INFO: trying to register non-static key. The code is fine but needs lockdep annotation, or maybe you didn't initialize this object before use? turning off the locking correctness validator. CPU: 1 PID: 14136 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 assign_lock_key kernel/locking/lockdep.c:728 [inline] register_lock_class+0xe82/0x11c0 kernel/locking/lockdep.c:754 __lock_acquire+0x17d/0x3ff0 kernel/locking/lockdep.c:3304 lock_acquire+0x170/0x3c0 kernel/locking/lockdep.c:3908 down_write+0x34/0x90 kernel/locking/rwsem.c:70 lock_anon_vma_root mm/rmap.c:238 [inline] unlink_anon_vmas+0x178/0x840 mm/rmap.c:388 free_pgtables+0xe2/0x2f0 mm/memory.c:638 exit_mmap+0x2c8/0x530 mm/mmap.c:3094 __mmput kernel/fork.c:1016 [inline] mmput+0x14e/0x4a0 kernel/fork.c:1037 exit_mm kernel/exit.c:549 [inline] do_exit+0xaec/0x2be0 kernel/exit.c:857 do_group_exit+0x125/0x310 kernel/exit.c:967 get_signal+0x3f2/0x1f70 kernel/signal.c:2589 do_signal+0x8f/0x1670 arch/x86/kernel/signal.c:799 exit_to_usermode_loop+0x204/0x2a0 arch/x86/entry/common.c:163 prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline] syscall_return_slowpath arch/x86/entry/common.c:271 [inline] do_syscall_64+0x538/0x620 arch/x86/entry/common.c:296 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f3523ba8279 Code: Bad RIP value. RSP: 002b:00007f352251d168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 RAX: 0000000000000800 RBX: 00007f3523cbaf80 RCX: 00007f3523ba8279 RDX: 0000000000001006 RSI: 0000000020001040 RDI: 0000000000000004 RBP: 00007f3523c02189 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffea7786d5f R14: 00007f352251d300 R15: 0000000000022000 BUG: unable to handle kernel NULL pointer dereference at 00000000000000fc PGD 9b7b3067 P4D 9b7b3067 PUD 0 Oops: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 8144 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 RIP: 0010:qlink_to_object mm/kasan/quarantine.c:136 [inline] RIP: 0010:qlink_free mm/kasan/quarantine.c:141 [inline] RIP: 0010:qlist_free_all+0x28/0x140 mm/kasan/quarantine.c:166 Code: 90 90 41 57 41 56 41 55 41 54 55 53 48 8b 1f 48 85 db 0f 84 08 01 00 00 48 89 f5 49 89 fd 48 85 ed 49 89 ee 0f 84 8b 00 00 00 <49> 63 86 fc 00 00 00 4c 8b 23 48 29 c3 48 83 3d 93 10 59 08 00 0f RSP: 0018:ffff8880a99d76c0 EFLAGS: 00010246 RAX: ffffea0000000000 RBX: ffff888000000000 RCX: ffffea0000000007 RDX: 0000000000000000 RSI: ffffffff812b5eca RDI: 0000000000000007 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000007 R11: 0000000000000009 R12: ffff888000000000 R13: ffff8880a99d76f8 R14: 0000000000000000 R15: 0000000000000286 FS: 000055555702a400(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00000000000000fc CR3: 00000000a57f9000 CR4: 00000000003426f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: quarantine_reduce+0x1a9/0x230 mm/kasan/quarantine.c:259 kasan_kmalloc+0xa2/0x160 mm/kasan/kasan.c:538 slab_post_alloc_hook mm/slab.h:445 [inline] slab_alloc mm/slab.c:3397 [inline] kmem_cache_alloc+0x110/0x370 mm/slab.c:3557 ptlock_alloc+0x1d/0x70 mm/memory.c:4969 ptlock_init include/linux/mm.h:1900 [inline] pgtable_page_ctor include/linux/mm.h:1934 [inline] pte_alloc_one+0x68/0x190 arch/x86/mm/pgtable.c:38 __pte_alloc+0x21/0x340 mm/memory.c:665 copy_pte_range mm/memory.c:1089 [inline] copy_pmd_range mm/memory.c:1165 [inline] copy_pud_range mm/memory.c:1199 [inline] copy_p4d_range mm/memory.c:1221 [inline] copy_page_range+0x1d3d/0x2ff0 mm/memory.c:1283 dup_mmap kernel/fork.c:549 [inline] dup_mm kernel/fork.c:1285 [inline] copy_mm kernel/fork.c:1341 [inline] copy_process.part.0+0x5b22/0x8260 kernel/fork.c:1913 copy_process kernel/fork.c:1710 [inline] _do_fork+0x22f/0xf30 kernel/fork.c:2219 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f90235ca86b Code: ed 0f 85 60 01 00 00 64 4c 8b 0c 25 10 00 00 00 45 31 c0 4d 8d 91 d0 02 00 00 31 d2 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 89 00 00 00 41 89 c5 85 c0 0f 85 90 00 00 RSP: 002b:00007ffeb66e8d60 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f90235ca86b RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 RBP: 0000000000000001 R08: 0000000000000000 R09: 000055555702a400 R10: 000055555702a6d0 R11: 0000000000000246 R12: 0000000000000001 R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffeb66e8e40 Modules linked in: CR2: 00000000000000fc ---[ end trace e55cf02c9908de2c ]--- WARNING: CPU: 1 PID: 14136 at mm/rmap.c:235 lock_anon_vma_root mm/rmap.c:235 [inline] WARNING: CPU: 1 PID: 14136 at mm/rmap.c:235 unlink_anon_vmas+0x58a/0x840 mm/rmap.c:388 RIP: 0010:qlink_to_object mm/kasan/quarantine.c:136 [inline] RIP: 0010:qlink_free mm/kasan/quarantine.c:141 [inline] RIP: 0010:qlist_free_all+0x28/0x140 mm/kasan/quarantine.c:166 ---------------- Code disassembly (best guess): 0: 90 nop 1: 90 nop 2: 41 57 push %r15 4: 41 56 push %r14 6: 41 55 push %r13 8: 41 54 push %r12 a: 55 push %rbp b: 53 push %rbx c: 48 8b 1f mov (%rdi),%rbx f: 48 85 db test %rbx,%rbx 12: 0f 84 08 01 00 00 je 0x120 18: 48 89 f5 mov %rsi,%rbp 1b: 49 89 fd mov %rdi,%r13 1e: 48 85 ed test %rbp,%rbp 21: 49 89 ee mov %rbp,%r14 24: 0f 84 8b 00 00 00 je 0xb5 * 2a: 49 63 86 fc 00 00 00 movslq 0xfc(%r14),%rax <-- trapping instruction 31: 4c 8b 23 mov (%rbx),%r12 34: 48 29 c3 sub %rax,%rbx 37: 48 83 3d 93 10 59 08 cmpq $0x0,0x8591093(%rip) # 0x85910d2 3e: 00 3f: 0f .byte 0xf