INFO: trying to register non-static key. The code is fine but needs lockdep annotation, or maybe you didn't initialize this object before use? turning off the locking correctness validator. CPU: 1 PID: 3250 Comm: syz-executor.1 Not tainted 5.16.0-rc6-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 assign_lock_key kernel/locking/lockdep.c:951 [inline] register_lock_class+0xf79/0x10c0 kernel/locking/lockdep.c:1263 __lock_acquire+0x105/0x54a0 kernel/locking/lockdep.c:4906 lock_acquire kernel/locking/lockdep.c:5637 [inline] lock_acquire+0x1ab/0x510 kernel/locking/lockdep.c:5602 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline] _raw_spin_lock_irqsave+0x39/0x50 kernel/locking/spinlock.c:162 skb_queue_tail+0x21/0x140 net/core/skbuff.c:3319 ath9k_htc_txep+0x287/0x400 drivers/net/wireless/ath/ath9k/htc_drv_txrx.c:712 ath9k_htc_txcompletion_cb+0x1cd/0x2f0 drivers/net/wireless/ath/ath9k/htc_hst.c:348 hif_usb_regout_cb+0x115/0x1c0 drivers/net/wireless/ath/ath9k/hif_usb.c:90 __usb_hcd_giveback_urb+0x2b0/0x5c0 drivers/usb/core/hcd.c:1656 usb_hcd_giveback_urb+0x367/0x410 drivers/usb/core/hcd.c:1726 dummy_timer+0x11f9/0x32b0 drivers/usb/gadget/udc/dummy_hcd.c:1987 call_timer_fn+0x1a5/0x6b0 kernel/time/timer.c:1421 expire_timers kernel/time/timer.c:1466 [inline] __run_timers.part.0+0x675/0xa20 kernel/time/timer.c:1734 __run_timers kernel/time/timer.c:1715 [inline] run_timer_softirq+0xb3/0x1d0 kernel/time/timer.c:1747 __do_softirq+0x288/0x9a5 kernel/softirq.c:558 invoke_softirq kernel/softirq.c:432 [inline] __irq_exit_rcu+0x113/0x170 kernel/softirq.c:637 irq_exit_rcu+0x5/0x20 kernel/softirq.c:649 sysvec_apic_timer_interrupt+0x8e/0xc0 arch/x86/kernel/apic/apic.c:1097 asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:638 RIP: 0010:__sanitizer_cov_trace_pc+0x37/0x60 kernel/kcov.c:200 Code: 81 e1 00 01 00 00 65 48 8b 14 25 80 6f 02 00 a9 00 01 ff 00 74 0e 85 c9 74 35 8b 82 bc 14 00 00 85 c0 74 2b 8b 82 98 14 00 00 <83> f8 02 75 20 48 8b 8a a0 14 00 00 8b 92 9c 14 00 00 48 8b 01 48 RSP: 0018:ffffc900029af718 EFLAGS: 00000246 RAX: 0000000000000000 RBX: 000000000012a8c3 RCX: 0000000000000000 RDX: ffff88810a7ab800 RSI: ffffffff81647aee RDI: 0000000000000003 RBP: 1ffff92000535ee5 R08: 0000000000000000 R09: ffff88810a7ab807 R10: ffffffff81647ad8 R11: 0000000000000000 R12: ffff888119420b00 R13: 00007f04daea2000 R14: 800000012a8c3007 R15: 0000000000000000 vm_normal_page+0xde/0x2a0 mm/memory.c:650 zap_pte_range mm/memory.c:1338 [inline] zap_pmd_range mm/memory.c:1467 [inline] zap_pud_range mm/memory.c:1496 [inline] zap_p4d_range mm/memory.c:1517 [inline] unmap_page_range+0x865/0x1c30 mm/memory.c:1538 unmap_single_vma+0x198/0x310 mm/memory.c:1583 unmap_vmas+0x16b/0x2f0 mm/memory.c:1615 exit_mmap+0x1d0/0x630 mm/mmap.c:3170 __mmput kernel/fork.c:1113 [inline] mmput+0xcc/0x410 kernel/fork.c:1134 exit_mm kernel/exit.c:507 [inline] do_exit+0xb27/0x2a40 kernel/exit.c:819 do_group_exit+0x125/0x310 kernel/exit.c:929 get_signal+0x47d/0x2220 kernel/signal.c:2852 arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868 handle_signal_work kernel/entry/common.c:148 [inline] exit_to_user_mode_loop kernel/entry/common.c:172 [inline] exit_to_user_mode_prepare+0x16c/0x230 kernel/entry/common.c:207 __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline] syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300 do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f04db6b5bc1 Code: Unable to access opcode bytes at RIP 0x7f04db6b5b97. RSP: 002b:00007ffe9187f8d0 EFLAGS: 00000293 ORIG_RAX: 00000000000000e6 RAX: fffffffffffffdfc RBX: 00007f04db7a3f60 RCX: 00007f04db6b5bc1 RDX: 00007ffe9187f910 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 00007f04db7a5960 R08: 0000000000000000 R09: 00007ffe91928080 R10: 0000000000000000 R11: 0000000000000293 R12: 00000000002579ad R13: 00007ffe9187fa20 R14: 00007f04db7a4030 R15: 000000000000015e general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] CPU: 1 PID: 3250 Comm: syz-executor.1 Not tainted 5.16.0-rc6-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:__skb_insert include/linux/skbuff.h:1979 [inline] RIP: 0010:__skb_queue_before include/linux/skbuff.h:2085 [inline] RIP: 0010:__skb_queue_tail include/linux/skbuff.h:2118 [inline] RIP: 0010:skb_queue_tail+0x9e/0x140 net/core/skbuff.c:3320 Code: 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 80 00 00 00 4c 89 e2 4c 89 65 08 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 48 89 6b 08 <80> 3c 02 00 75 4f 48 8d 7b 10 49 89 2c 24 48 b8 00 00 00 00 00 fc RSP: 0018:ffffc900001589d8 EFLAGS: 00010046 RAX: dffffc0000000000 RBX: ffff888111233770 RCX: ffffffff8129c8b0 RDX: 0000000000000000 RSI: 0000000000000012 RDI: ffff88810bd58dc8 RBP: ffff88810bd58dc0 R08: 0000000000000001 R09: 0000000000000003 R10: fffff5200002b129 R11: 0000000000000000 R12: 0000000000000000 R13: ffff888111233788 R14: 0000000100034997 R15: ffffffff83123ff0 FS: 0000000000000000(0000) GS:ffff8881f6900000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ffff5515d28 CR3: 000000012cc9f000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: ath9k_htc_txep+0x287/0x400 drivers/net/wireless/ath/ath9k/htc_drv_txrx.c:712 ath9k_htc_txcompletion_cb+0x1cd/0x2f0 drivers/net/wireless/ath/ath9k/htc_hst.c:348 hif_usb_regout_cb+0x115/0x1c0 drivers/net/wireless/ath/ath9k/hif_usb.c:90 __usb_hcd_giveback_urb+0x2b0/0x5c0 drivers/usb/core/hcd.c:1656 usb_hcd_giveback_urb+0x367/0x410 drivers/usb/core/hcd.c:1726 dummy_timer+0x11f9/0x32b0 drivers/usb/gadget/udc/dummy_hcd.c:1987 call_timer_fn+0x1a5/0x6b0 kernel/time/timer.c:1421 expire_timers kernel/time/timer.c:1466 [inline] __run_timers.part.0+0x675/0xa20 kernel/time/timer.c:1734 __run_timers kernel/time/timer.c:1715 [inline] run_timer_softirq+0xb3/0x1d0 kernel/time/timer.c:1747 __do_softirq+0x288/0x9a5 kernel/softirq.c:558 invoke_softirq kernel/softirq.c:432 [inline] __irq_exit_rcu+0x113/0x170 kernel/softirq.c:637 irq_exit_rcu+0x5/0x20 kernel/softirq.c:649 sysvec_apic_timer_interrupt+0x8e/0xc0 arch/x86/kernel/apic/apic.c:1097 asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:638 RIP: 0010:__sanitizer_cov_trace_pc+0x37/0x60 kernel/kcov.c:200 Code: 81 e1 00 01 00 00 65 48 8b 14 25 80 6f 02 00 a9 00 01 ff 00 74 0e 85 c9 74 35 8b 82 bc 14 00 00 85 c0 74 2b 8b 82 98 14 00 00 <83> f8 02 75 20 48 8b 8a a0 14 00 00 8b 92 9c 14 00 00 48 8b 01 48 RSP: 0018:ffffc900029af718 EFLAGS: 00000246 RAX: 0000000000000000 RBX: 000000000012a8c3 RCX: 0000000000000000 RDX: ffff88810a7ab800 RSI: ffffffff81647aee RDI: 0000000000000003 RBP: 1ffff92000535ee5 R08: 