input: syz1 as /devices/virtual/input/input3 BUG: MAX_LOCKDEP_CHAINS too low! turning off the locking correctness validator. CPU: 1 PID: 7036 Comm: syz.8.403 Not tainted syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/03/2025 Call trace: dump_backtrace+0x1c8/0x1f4 arch/arm64/kernel/stacktrace.c:158 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:165 __dump_stack+0x30/0x40 lib/dump_stack.c:88 dump_stack_lvl+0xf8/0x160 lib/dump_stack.c:106 dump_stack+0x1c/0x5c lib/dump_stack.c:113 add_chain_cache kernel/locking/lockdep.c:-1 [inline] lookup_chain_cache_add kernel/locking/lockdep.c:3772 [inline] validate_chain kernel/locking/lockdep.c:3793 [inline] __lock_acquire+0x1b40/0x6544 kernel/locking/lockdep.c:5049 lock_acquire+0x20c/0x644 kernel/locking/lockdep.c:5662 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline] _raw_spin_lock_irqsave+0x6c/0xb4 kernel/locking/spinlock.c:162 get_partial_node+0x44/0x3b8 mm/slub.c:2215 get_partial mm/slub.c:2330 [inline] ___slab_alloc+0x690/0xec8 mm/slub.c:3131 __slab_alloc+0x74/0xd0 mm/slub.c:3240 slab_alloc_node mm/slub.c:3325 [inline] __kmem_cache_alloc_node+0x298/0x320 mm/slub.c:3398 __do_kmalloc_node mm/slab_common.c:935 [inline] __kmalloc_node_track_caller+0xcc/0x16c mm/slab_common.c:956 kstrdup mm/util.c:61 [inline] kstrdup_const+0x90/0xdc mm/util.c:84 __kernfs_new_node+0xa8/0x5d8 fs/kernfs/dir.c:610 kernfs_new_node+0x11c/0x230 fs/kernfs/dir.c:690 kernfs_create_link+0x98/0x1e0 fs/kernfs/symlink.c:39 sysfs_do_create_link_sd+0x8c/0x120 fs/sysfs/symlink.c:44 sysfs_do_create_link fs/sysfs/symlink.c:80 [inline] sysfs_create_link+0x74/0x94 fs/sysfs/symlink.c:92 device_create_sys_dev_entry+0x110/0x178 drivers/base/core.c:3522 device_add+0xa90/0xf94 drivers/base/core.c:3664 cdev_device_add+0x168/0x2f8 fs/char_dev.c:549 evdev_connect+0x2d8/0x384 drivers/input/evdev.c:1386 input_attach_handler drivers/input/input.c:1060 [inline] input_register_device+0xae4/0xf88 drivers/input/input.c:2470 uinput_create_device+0x350/0x518 drivers/input/misc/uinput.c:364 uinput_ioctl_handler+0x404/0x1340 drivers/input/misc/uinput.c:885 uinput_ioctl+0x38/0x4c drivers/input/misc/uinput.c:1056 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:870 [inline] __se_sys_ioctl fs/ioctl.c:856 [inline] __arm64_sys_ioctl+0x14c/0x1c8 fs/ioctl.c:856 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2bc arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:140 do_el0_svc+0x58/0x13c arch/arm64/kernel/syscall.c:204 el0_svc+0x58/0x138 arch/arm64/kernel/entry-common.c:637 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655 el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:585 ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README Error parsing options; rc = [-22]