BUG: MAX_LOCKDEP_ENTRIES too low! turning off the locking correctness validator. CPU: 0 PID: 7072 Comm: systemd-udevd Not tainted 5.7.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x188/0x20d lib/dump_stack.c:118 alloc_list_entry.cold+0x11/0x18 kernel/locking/lockdep.c:1329 add_lock_to_list kernel/locking/lockdep.c:1350 [inline] check_prev_add kernel/locking/lockdep.c:2567 [inline] check_prevs_add kernel/locking/lockdep.c:2620 [inline] validate_chain kernel/locking/lockdep.c:3237 [inline] __lock_acquire+0x2f26/0x4c50 kernel/locking/lockdep.c:4355 lock_acquire+0x1f2/0x8f0 kernel/locking/lockdep.c:4934 __raw_spin_lock include/linux/spinlock_api_smp.h:142 [inline] _raw_spin_lock+0x2a/0x40 kernel/locking/spinlock.c:151 spin_lock include/linux/spinlock.h:353 [inline] __queue_work+0x260/0x1280 kernel/workqueue.c:1448 queue_work_on+0x18b/0x200 kernel/workqueue.c:1517 queue_work include/linux/workqueue.h:507 [inline] schedule_work include/linux/workqueue.h:568 [inline] __vfree_deferred mm/vmalloc.c:2338 [inline] vfree_atomic+0xac/0xe0 mm/vmalloc.c:2356 free_thread_stack kernel/fork.c:295 [inline] release_task_stack kernel/fork.c:442 [inline] put_task_stack+0x373/0x6b0 kernel/fork.c:453 finish_task_switch+0x51e/0x750 kernel/sched/core.c:3243 context_switch kernel/sched/core.c:3375 [inline] __schedule+0x93f/0x1ff0 kernel/sched/core.c:4088 preempt_schedule_irq+0xb0/0x150 kernel/sched/core.c:4346 retint_kernel+0x1b/0x2b RIP: 0010:arch_local_irq_restore arch/x86/include/asm/paravirt.h:759 [inline] RIP: 0010:qlink_free mm/kasan/quarantine.c:151 [inline] RIP: 0010:qlist_free_all+0xfc/0x140 mm/kasan/quarantine.c:167 Code: 50 08 48 8d 4a ff 83 e2 01 48 0f 45 c1 4c 8b 70 18 e9 40 ff ff ff e8 23 b5 c7 ff 48 83 3d 8b c6 e3 07 00 74 36 4c 89 ff 57 9d <0f> 1f 44 00 00 4d 85 e4 75 9e 49 c7 45 08 00 00 00 00 49 c7 45 00 RSP: 0018:ffffc900050a7820 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff13 RAX: 0000000000000007 RBX: ffff888050f6e340 RCX: 1ffffffff186496a RDX: 0000000000000000 RSI: ffff8880960dc930 RDI: 0000000000000286 RBP: 0000000000000000 R08: 0000000000000001 R09: fffffbfff185cd52 R10: ffffffff8c2e6a8f R11: fffffbfff185cd51 R12: ffff88809d0f3d20 R13: ffffc900050a7858 R14: ffff8880aa1eb000 R15: 0000000000000286 quarantine_reduce+0x159/0x190 mm/kasan/quarantine.c:260 __kasan_kmalloc.constprop.0+0x97/0xd0 mm/kasan/common.c:476 slab_post_alloc_hook mm/slab.h:586 [inline] slab_alloc mm/slab.c:3320 [inline] kmem_cache_alloc_trace+0x13d/0x7d0 mm/slab.c:3549 kmalloc include/linux/slab.h:555 [inline] kernfs_get_open_node fs/kernfs/file.c:571 [inline] kernfs_fop_open+0x948/0xdc0 fs/kernfs/file.c:717 do_dentry_open+0x4ba/0x1290 fs/open.c:797 do_open fs/namei.c:3229 [inline] path_openat+0x1e59/0x27d0 fs/namei.c:3346 do_filp_open+0x192/0x260 fs/namei.c:3373 do_sys_openat2+0x585/0x7d0 fs/open.c:1148 do_sys_open+0xc3/0x140 fs/open.c:1164 do_syscall_64+0xf6/0x7d0 arch/x86/entry/common.c:295 entry_SYSCALL_64_after_hwframe+0x49/0xb3 RIP: 0033:0x7f942e2bd6f0 Code: 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 83 3d 19 30 2c 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 fe 9d 01 00 48 89 04 24 RSP: 002b:00007fff71adec88 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 RAX: ffffffffffffffda RBX: 000055817b94d920 RCX: 00007f942e2bd6f0 RDX: 00000000000001b6 RSI: 0000000000080000 RDI: 00007fff71adee30 RBP: 0000000000000008 R08: 0000000000000008 R09: 0000000000000001 R10: 0000000000080000 R11: 0000000000000246 R12: 0000558179ac568a R13: 0000000000000001 R14: 00000000ffffffff R15: 00007fff71adeeb0