BUG: MAX_LOCKDEP_CHAINS too low! turning off the locking correctness validator. CPU: 0 PID: 12041 Comm: syz-executor.3 Not tainted 5.8.0-rc5-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x18f/0x20d lib/dump_stack.c:118 add_chain_cache kernel/locking/lockdep.c:3063 [inline] lookup_chain_cache_add kernel/locking/lockdep.c:3162 [inline] validate_chain kernel/locking/lockdep.c:3183 [inline] __lock_acquire.cold+0x11/0x3f8 kernel/locking/lockdep.c:4380 lock_acquire+0x1f1/0xad0 kernel/locking/lockdep.c:4959 __raw_spin_lock include/linux/spinlock_api_smp.h:142 [inline] _raw_spin_lock+0x2a/0x40 kernel/locking/spinlock.c:151 perf_ctx_lock kernel/events/core.c:161 [inline] perf_event_context_sched_in kernel/events/core.c:3738 [inline] __perf_event_task_sched_in+0x50f/0x990 kernel/events/core.c:3796 perf_event_task_sched_in include/linux/perf_event.h:1199 [inline] finish_task_switch+0x437/0x750 kernel/sched/core.c:3290 context_switch kernel/sched/core.c:3456 [inline] __schedule+0x8e9/0x1eb0 kernel/sched/core.c:4178 preempt_schedule_irq+0xb0/0x150 kernel/sched/core.c:4436 idtentry_exit_cond_resched arch/x86/entry/common.c:663 [inline] idtentry_exit_cond_rcu+0xc0/0xf0 arch/x86/entry/common.c:710 asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:587 RIP: 0010:arch_local_irq_restore arch/x86/include/asm/paravirt.h:765 [inline] RIP: 0010:lock_acquire+0x270/0xad0 kernel/locking/lockdep.c:4962 Code: 00 00 00 00 fc ff df 48 c1 e8 03 80 3c 10 00 0f 85 f8 06 00 00 48 83 3d ad d0 5a 08 00 0f 84 a6 05 00 00 48 8b 7c 24 08 57 9d <0f> 1f 44 00 00 48 b8 00 00 00 00 00 fc ff df 48 03 44 24 10 48 c7 RSP: 0018:ffffc90008e376c8 EFLAGS: 00000282 RAX: 1ffffffff1369c10 RBX: ffff88809a336080 RCX: 0000000000000001 RDX: dffffc0000000000 RSI: 80d51ca1e00080cf RDI: 0000000000000282 RBP: 0000000000000000 R08: 0000000000000000 R09: ffffffff8c599a27 R10: fffffbfff18b3344 R11: 0000000000000000 R12: 0000000000000002 R13: ffffffff89bc11c0 R14: 0000000000000000 R15: ffff88809a336080 rcu_lock_acquire include/linux/rcupdate.h:241 [inline] rcu_read_lock include/linux/rcupdate.h:634 [inline] is_bpf_text_address+0x36/0x160 kernel/bpf/core.c:704 kernel_text_address kernel/extable.c:151 [inline] kernel_text_address+0xbd/0xf0 kernel/extable.c:120 __kernel_text_address+0x9/0x30 kernel/extable.c:105 unwind_get_return_address arch/x86/kernel/unwind_orc.c:317 [inline] unwind_get_return_address+0x51/0x90 arch/x86/kernel/unwind_orc.c:312 arch_stack_walk+0x97/0xf0 arch/x86/kernel/stacktrace.c:26 stack_trace_save+0x8c/0xc0 kernel/stacktrace.c:123 save_stack+0x1b/0x40 mm/kasan/common.c:48 set_track mm/kasan/common.c:56 [inline] __kasan_kmalloc.constprop.0+0xc2/0xd0 mm/kasan/common.c:494 slab_post_alloc_hook mm/slab.h:586 [inline] slab_alloc mm/slab.c:3320 [inline] kmem_cache_alloc+0x12c/0x3b0 mm/slab.c:3484 kmem_cache_zalloc include/linux/slab.h:659 [inline] key_alloc+0x3d8/0x11f0 security/keys/key.c:277 key_create_or_update+0x6d8/0xcd0 security/keys/key.c:929 __do_sys_add_key+0x215/0x430 security/keys/keyctl.c:134 do_syscall_64+0x60/0xe0 arch/x86/entry/common.c:384 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x45c1d9 Code: Bad RIP value. RSP: 002b:00007f480c5ccc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 RAX: ffffffffffffffda RBX: 00000000000007c0 RCX: 000000000045c1d9 RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000020000180 RBP: 000000000078bf50 R08: fffffffffffffffd R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000078bf0c R13: 00007fff9319fb7f R14: 00007f480c5cd9c0 R15: 000000000078bf0c