INFO: trying to register non-static key.
The code is fine but needs lockdep annotation, or maybe
you didn't initialize this object before use?
turning off the locking correctness validator.
CPU: 1 PID: 3250 Comm: syz-executor.1 Not tainted 5.16.0-rc6-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
assign_lock_key kernel/locking/lockdep.c:951 [inline]
register_lock_class+0xf79/0x10c0 kernel/locking/lockdep.c:1263
__lock_acquire+0x105/0x54a0 kernel/locking/lockdep.c:4906
lock_acquire kernel/locking/lockdep.c:5637 [inline]
lock_acquire+0x1ab/0x510 kernel/locking/lockdep.c:5602
__raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline]
_raw_spin_lock_irqsave+0x39/0x50 kernel/locking/spinlock.c:162
skb_queue_tail+0x21/0x140 net/core/skbuff.c:3319
ath9k_htc_txep+0x287/0x400 drivers/net/wireless/ath/ath9k/htc_drv_txrx.c:712
ath9k_htc_txcompletion_cb+0x1cd/0x2f0 drivers/net/wireless/ath/ath9k/htc_hst.c:348
hif_usb_regout_cb+0x115/0x1c0 drivers/net/wireless/ath/ath9k/hif_usb.c:90
__usb_hcd_giveback_urb+0x2b0/0x5c0 drivers/usb/core/hcd.c:1656
usb_hcd_giveback_urb+0x367/0x410 drivers/usb/core/hcd.c:1726
dummy_timer+0x11f9/0x32b0 drivers/usb/gadget/udc/dummy_hcd.c:1987
call_timer_fn+0x1a5/0x6b0 kernel/time/timer.c:1421
expire_timers kernel/time/timer.c:1466 [inline]
__run_timers.part.0+0x675/0xa20 kernel/time/timer.c:1734
__run_timers kernel/time/timer.c:1715 [inline]
run_timer_softirq+0xb3/0x1d0 kernel/time/timer.c:1747
__do_softirq+0x288/0x9a5 kernel/softirq.c:558
invoke_softirq kernel/softirq.c:432 [inline]
__irq_exit_rcu+0x113/0x170 kernel/softirq.c:637
irq_exit_rcu+0x5/0x20 kernel/softirq.c:649
sysvec_apic_timer_interrupt+0x8e/0xc0 arch/x86/kernel/apic/apic.c:1097
asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:638
RIP: 0010:__sanitizer_cov_trace_pc+0x37/0x60 kernel/kcov.c:200
Code: 81 e1 00 01 00 00 65 48 8b 14 25 80 6f 02 00 a9 00 01 ff 00 74 0e 85 c9 74 35 8b 82 bc 14 00 00 85 c0 74 2b 8b 82 98 14 00 00 <83> f8 02 75 20 48 8b 8a a0 14 00 00 8b 92 9c 14 00 00 48 8b 01 48
RSP: 0018:ffffc900029af718 EFLAGS: 00000246
RAX: 0000000000000000 RBX: 000000000012a8c3 RCX: 0000000000000000
RDX: ffff88810a7ab800 RSI: ffffffff81647aee RDI: 0000000000000003
RBP: 1ffff92000535ee5 R08: 0000000000000000 R09: ffff88810a7ab807
R10: ffffffff81647ad8 R11: 0000000000000000 R12: ffff888119420b00
R13: 00007f04daea2000 R14: 800000012a8c3007 R15: 0000000000000000
vm_normal_page+0xde/0x2a0 mm/memory.c:650
zap_pte_range mm/memory.c:1338 [inline]
zap_pmd_range mm/memory.c:1467 [inline]
zap_pud_range mm/memory.c:1496 [inline]
zap_p4d_range mm/memory.c:1517 [inline]
unmap_page_range+0x865/0x1c30 mm/memory.c:1538
unmap_single_vma+0x198/0x310 mm/memory.c:1583
unmap_vmas+0x16b/0x2f0 mm/memory.c:1615
exit_mmap+0x1d0/0x630 mm/mmap.c:3170
__mmput kernel/fork.c:1113 [inline]
mmput+0xcc/0x410 kernel/fork.c:1134
exit_mm kernel/exit.c:507 [inline]
do_exit+0xb27/0x2a40 kernel/exit.c:819
do_group_exit+0x125/0x310 kernel/exit.c:929
get_signal+0x47d/0x2220 kernel/signal.c:2852
arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868
handle_signal_work kernel/entry/common.c:148 [inline]
exit_to_user_mode_loop kernel/entry/common.c:172 [inline]
exit_to_user_mode_prepare+0x16c/0x230 kernel/entry/common.c:207
__syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline]
syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300
do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f04db6b5bc1
Code: Unable to access opcode bytes at RIP 0x7f04db6b5b97.
