================================================================== BUG: KASAN: wild-memory-access in instrument_atomic_read include/linux/instrumented.h:68 [inline] BUG: KASAN: wild-memory-access in _test_bit include/asm-generic/bitops/instrumented-non-atomic.h:141 [inline] BUG: KASAN: wild-memory-access in __lock_acquire+0xc8b/0x2050 kernel/locking/lockdep.c:5169 Read of size 8 at addr 1fffffff91a78d28 by task dhcpcd-run-hook/13263 CPU: 1 UID: 0 PID: 13263 Comm: dhcpcd-run-hook Not tainted 6.11.0-syzkaller-08829-gaf9c191ac2a0 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120 print_report+0xe8/0x550 mm/kasan/report.c:491 kasan_report+0x143/0x180 mm/kasan/report.c:601 kasan_check_range+0x282/0x290 mm/kasan/generic.c:189 instrument_atomic_read include/linux/instrumented.h:68 [inline] _test_bit include/asm-generic/bitops/instrumented-non-atomic.h:141 [inline] __lock_acquire+0xc8b/0x2050 kernel/locking/lockdep.c:5169 lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5822 _raw_spin_lock_nested+0x31/0x40 kernel/locking/spinlock.c:378 raw_spin_rq_lock_nested+0xb0/0x140 kernel/sched/core.c:601 raw_spin_rq_lock kernel/sched/sched.h:1503 [inline] rq_lock kernel/sched/sched.h:1802 [inline] __schedule+0x357/0x4b30 kernel/sched/core.c:6575 preempt_schedule_common+0x84/0xd0 kernel/sched/core.c:6853 preempt_schedule+0xe1/0xf0 kernel/sched/core.c:6877 preempt_schedule_thunk+0x1a/0x30 arch/x86/entry/thunk.S:12 rcu_read_unlock_sched include/linux/rcupdate.h:964 [inline] pfn_valid include/linux/mmzone.h:2053 [inline] __virt_addr_valid+0x4e6/0x530 arch/x86/mm/physaddr.c:65 kasan_addr_to_slab+0xd/0x80 mm/kasan/common.c:37 __kasan_record_aux_stack+0x11/0xc0 mm/kasan/generic.c:526 __call_rcu_common kernel/rcu/tree.c:3086 [inline] call_rcu+0x167/0xa70 kernel/rcu/tree.c:3190 slab_free_hook mm/slub.c:2307 [inline] slab_free mm/slub.c:4580 [inline] kmem_cache_free+0x2fc/0x420 mm/slub.c:4682 anon_vma_free mm/rmap.c:138 [inline] __put_anon_vma+0x128/0x2d0 mm/rmap.c:2560 put_anon_vma include/linux/rmap.h:116 [inline] unlink_anon_vmas+0x492/0x5f0 mm/rmap.c:445 free_pgtables+0x567/0x840 mm/memory.c:409 exit_mmap+0x48e/0xc40 mm/mmap.c:1871 __mmput+0x115/0x390 kernel/fork.c:1347 exec_mmap+0x680/0x710 fs/exec.c:1014 begin_new_exec+0x12c0/0x2050 fs/exec.c:1280 load_elf_binary+0x966/0x2710 fs/binfmt_elf.c:996 search_binary_handler fs/exec.c:1752 [inline] exec_binprm fs/exec.c:1794 [inline] bprm_execve+0xafa/0x1770 fs/exec.c:1845 do_execveat_common+0x55f/0x6f0 fs/exec.c:1952 do_execve fs/exec.c:2026 [inline] __do_sys_execve fs/exec.c:2102 [inline] __se_sys_execve fs/exec.c:2097 [inline] __x64_sys_execve+0x92/0xb0 fs/exec.c:2097 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fdc18464ef7 Code: Unable to access opcode bytes at 0x7fdc18464ecd. RSP: 002b:00007ffe6c802ab8 EFLAGS: 00000246 ORIG_RAX: 000000000000003b RAX: ffffffffffffffda RBX: 00005565b7332ec8 RCX: 00007fdc18464ef7 RDX: 00005565b7332f08 RSI: 00005565b7332ec8 RDI: 00005565b7332f98 RBP: 00005565b7332f98 R08: 00005565b7332f9d R09: 00007ffe6c807eaf R10: 00007fdc18663088 R11: 0000000000000246 R12: 00005565b7332f08 R13: 00007fdc18612904 R14: 00005565b7332f08 R15: 0000000000000000 ==================================================================