BUG: MAX_LOCKDEP_KEYS too low! turning off the locking correctness validator. CPU: 1 PID: 30360 Comm: syz-executor152 Not tainted 5.7.0-rc4-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1e9/0x30e lib/dump_stack.c:118 register_lock_class+0xc65/0x10d0 kernel/locking/lockdep.c:912 __lock_acquire+0x102/0x2c30 kernel/locking/lockdep.c:4234 lock_acquire+0x169/0x480 kernel/locking/lockdep.c:4934 __raw_spin_lock_bh include/linux/spinlock_api_smp.h:135 [inline] _raw_spin_lock_bh+0x31/0x40 kernel/locking/spinlock.c:175 spin_lock_bh include/linux/spinlock.h:358 [inline] netif_addr_lock_bh include/linux/netdevice.h:4172 [inline] __dev_mc_add+0x36/0x4d0 net/core/dev_addr_lists.c:765 igmp6_group_added+0x158/0x7f0 net/ipv6/mcast.c:672 __ipv6_dev_mc_inc+0x91c/0xbb0 net/ipv6/mcast.c:931 ipv6_add_dev+0xb2c/0x1430 net/ipv6/addrconf.c:458 addrconf_notify+0x5f8/0x3ad0 net/ipv6/addrconf.c:3503 notifier_call_chain kernel/notifier.c:83 [inline] __raw_notifier_call_chain kernel/notifier.c:361 [inline] raw_notifier_call_chain+0xd4/0x170 kernel/notifier.c:368 call_netdevice_notifiers_info net/core/dev.c:1948 [inline] call_netdevice_notifiers_extack net/core/dev.c:1960 [inline] call_netdevice_notifiers net/core/dev.c:1974 [inline] register_netdevice+0x14a4/0x1a50 net/core/dev.c:9423 veth_newlink+0x810/0xba0 drivers/net/veth.c:1393 __rtnl_newlink net/core/rtnetlink.c:3333 [inline] rtnl_newlink+0x143e/0x1c00 net/core/rtnetlink.c:3391 rtnetlink_rcv_msg+0x889/0xd40 net/core/rtnetlink.c:5454 netlink_rcv_skb+0x190/0x3a0 net/netlink/af_netlink.c:2469 netlink_unicast_kernel net/netlink/af_netlink.c:1303 [inline] netlink_unicast+0x786/0x940 net/netlink/af_netlink.c:1329 netlink_sendmsg+0xa57/0xd70 net/netlink/af_netlink.c:1918 sock_sendmsg_nosec net/socket.c:652 [inline] sock_sendmsg net/socket.c:672 [inline] ____sys_sendmsg+0x4f9/0x7c0 net/socket.c:2362 ___sys_sendmsg net/socket.c:2416 [inline] __sys_sendmsg+0x2a6/0x360 net/socket.c:2449 do_syscall_64+0xf3/0x1b0 arch/x86/entry/common.c:295 entry_SYSCALL_64_after_hwframe+0x49/0xb3 RIP: 0033:0x441289 Code: e8 fc ab 02 00 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 9b 09 fc ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007ffea805d9c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000441289 RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 RBP: 00000000001593fc R08: 00000000004002c8 R09: 00000000004002c8 R10: 00000000004002c8 R11: 0000000000000246 R12: 00000000004020b0 R13: 0000000000402140 R14: 0000000000000000 R15: 0000000000000000