0000000000000000 R09: ffff88810a7ab807 R10: ffffffff81647ad8 R11: 0000000000000000 R12: ffff888119420b00 R13: 00007f04daea2000 R14: 800000012a8c3007 R15: 0000000000000000 vm_normal_page+0xde/0x2a0 mm/memory.c:650 zap_pte_range mm/memory.c:1338 [inline] zap_pmd_range mm/memory.c:1467 [inline] zap_pud_range mm/memory.c:1496 [inline] zap_p4d_range mm/memory.c:1517 [inline] unmap_page_range+0x865/0x1c30 mm/memory.c:1538 unmap_single_vma+0x198/0x310 mm/memory.c:1583 unmap_vmas+0x16b/0x2f0 mm/memory.c:1615 exit_mmap+0x1d0/0x630 mm/mmap.c:3170 __mmput kernel/fork.c:1113 [inline] mmput+0xcc/0x410 kernel/fork.c:1134 exit_mm kernel/exit.c:507 [inline] do_exit+0xb27/0x2a40 kernel/exit.c:819 do_group_exit+0x125/0x310 kernel/exit.c:929 get_signal+0x47d/0x2220 kernel/signal.c:2852 arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868 handle_signal_work kernel/entry/common.c:148 [inline] exit_to_user_mode_loop kernel/entry/common.c:172 [inline] exit_to_user_mode_prepare+0x16c/0x230 kernel/entry/common.c:207 __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline] syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300 do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f04db6b5bc1 Code: Unable to access opcode bytes at RIP 0x7f04db6b5b97. RSP: 002b:00007ffe9187f8d0 EFLAGS: 00000293 ORIG_RAX: 00000000000000e6 RAX: fffffffffffffdfc RBX: 00007f04db7a3f60 RCX: 00007f04db6b5bc1 RDX: 00007ffe9187f910 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 00007f04db7a5960 R08: 0000000000000000 R09: 00007ffe91928080 R10: 0000000000000000 R11: 0000000000000293 R12: 00000000002579ad R13: 00007ffe9187fa20 R14: 00007f04db7a4030 R15: 000000000000015e Modules linked in: ---[ end trace 2be0d679b73f4de1 ]--- RIP: 0010:__skb_insert include/linux/skbuff.h:1979 [inline] RIP: 0010:__skb_queue_before include/linux/skbuff.h:2085 [inline] RIP: 0010:__skb_queue_tail include/linux/skbuff.h:2118 [inline] RIP: 0010:skb_queue_tail+0x9e/0x140 net/core/skbuff.c:3320 Code: 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 80 00 00 00 4c 89 e2 4c 89 65 08 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 48 89 6b 08 <80> 3c 02 00 75 4f 48 8d 7b 10 49 89 2c 24 48 b8 00 00 00 00 00 fc RSP: 0018:ffffc900001589d8 EFLAGS: 00010046 RAX: dffffc0000000000 RBX: ffff888111233770 RCX: ffffffff8129c8b0 RDX: 0000000000000000 RSI: 0000000000000012 RDI: ffff88810bd58dc8 RBP: ffff88810bd58dc0 R08: 0000000000000001 R09: 0000000000000003 R10: fffff5200002b129 R11: 0000000000000000 R12: 0000000000000000 R13: ffff888111233788 R14: 0000000100034997 R15: ffffffff83123ff0 FS: 0000000000000000(0000) GS:ffff8881f6900000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ffff5515d28 CR3: 000000012cc9f000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 81 e1 00 01 00 00 and $0x100,%ecx 6: 65 48 8b 14 25 80 6f mov %gs:0x26f80,%rdx d: 02 00 f: a9 00 01 ff 00 test $0xff0100,%eax 14: 74 0e je 0x24 16: 85 c9 test %ecx,%ecx 18: 74 35 je 0x4f 1a: 8b 82 bc 14 00 00 mov 0x14bc(%rdx),%eax 20: 85 c0 test %eax,%eax 22: 74 2b je 0x4f 24: 8b 82 98 14 00 00 mov 0x1498(%rdx),%eax * 2a: 83 f8 02 cmp $0x2,%eax <-- trapping instruction 2d: 75 20 jne 0x4f 2f: 48 8b 8a a0 14 00 00 mov 0x14a0(%rdx),%rcx 36: 8b 92 9c 14 00 00 mov 0x149c(%rdx),%edx 3c: 48 8b 01 mov (%rcx),%rax 3f: 48 rex.W