================================================================== BUG: KASAN: wild-memory-access in instrument_atomic_read include/linux/instrumented.h:68 [inline] BUG: KASAN: wild-memory-access in _test_bit include/asm-generic/bitops/instrumented-non-atomic.h:141 [inline] BUG: KASAN: wild-memory-access in __lock_acquire+0xc8b/0x2040 kernel/locking/lockdep.c:5112 Read of size 8 at addr 1fffffff8dc93498 by task rcu_exp_gp_kthr/19 CPU: 0 UID: 0 PID: 19 Comm: rcu_exp_gp_kthr Not tainted 6.11.0-rc7-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call Trace: __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:119 print_report+0xe8/0x550 mm/kasan/report.c:491 kasan_report+0x143/0x180 mm/kasan/report.c:601 kasan_check_range+0x282/0x290 mm/kasan/generic.c:189 instrument_atomic_read include/linux/instrumented.h:68 [inline] _test_bit include/asm-generic/bitops/instrumented-non-atomic.h:141 [inline] __lock_acquire+0xc8b/0x2040 kernel/locking/lockdep.c:5112 lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5759 _raw_spin_lock_nested+0x31/0x40 kernel/locking/spinlock.c:378 raw_spin_rq_lock_nested+0xb0/0x140 kernel/sched/core.c:568 raw_spin_rq_lock kernel/sched/sched.h:1415 [inline] rq_lock kernel/sched/sched.h:1714 [inline] __schedule+0x357/0x4a60 kernel/sched/core.c:6436 preempt_schedule_irq+0xfb/0x1c0 kernel/sched/core.c:6851 irqentry_exit+0x5e/0x90 kernel/entry/common.c:354 asm_sysvec_reschedule_ipi+0x1a/0x20 arch/x86/include/asm/idtentry.h:707 RIP: 0010:check_kcov_mode kernel/kcov.c:193 [inline] RIP: 0010:__sanitizer_cov_trace_pc+0x37/0x70 kernel/kcov.c:216 Code: 00 d7 03 00 65 8b 15 40 4a 70 7e 81 e2 00 01 ff 00 74 11 81 fa 00 01 00 00 75 35 83 b9 1c 16 00 00 00 74 2c 8b 91 f8 15 00 00 <83> fa 02 75 21 48 8b 91 00 16 00 00 48 8b 32 48 8d 7e 01 8b 89 fc RSP: 0018:ffffc90000187c60 EFLAGS: 00000246 RAX: ffffffff817f8b4c RBX: 0000000000005208 RCX: ffff88801d6dbc00 RDX: 0000000000000000 RSI: ffffffff8c0ad540 RDI: 0000000000005208 RBP: ffffc90000187e18 R08: ffffffff9018772f R09: 1ffffffff2030ee5 R10: dffffc0000000000 R11: fffffbfff2030ee6 R12: ffffc90000187d80 R13: dffffc0000000000 R14: ffffffff8e93d8b8 R15: dffffc0000000000 __msecs_to_jiffies+0xc/0x50 kernel/time/time.c:572 msecs_to_jiffies include/linux/jiffies.h:525 [inline] rcu_exp_jiffies_till_stall_check+0xa2/0x1c0 kernel/rcu/tree_stall.h:43 synchronize_rcu_expedited_wait kernel/rcu/tree_exp.h:563 [inline] rcu_exp_wait_wake kernel/rcu/tree_exp.h:660 [inline] rcu_exp_sel_wait_wake+0x573/0x1db0 kernel/rcu/tree_exp.h:694 kthread_worker_fn+0x502/0xaf0 kernel/kthread.c:842 kthread+0x2f2/0x390 kernel/kthread.c:389 ret_from_fork+0x4d/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 ================================================================== ---------------- Code disassembly (best guess): 0: 00 d7 add %dl,%bh 2: 03 00 add (%rax),%eax 4: 65 8b 15 40 4a 70 7e mov %gs:0x7e704a40(%rip),%edx # 0x7e704a4b b: 81 e2 00 01 ff 00 and $0xff0100,%edx 11: 74 11 je 0x24 13: 81 fa 00 01 00 00 cmp $0x100,%edx 19: 75 35 jne 0x50 1b: 83 b9 1c 16 00 00 00 cmpl $0x0,0x161c(%rcx) 22: 74 2c je 0x50 24: 8b 91 f8 15 00 00 mov 0x15f8(%rcx),%edx * 2a: 83 fa 02 cmp $0x2,%edx <-- trapping instruction 2d: 75 21 jne 0x50 2f: 48 8b 91 00 16 00 00 mov 0x1600(%rcx),%rdx 36: 48 8b 32 mov (%rdx),%rsi 39: 48 8d 7e 01 lea 0x1(%rsi),%rdi 3d: 8b .byte 0x8b 3e: 89 fc mov %edi,%esp