PID: 31 Comm: kcompactd0 Not tainted 5.19.0-rc2-next-20220615 #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 Call Trace: dump_stack_lvl+0x8b/0xb3 __might_resched.cold+0x222/0x26b migrate_pages+0x2a5/0x49a0 compact_zone+0x1a93/0x3600 kcompactd_do_work+0x45e/0x9d0 kcompactd+0xb14/0xe00 kthread+0x2f2/0x3b0 ret_from_fork+0x22/0x30 BUG: scheduling while atomic: kcompactd0/31/0x00000005 no locks held by kcompactd0/31. Modules linked in: Preemption disabled at: [] free_unref_page+0x1e5/0x440 CPU: 0 PID: 31 Comm: kcompactd0 Tainted: G W 5.19.0-rc2-next-20220615 #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 Call Trace: dump_stack_lvl+0x8b/0xb3 __schedule_bug.cold+0x133/0x143 __schedule+0x18e6/0x2470 schedule+0xd2/0x1f0 schedule_timeout+0x143/0x280 kcompactd+0x97f/0xe00 kthread+0x2f2/0x3b0 ret_from_fork+0x22/0x30 syz-executor.4 calls setitimer() with new_value NULL pointer. Misfeature support will be removed device syz_tun entered promiscuous mode device syz_tun left promiscuous mode devpts: called with bogus options audit: type=1400 audit(1655291500.766:60): avc: denied { create } for pid=20380 comm="syz-executor.7" name="file1" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:autofs_device_t:s0 tclass=file permissive=1 audit: type=1400 audit(1655291500.767:61): avc: denied { read write open } for pid=20380 comm="syz-executor.7" path="/syzkaller-testdir112069723/syzkaller.yLFzPq/321/file1" dev="sda" ino=16059 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:autofs_device_t:s0 tclass=file permissive=1 audit: type=1400 audit(1655291500.959:62): avc: denied { getattr } for pid=302 comm="syz-executor.7" path="/syzkaller-testdir112069723/syzkaller.yLFzPq/321/file1" dev="sda" ino=16059 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:autofs_device_t:s0 tclass=file permissive=1 audit: type=1400 audit(1655291500.960:63): avc: denied { unlink } for pid=302 comm="syz-executor.7" name="file1" dev="sda" ino=16059 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:autofs_device_t:s0 tclass=file permissive=1 9pnet_fd: Insufficient options for proto=fd 9pnet_fd: Insufficient options for proto=fd