================================================================== BUG: KASAN: wild-memory-access in instrument_atomic_read include/linux/instrumented.h:68 [inline] BUG: KASAN: wild-memory-access in _test_bit include/asm-generic/bitops/instrumented-non-atomic.h:141 [inline] BUG: KASAN: wild-memory-access in __lock_acquire+0xc8b/0x2040 kernel/locking/lockdep.c:5112 Read of size 8 at addr 1fffffff92d69a30 by task kcompactd0/33 CPU: 1 UID: 0 PID: 33 Comm: kcompactd0 Not tainted 6.11.0-rc7-syzkaller-00021-g7c6a3a65ace7 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call Trace: __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:119 print_report+0xe8/0x550 mm/kasan/report.c:491 kasan_report+0x143/0x180 mm/kasan/report.c:601 kasan_check_range+0x282/0x290 mm/kasan/generic.c:189 instrument_atomic_read include/linux/instrumented.h:68 [inline] _test_bit include/asm-generic/bitops/instrumented-non-atomic.h:141 [inline] __lock_acquire+0xc8b/0x2040 kernel/locking/lockdep.c:5112 lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5759 _raw_spin_lock_nested+0x31/0x40 kernel/locking/spinlock.c:378 raw_spin_rq_lock_nested+0xb0/0x140 kernel/sched/core.c:568 raw_spin_rq_lock kernel/sched/sched.h:1415 [inline] rq_lock kernel/sched/sched.h:1714 [inline] __schedule+0x357/0x4a60 kernel/sched/core.c:6436 preempt_schedule_irq+0xfb/0x1c0 kernel/sched/core.c:6851 irqentry_exit+0x5e/0x90 kernel/entry/common.c:354 asm_sysvec_reschedule_ipi+0x1a/0x20 arch/x86/include/asm/idtentry.h:707 RIP: 0010:resched_offsets_ok kernel/sched/core.c:8412 [inline] RIP: 0010:__might_resched+0x16c/0x780 kernel/sched/core.c:8427 Code: 44 04 00 00 4c 89 e8 48 c1 e8 03 48 ba 00 00 00 00 00 fc ff df 48 89 44 24 38 0f b6 04 10 84 c0 0f 85 87 04 00 00 41 8b 45 00 e0 08 01 d8 44 39 e0 0f 85 d6 00 00 00 44 89 64 24 1c 48 8d bc RSP: 0018:ffffc90000a97920 EFLAGS: 00000246 RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffff888020ae9e00 RDX: dffffc0000000000 RSI: ffff888020ae9e00 RDI: ffffffff8c608f40 RBP: ffffc90000a97a30 R08: ffffc90000a97b07 R09: ffffc90000a97ae0 R10: dffffc0000000000 R11: fffff52000152f61 R12: 0000000000000000 R13: ffff888020aea244 R14: 0000000000000249 R15: 1ffff92000152f2c __mutex_lock_common kernel/locking/mutex.c:585 [inline] __mutex_lock+0xc1/0xd70 kernel/locking/mutex.c:752 pgdat_kswapd_lock include/linux/memory_hotplug.h:232 [inline] kswapd_is_running mm/compaction.c:2219 [inline] should_proactive_compact_node mm/compaction.c:2294 [inline] kcompactd+0x4ed/0x1530 mm/compaction.c:3229 kthread+0x2f2/0x390 kernel/kthread.c:389 ret_from_fork+0x4d/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 ================================================================== ---------------- Code disassembly (best guess): 0: 44 04 00 rex.R add $0x0,%al 3: 00 4c 89 e8 add %cl,-0x18(%rcx,%rcx,4) 7: 48 c1 e8 03 shr $0x3,%rax b: 48 ba 00 00 00 00 00 movabs $0xdffffc0000000000,%rdx 12: fc ff df 15: 48 89 44 24 38 mov %rax,0x38(%rsp) 1a: 0f b6 04 10 movzbl (%rax,%rdx,1),%eax 1e: 84 c0 test %al,%al 20: 0f 85 87 04 00 00 jne 0x4ad 26: 41 8b 45 00 mov 0x0(%r13),%eax * 2a: c1 e0 08 shl $0x8,%eax <-- trapping instruction 2d: 01 d8 add %ebx,%eax 2f: 44 39 e0 cmp %r12d,%eax 32: 0f 85 d6 00 00 00 jne 0x10e 38: 44 89 64 24 1c mov %r12d,0x1c(%rsp) 3d: 48 rex.W 3e: 8d .byte 0x8d 3f: bc .byte 0xbc