RSP: 002b:00007ffe9187f8d0 EFLAGS: 00000293 ORIG_RAX: 00000000000000e6
RAX: fffffffffffffdfc RBX: 00007f04db7a3f60 RCX: 00007f04db6b5bc1
RDX: 00007ffe9187f910 RSI: 0000000000000000 RDI: 0000000000000000
RBP: 00007f04db7a5960 R08: 0000000000000000 R09: 00007ffe91928080
R10: 0000000000000000 R11: 0000000000000293 R12: 00000000002579ad
R13: 00007ffe9187fa20 R14: 00007f04db7a4030 R15: 000000000000015e
general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN
KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]
CPU: 1 PID: 3250 Comm: syz-executor.1 Not tainted 5.16.0-rc6-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:__skb_insert include/linux/skbuff.h:1979 [inline]
RIP: 0010:__skb_queue_before include/linux/skbuff.h:2085 [inline]
RIP: 0010:__skb_queue_tail include/linux/skbuff.h:2118 [inline]
RIP: 0010:skb_queue_tail+0x9e/0x140 net/core/skbuff.c:3320
Code: 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 80 00 00 00 4c 89 e2 4c 89 65 08 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 48 89 6b 08 <80> 3c 02 00 75 4f 48 8d 7b 10 49 89 2c 24 48 b8 00 00 00 00 00 fc
RSP: 0018:ffffc900001589d8 EFLAGS: 00010046
RAX: dffffc0000000000 RBX: ffff888111233770 RCX: ffffffff8129c8b0
RDX: 0000000000000000 RSI: 0000000000000012 RDI: ffff88810bd58dc8
RBP: ffff88810bd58dc0 R08: 0000000000000001 R09: 0000000000000003
R10: fffff5200002b129 R11: 0000000000000000 R12: 0000000000000000
R13: ffff888111233788 R14: 0000000100034997 R15: ffffffff83123ff0
FS: 0000000000000000(0000) GS:ffff8881f6900000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007ffff5515d28 CR3: 000000012cc9f000 CR4: 00000000003506e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
ath9k_htc_txep+0x287/0x400 drivers/net/wireless/ath/ath9k/htc_drv_txrx.c:712
ath9k_htc_txcompletion_cb+0x1cd/0x2f0 drivers/net/wireless/ath/ath9k/htc_hst.c:348
hif_usb_regout_cb+0x115/0x1c0 drivers/net/wireless/ath/ath9k/hif_usb.c:90
__usb_hcd_giveback_urb+0x2b0/0x5c0 drivers/usb/core/hcd.c:1656
usb_hcd_giveback_urb+0x367/0x410 drivers/usb/core/hcd.c:1726
dummy_timer+0x11f9/0x32b0 drivers/usb/gadget/udc/dummy_hcd.c:1987
call_timer_fn+0x1a5/0x6b0 kernel/time/timer.c:1421
expire_timers kernel/time/timer.c:1466 [inline]
__run_timers.part.0+0x675/0xa20 kernel/time/timer.c:1734
__run_timers kernel/time/timer.c:1715 [inline]
run_timer_softirq+0xb3/0x1d0 kernel/time/timer.c:1747
__do_softirq+0x288/0x9a5 kernel/softirq.c:558
invoke_softirq kernel/softirq.c:432 [inline]
__irq_exit_rcu+0x113/0x170 kernel/softirq.c:637
irq_exit_rcu+0x5/0x20 kernel/softirq.c:649
sysvec_apic_timer_interrupt+0x8e/0xc0 arch/x86/kernel/apic/apic.c:1097
asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:638
RIP: 0010:__sanitizer_cov_trace_pc+0x37/0x60 kernel/kcov.c:200
Code: 81 e1 00 01 00 00 65 48 8b 14 25 80 6f 02 00 a9 00 01 ff 00 74 0e 85 c9 74 35 8b 82 bc 14 00 00 85 c0 74 2b 8b 82 98 14 00 00 <83> f8 02 75 20 48 8b 8a a0 14 00 00 8b 92 9c 14 00 00 48 8b 01 48
RSP: 0018:ffffc900029af718 EFLAGS: 00000246
RAX: 0000000000000000 RBX: 000000000012a8c3 RCX: 0000000000000000
RDX: ffff88810a7ab800 RSI: ffffffff81647aee RDI: 0000000000000003
RBP: 1ffff92000535ee5 R08: 0000000000000000 R09: ffff88810a7ab807
R10: ffffffff81647ad8 R11: 0000000000000000 R12: ffff888119420b00
