================================================================== BUG: KASAN: wild-memory-access in instrument_atomic_read include/linux/instrumented.h:68 [inline] BUG: KASAN: wild-memory-access in _test_bit include/asm-generic/bitops/instrumented-non-atomic.h:141 [inline] BUG: KASAN: wild-memory-access in __lock_acquire+0xc8b/0x2050 kernel/locking/lockdep.c:5169 Read of size 8 at addr 1fffffff8f1711f0 by task kdevtmpfs/27 CPU: 1 UID: 0 PID: 27 Comm: kdevtmpfs Not tainted 6.11.0-syzkaller-05591-g2a17bb8c204f #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Call Trace: __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:119 print_report+0xe8/0x550 mm/kasan/report.c:491 kasan_report+0x143/0x180 mm/kasan/report.c:601 kasan_check_range+0x282/0x290 mm/kasan/generic.c:189 instrument_atomic_read include/linux/instrumented.h:68 [inline] _test_bit include/asm-generic/bitops/instrumented-non-atomic.h:141 [inline] __lock_acquire+0xc8b/0x2050 kernel/locking/lockdep.c:5169 lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5822 _raw_spin_lock_nested+0x31/0x40 kernel/locking/spinlock.c:378 raw_spin_rq_lock_nested+0xb0/0x140 kernel/sched/core.c:568 raw_spin_rq_lock kernel/sched/sched.h:1415 [inline] rq_lock kernel/sched/sched.h:1714 [inline] __schedule+0x357/0x4a60 kernel/sched/core.c:6436 preempt_schedule_irq+0xfb/0x1c0 kernel/sched/core.c:6851 irqentry_exit+0x5e/0x90 kernel/entry/common.c:354 asm_sysvec_reschedule_ipi+0x1a/0x20 arch/x86/include/asm/idtentry.h:707 RIP: 0010:lock_is_held_type+0x13b/0x190 Code: 75 44 48 c7 04 24 00 00 00 00 9c 8f 04 24 f7 04 24 00 02 00 00 75 4c 41 f7 c4 00 02 00 00 74 01 fb 65 48 8b 04 25 28 00 00 00 <48> 3b 44 24 08 75 42 89 d8 48 83 c4 10 5b 41 5c 41 5d 41 5e 41 5f RSP: 0018:ffffc90000a277d8 EFLAGS: 00000206 RAX: 48e908f3348cc600 RBX: 0000000000000000 RCX: ffff88801d6e5a00 RDX: 0000000000000000 RSI: ffffffff8c0aea00 RDI: ffffffff8c60c080 RBP: 0000000000000002 R08: ffffffff901c022f R09: 1ffffffff2038045 R10: dffffc0000000000 R11: fffffbfff2038046 R12: 0000000000000246 R13: ffff88801d6e5a00 R14: 00000000ffffffff R15: ffffffff8e938bc0 lock_is_held include/linux/lockdep.h:249 [inline] __might_resched+0xa5/0x780 kernel/sched/core.c:8425 might_alloc include/linux/sched/mm.h:337 [inline] slab_pre_alloc_hook mm/slub.c:4037 [inline] slab_alloc_node mm/slub.c:4115 [inline] kmem_cache_alloc_lru_noprof+0x62/0x2b0 mm/slub.c:4154 __d_alloc+0x31/0x700 fs/dcache.c:1636 d_alloc+0x4b/0x190 fs/dcache.c:1716 lookup_one_qstr_excl+0xce/0x260 fs/namei.c:1629 filename_create+0x297/0x540 fs/namei.c:4027 kern_path_create+0x35/0x50 fs/namei.c:4067 handle_create drivers/base/devtmpfs.c:211 [inline] handle drivers/base/devtmpfs.c:384 [inline] devtmpfs_work_loop+0x1ff/0x1040 drivers/base/devtmpfs.c:399 devtmpfsd+0x4c/0x50 drivers/base/devtmpfs.c:441 kthread+0x2f2/0x390 kernel/kthread.c:389 ret_from_fork+0x4d/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 ================================================================== ---------------- Code disassembly (best guess): 0: 75 44 jne 0x46 2: 48 c7 04 24 00 00 00 movq $0x0,(%rsp) 9: 00 a: 9c pushf b: 8f 04 24 pop (%rsp) e: f7 04 24 00 02 00 00 testl $0x200,(%rsp) 15: 75 4c jne 0x63 17: 41 f7 c4 00 02 00 00 test $0x200,%r12d 1e: 74 01 je 0x21 20: fb sti 21: 65 48 8b 04 25 28 00 mov %gs:0x28,%rax 28: 00 00 * 2a: 48 3b 44 24 08 cmp 0x8(%rsp),%rax <-- trapping instruction 2f: 75 42 jne 0x73 31: 89 d8 mov %ebx,%eax 33: 48 83 c4 10 add $0x10,%rsp 37: 5b pop %rbx 38: 41 5c pop %r12 3a: 41 5d pop %r13 3c: 41 5e pop %r14 3e: 41 5f pop %r15