================================================================== BUG: KASAN: wild-memory-access in instrument_atomic_read include/linux/instrumented.h:68 [inline] BUG: KASAN: wild-memory-access in _test_bit include/asm-generic/bitops/instrumented-non-atomic.h:141 [inline] BUG: KASAN: wild-memory-access in __lock_acquire+0xc8b/0x2040 kernel/locking/lockdep.c:5112 Read of size 8 at addr 1fffffff8dc93498 by task kcompactd0/33 CPU: 1 UID: 0 PID: 33 Comm: kcompactd0 Not tainted 6.11.0-rc7-syzkaller-00039-g77f587896757 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call Trace: __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:119 print_report+0xe8/0x550 mm/kasan/report.c:491 kasan_report+0x143/0x180 mm/kasan/report.c:601 kasan_check_range+0x282/0x290 mm/kasan/generic.c:189 instrument_atomic_read include/linux/instrumented.h:68 [inline] _test_bit include/asm-generic/bitops/instrumented-non-atomic.h:141 [inline] __lock_acquire+0xc8b/0x2040 kernel/locking/lockdep.c:5112 lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5759 _raw_spin_lock_nested+0x31/0x40 kernel/locking/spinlock.c:378 raw_spin_rq_lock_nested+0xb0/0x140 kernel/sched/core.c:568 raw_spin_rq_lock kernel/sched/sched.h:1415 [inline] rq_lock kernel/sched/sched.h:1714 [inline] __schedule+0x357/0x4a60 kernel/sched/core.c:6436 preempt_schedule_irq+0xfb/0x1c0 kernel/sched/core.c:6851 irqentry_exit+0x5e/0x90 kernel/entry/common.c:354 asm_sysvec_reschedule_ipi+0x1a/0x20 arch/x86/include/asm/idtentry.h:707 RIP: 0010:extfrag_for_order+0x4/0x120 mm/vmstat.c:1138 Code: 48 01 1d bf 1a 60 18 5b e9 24 64 17 0a 66 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 66 0f 1f 00 <55> 41 57 41 56 41 55 41 54 53 48 83 ec 28 49 89 fd 89 f0 48 89 44 RSP: 0018:ffffc90000a97b60 EFLAGS: 00000293 RAX: ffffffff81dcc612 RBX: ffff88813fffa0a0 RCX: ffff888020ec3c00 RDX: 0000000000000000 RSI: 0000000000000009 RDI: ffff88813fffa000 RBP: dffffc0000000000 R08: ffffffff81dcc608 R09: 1ffff92000152f64 R10: dffffc0000000000 R11: fffff52000152f65 R12: 0000000000000f9e R13: dffffc0000000000 R14: 0000000000000000 R15: ffff88813fffa000 fragmentation_score_zone mm/compaction.c:2232 [inline] fragmentation_score_zone_weighted mm/compaction.c:2249 [inline] fragmentation_score_node+0x5f/0x340 mm/compaction.c:2271 should_proactive_compact_node mm/compaction.c:2298 [inline] kcompactd+0x75f/0x1530 mm/compaction.c:3229 kthread+0x2f2/0x390 kernel/kthread.c:389 ret_from_fork+0x4d/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 ================================================================== ---------------- Code disassembly (best guess): 0: 48 01 1d bf 1a 60 18 add %rbx,0x18601abf(%rip) # 0x18601ac6 7: 5b pop %rbx 8: e9 24 64 17 0a jmp 0xa176431 d: 66 0f 1f 84 00 00 00 nopw 0x0(%rax,%rax,1) 14: 00 00 16: 90 nop 17: 90 nop 18: 90 nop 19: 90 nop 1a: 90 nop 1b: 90 nop 1c: 90 nop 1d: 90 nop 1e: 90 nop 1f: 90 nop 20: 90 nop 21: 90 nop 22: 90 nop 23: 90 nop 24: 90 nop 25: 90 nop 26: 66 0f 1f 00 nopw (%rax) * 2a: 55 push %rbp <-- trapping instruction 2b: 41 57 push %r15 2d: 41 56 push %r14 2f: 41 55 push %r13 31: 41 54 push %r12 33: 53 push %rbx 34: 48 83 ec 28 sub $0x28,%rsp 38: 49 89 fd mov %rdi,%r13 3b: 89 f0 mov %esi,%eax 3d: 48 rex.W 3e: 89 .byte 0x89 3f: 44 rex.R