R13: 00007f04daea2000 R14: 800000012a8c3007 R15: 0000000000000000
vm_normal_page+0xde/0x2a0 mm/memory.c:650
zap_pte_range mm/memory.c:1338 [inline]
zap_pmd_range mm/memory.c:1467 [inline]
zap_pud_range mm/memory.c:1496 [inline]
zap_p4d_range mm/memory.c:1517 [inline]
unmap_page_range+0x865/0x1c30 mm/memory.c:1538
unmap_single_vma+0x198/0x310 mm/memory.c:1583
unmap_vmas+0x16b/0x2f0 mm/memory.c:1615
exit_mmap+0x1d0/0x630 mm/mmap.c:3170
__mmput kernel/fork.c:1113 [inline]
mmput+0xcc/0x410 kernel/fork.c:1134
exit_mm kernel/exit.c:507 [inline]
do_exit+0xb27/0x2a40 kernel/exit.c:819
do_group_exit+0x125/0x310 kernel/exit.c:929
get_signal+0x47d/0x2220 kernel/signal.c:2852
arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868
handle_signal_work kernel/entry/common.c:148 [inline]
exit_to_user_mode_loop kernel/entry/common.c:172 [inline]
exit_to_user_mode_prepare+0x16c/0x230 kernel/entry/common.c:207
__syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline]
syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300
do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f04db6b5bc1
Code: Unable to access opcode bytes at RIP 0x7f04db6b5b97.
RSP: 002b:00007ffe9187f8d0 EFLAGS: 00000293 ORIG_RAX: 00000000000000e6
RAX: fffffffffffffdfc RBX: 00007f04db7a3f60 RCX: 00007f04db6b5bc1
RDX: 00007ffe9187f910 RSI: 0000000000000000 RDI: 0000000000000000
RBP: 00007f04db7a5960 R08: 0000000000000000 R09: 00007ffe91928080
R10: 0000000000000000 R11: 0000000000000293 R12: 00000000002579ad
R13: 00007ffe9187fa20 R14: 00007f04db7a4030 R15: 000000000000015e
Modules linked in:
---[ end trace 2be0d679b73f4de1 ]---
RIP: 0010:__skb_insert include/linux/skbuff.h:1979 [inline]
RIP: 0010:__skb_queue_before include/linux/skbuff.h:2085 [inline]
RIP: 0010:__skb_queue_tail include/linux/skbuff.h:2118 [inline]
RIP: 0010:skb_queue_tail+0x9e/0x140 net/core/skbuff.c:3320
Code: 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 80 00 00 00 4c 89 e2 4c 89 65 08 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 48 89 6b 08 <80> 3c 02 00 75 4f 48 8d 7b 10 49 89 2c 24 48 b8 00 00 00 00 00 fc
RSP: 0018:ffffc900001589d8 EFLAGS: 00010046
RAX: dffffc0000000000 RBX: ffff888111233770 RCX: ffffffff8129c8b0
RDX: 0000000000000000 RSI: 0000000000000012 RDI: ffff88810bd58dc8
RBP: ffff88810bd58dc0 R08: 0000000000000001 R09: 0000000000000003
R10: fffff5200002b129 R11: 0000000000000000 R12: 0000000000000000
R13: ffff888111233788 R14: 0000000100034997 R15: ffffffff83123ff0
FS: 0000000000000000(0000) GS:ffff8881f6900000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007ffff5515d28 CR3: 000000012cc9f000 CR4: 00000000003506e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
0: 81 e1 00 01 00 00 and $0x100,%ecx
6: 65 48 8b 14 25 80 6f mov %gs:0x26f80,%rdx
d: 02 00
f: a9 00 01 ff 00 test $0xff0100,%eax
14: 74 0e je 0x24
16: 85 c9 test %ecx,%ecx
18: 74 35 je 0x4f
1a: 8b 82 bc 14 00 00 mov 0x14bc(%rdx),%eax
20: 85 c0 test %eax,%eax
22: 74 2b je 0x4f
24: 8b 82 98 14 00 00 mov 0x1498(%rdx),%eax
* 2a: 83 f8 02 cmp $0x2,%eax <-- trapping instruction
2d: 75 20 jne 0x4f
2f: 48 8b 8a a0 14 00 00 mov 0x14a0(%rdx),%rcx
36: 8b 92 9c 14 00 00 mov 0x149c(%rdx),%edx
3c: 48 8b 01 mov (%rcx),%rax
3f: 48 rex.W