================================================================== BUG: KASAN: wild-memory-access in instrument_atomic_read include/linux/instrumented.h:68 [inline] BUG: KASAN: wild-memory-access in _test_bit include/asm-generic/bitops/instrumented-non-atomic.h:141 [inline] BUG: KASAN: wild-memory-access in __lock_acquire+0xc8b/0x2050 kernel/locking/lockdep.c:5169 Read of size 8 at addr 1fffffff91a78d28 by task syz-executor/8164 CPU: 1 UID: 0 PID: 8164 Comm: syz-executor Not tainted 6.11.0-syzkaller-08829-gaf9c191ac2a0 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120 print_report+0xe8/0x550 mm/kasan/report.c:491 kasan_report+0x143/0x180 mm/kasan/report.c:601 kasan_check_range+0x282/0x290 mm/kasan/generic.c:189 instrument_atomic_read include/linux/instrumented.h:68 [inline] _test_bit include/asm-generic/bitops/instrumented-non-atomic.h:141 [inline] __lock_acquire+0xc8b/0x2050 kernel/locking/lockdep.c:5169 lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5822 _raw_spin_lock_nested+0x31/0x40 kernel/locking/spinlock.c:378 raw_spin_rq_lock_nested+0xb0/0x140 kernel/sched/core.c:601 raw_spin_rq_lock kernel/sched/sched.h:1503 [inline] rq_lock kernel/sched/sched.h:1802 [inline] __schedule+0x357/0x4b30 kernel/sched/core.c:6575 preempt_schedule_irq+0xfb/0x1c0 kernel/sched/core.c:6996 irqentry_exit+0x5e/0x90 kernel/entry/common.c:354 asm_sysvec_reschedule_ipi+0x1a/0x20 arch/x86/include/asm/idtentry.h:707 RIP: 0010:do_nanosleep+0x96/0x600 Code: 89 4c 24 18 4a 89 04 31 e8 c7 e9 c8 f5 48 8d 05 00 00 00 00 48 89 44 24 40 65 4c 8b 24 25 c0 d7 03 00 49 8d 8c 24 68 17 00 00 <49> 8d 5c 24 18 49 8d 47 20 48 89 44 24 58 49 8d 47 18 48 89 44 24 RSP: 0018:ffffc9000373fc20 EFLAGS: 00000293 RAX: ffffffff8bcbcff0 RBX: 000000000000c350 RCX: ffff888025bb9768 RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffffc9000373fd60 RBP: ffffc9000373fd10 R08: ffffffff81822060 R09: ffffc9000373fd60 R10: dffffc0000000000 R11: fffff520006e7fb4 R12: ffff888025bb8000 R13: 0000000000000001 R14: dffffc0000000000 R15: ffffc9000373fd60 hrtimer_nanosleep+0x1e3/0x3f0 kernel/time/hrtimer.c:2080 __do_sys_clock_nanosleep kernel/time/posix-timers.c:1411 [inline] __se_sys_clock_nanosleep+0x32d/0x3c0 kernel/time/posix-timers.c:1388 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7feaa07affe5 Code: 24 0c 89 3c 24 48 89 4c 24 18 e8 c6 57 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 8b 74 24 0c 8b 3c 24 b8 e6 00 00 00 0f 05 <44> 89 c7 48 89 04 24 e8 1f 58 ff ff 48 8b 04 24 48 83 c4 28 f7 d8 RSP: 002b:00007ffe140d78d0 EFLAGS: 00000293 ORIG_RAX: 00000000000000e6 RAX: ffffffffffffffda RBX: 000000000000008c RCX: 00007feaa07affe5 RDX: 00007ffe140d7910 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 00007ffe140d796c R08: 0000000000000000 R09: 7fffffffffffffff R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000032 R13: 000000000009570c R14: 000000000009561e R15: 00007ffe140d79c0 ================================================================== ---------------- Code disassembly (best guess): 0: 89 4c 24 18 mov %ecx,0x18(%rsp) 4: 4a 89 04 31 mov %rax,(%rcx,%r14,1) 8: e8 c7 e9 c8 f5 call 0xf5c8e9d4 d: 48 8d 05 00 00 00 00 lea 0x0(%rip),%rax # 0x14 14: 48 89 44 24 40 mov %rax,0x40(%rsp) 19: 65 4c 8b 24 25 c0 d7 mov %gs:0x3d7c0,%r12 20: 03 00 22: 49 8d 8c 24 68 17 00 lea 0x1768(%r12),%rcx 29: 00 * 2a: 49 8d 5c 24 18 lea 0x18(%r12),%rbx <-- trapping instruction 2f: 49 8d 47 20 lea 0x20(%r15),%rax 33: 48 89 44 24 58 mov %rax,0x58(%rsp) 38: 49 8d 47 18 lea 0x18(%r15),%rax 3c: 48 rex.W 3d: 89 .byte 0x89 3e: 44 rex.R 3f: 24 .byte 0x24