BUG: MAX_LOCKDEP_CHAIN_HLOCKS too low! turning off the locking correctness validator. CPU: 0 PID: 19474 Comm: kworker/u4:1 Not tainted 6.5.0-rc1-syzkaller-00338-gd3750076d464 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 Workqueue: bond1583 bond_resend_igmp_join_requests_delayed Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xd9/0x1b0 lib/dump_stack.c:106 add_chain_cache kernel/locking/lockdep.c:3742 [inline] lookup_chain_cache_add kernel/locking/lockdep.c:3823 [inline] validate_chain kernel/locking/lockdep.c:3844 [inline] __lock_acquire+0x4286/0x5de0 kernel/locking/lockdep.c:5144 lock_acquire kernel/locking/lockdep.c:5761 [inline] lock_acquire+0x1ae/0x510 kernel/locking/lockdep.c:5726 _raw_spin_lock_nested+0x31/0x40 kernel/locking/spinlock.c:378 raw_spin_rq_lock_nested+0x29/0x130 kernel/sched/core.c:558 raw_spin_rq_lock kernel/sched/sched.h:1366 [inline] rq_lock kernel/sched/sched.h:1675 [inline] __schedule+0x29d/0x59f0 kernel/sched/core.c:6627 preempt_schedule_irq+0x52/0x90 kernel/sched/core.c:7022 irqentry_exit+0x35/0x80 kernel/entry/common.c:433 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:645 RIP: 0010:batadv_hardif_get_by_netdev+0x13b/0x430 net/batman-adv/hard-interface.c:71 Code: 85 e1 02 00 00 48 8b 1b 48 81 fb 60 7a 50 92 0f 84 85 01 00 00 e8 25 95 8b f7 48 8d 7b 18 48 89 f8 48 c1 e8 03 42 80 3c 20 00 <0f> 85 ac 02 00 00 4c 39 73 18 75 b8 e8 04 95 8b f7 4c 8d 6b 20 be RSP: 0018:ffffc900204d7ae0 EFLAGS: 00000246 RAX: 1ffff1100f781203 RBX: ffff88807bc09000 RCX: 0000000000000000 RDX: ffff888162220000 RSI: ffffffff89fae6fb RDI: ffff88807bc09018 RBP: ffff88817b138000 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000000 R12: dffffc0000000000 R13: 0000000000000001 R14: ffff88817b138000 R15: 0000000000000000 batadv_hard_if_event+0x94/0x1600 net/batman-adv/hard-interface.c:949 notifier_call_chain+0xb6/0x3b0 kernel/notifier.c:93 call_netdevice_notifiers_info+0xb9/0x130 net/core/dev.c:1962 call_netdevice_notifiers_extack net/core/dev.c:2000 [inline] call_netdevice_notifiers+0x7d/0xb0 net/core/dev.c:2014 bond_resend_igmp_join_requests_delayed+0x5e/0x170 drivers/net/bonding/bond_main.c:853 process_one_work+0xaa2/0x16f0 kernel/workqueue.c:2597 worker_thread+0x687/0x1110 kernel/workqueue.c:2748 kthread+0x33a/0x430 kernel/kthread.c:389 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308 ---------------- Code disassembly (best guess), 1 bytes skipped: 0: e1 02 loope 0x4 2: 00 00 add %al,(%rax) 4: 48 8b 1b mov (%rbx),%rbx 7: 48 81 fb 60 7a 50 92 cmp $0xffffffff92507a60,%rbx e: 0f 84 85 01 00 00 je 0x199 14: e8 25 95 8b f7 call 0xf78b953e 19: 48 8d 7b 18 lea 0x18(%rbx),%rdi 1d: 48 89 f8 mov %rdi,%rax 20: 48 c1 e8 03 shr $0x3,%rax 24: 42 80 3c 20 00 cmpb $0x0,(%rax,%r12,1) * 29: 0f 85 ac 02 00 00 jne 0x2db <-- trapping instruction 2f: 4c 39 73 18 cmp %r14,0x18(%rbx) 33: 75 b8 jne 0xffffffed 35: e8 04 95 8b f7 call 0xf78b953e 3a: 4c 8d 6b 20 lea 0x20(%rbx),%r13 3e: be .byte 0xbe