================================================================== BUG: KASAN: wild-memory-access in instrument_atomic_read include/linux/instrumented.h:68 [inline] BUG: KASAN: wild-memory-access in _test_bit include/asm-generic/bitops/instrumented-non-atomic.h:141 [inline] BUG: KASAN: wild-memory-access in __lock_acquire+0xc8b/0x2050 kernel/locking/lockdep.c:5172 Read of size 8 at addr 1fffffff87715c68 by task syz-executor/5847 CPU: 1 UID: 0 PID: 5847 Comm: syz-executor Not tainted 6.12.0-rc6-syzkaller-00272-gda4373fbcf00 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120 print_report+0xe8/0x550 mm/kasan/report.c:491 kasan_report+0x143/0x180 mm/kasan/report.c:601 kasan_check_range+0x282/0x290 mm/kasan/generic.c:189 instrument_atomic_read include/linux/instrumented.h:68 [inline] _test_bit include/asm-generic/bitops/instrumented-non-atomic.h:141 [inline] __lock_acquire+0xc8b/0x2050 kernel/locking/lockdep.c:5172 lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5825 _raw_spin_lock_nested+0x31/0x40 kernel/locking/spinlock.c:378 raw_spin_rq_lock_nested+0x2a/0x140 kernel/sched/core.c:598 raw_spin_rq_lock kernel/sched/sched.h:1505 [inline] rq_lock kernel/sched/sched.h:1804 [inline] ttwu_queue kernel/sched/core.c:3951 [inline] try_to_wake_up+0x81e/0x14b0 kernel/sched/core.c:4281 signal_wake_up_state+0xb4/0x120 kernel/signal.c:771 signal_wake_up include/linux/sched/signal.h:447 [inline] complete_signal+0xb36/0xcf0 kernel/signal.c:1053 __send_signal_locked+0xb1b/0xdc0 kernel/signal.c:1183 do_send_sig_info kernel/signal.c:1299 [inline] group_send_sig_info+0x292/0x310 kernel/signal.c:1449 zap_pid_ns_processes+0x2a6/0x6f0 kernel/pid_namespace.c:209 find_child_reaper kernel/exit.c:612 [inline] forget_original_parent kernel/exit.c:701 [inline] exit_notify kernel/exit.c:738 [inline] do_exit+0x2413/0x28e0 kernel/exit.c:959 do_group_exit+0x207/0x2c0 kernel/exit.c:1088 get_signal+0x16a3/0x1740 kernel/signal.c:2917 arch_do_signal_or_restart+0x96/0x860 arch/x86/kernel/signal.c:337 exit_to_user_mode_loop kernel/entry/common.c:111 [inline] exit_to_user_mode_prepare include/linux/entry-common.h:328 [inline] __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline] syscall_exit_to_user_mode+0xc9/0x370 kernel/entry/common.c:218 do_syscall_64+0x100/0x230 arch/x86/entry/common.c:89 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7efe87d74997 Code: Unable to access opcode bytes at 0x7efe87d7496d. RSP: 002b:00007ffc136fbc00 EFLAGS: 00000293 ORIG_RAX: 000000000000003d RAX: fffffffffffffe00 RBX: 0000000000000245 RCX: 00007efe87d74997 RDX: 0000000040000000 RSI: 00007ffc136fbc5c RDI: 00000000ffffffff RBP: 00007ffc136fbc5c R08: 0000000000000000 R09: 7fffffffffffffff R10: 0000000000000000 R11: 0000000000000293 R12: 0000555575d4f5eb R13: 0000555575d4f590 R14: 000000000007c189 R15: 00007ffc136fbcb0 ==================================================================