================================================================== BUG: KASAN: wild-memory-access in instrument_atomic_read include/linux/instrumented.h:68 [inline] BUG: KASAN: wild-memory-access in _test_bit include/asm-generic/bitops/instrumented-non-atomic.h:141 [inline] BUG: KASAN: wild-memory-access in node_state include/linux/nodemask.h:429 [inline] BUG: KASAN: wild-memory-access in get_futex_key+0x595/0x1540 kernel/futex/core.c:587 Read of size 8 at addr 1fffffff818b9088 by task syz-executor279/5827 CPU: 1 UID: 0 PID: 5827 Comm: syz-executor279 Not tainted 6.15.0-syzkaller-01958-g785cdec46e92 #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120 kasan_report+0xe0/0x110 mm/kasan/report.c:634 check_region_inline mm/kasan/generic.c:183 [inline] kasan_check_range+0x100/0x1b0 mm/kasan/generic.c:189 instrument_atomic_read include/linux/instrumented.h:68 [inline] _test_bit include/asm-generic/bitops/instrumented-non-atomic.h:141 [inline] node_state include/linux/nodemask.h:429 [inline] get_futex_key+0x595/0x1540 kernel/futex/core.c:587 futex_wake+0xea/0x530 kernel/futex/waitwake.c:165 __do_sys_futex_wake kernel/futex/syscalls.c:354 [inline] __se_sys_futex_wake kernel/futex/syscalls.c:338 [inline] __x64_sys_futex_wake+0x23d/0x2b0 kernel/futex/syscalls.c:338 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xcd/0x230 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f669aea9ab9 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 c1 17 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffda08b56f8 EFLAGS: 00000246 ORIG_RAX: 00000000000001c6 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f669aea9ab9 RDX: 0000000000000006 RSI: 0000000000000008 RDI: 0000200000000140 RBP: 00007f669af1c5f0 R08: 0000000000000006 R09: 0000000000000006 R10: 0000000000000006 R11: 0000000000000246 R12: 0000000000000001 R13: 431bde82d7b634db R14: 0000000000000001 R15: 0000000000000001 ==================================================================