BUG: MAX_STACK_TRACE_ENTRIES too low! turning off the locking correctness validator. CPU: 2 UID: 0 PID: 17585 Comm: syz-executor359 Not tainted 6.14.0-rc4-syzkaller-00090-gdd83757f6e68 #0 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014 Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120 save_trace+0x78f/0xb60 kernel/locking/lockdep.c:581 mark_lock+0x2d2/0xc60 kernel/locking/lockdep.c:4746 mark_usage kernel/locking/lockdep.c:4672 [inline] __lock_acquire+0x9f1/0x3c40 kernel/locking/lockdep.c:5182 lock_acquire.part.0+0x11b/0x380 kernel/locking/lockdep.c:5851 __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline] _raw_spin_lock+0x2e/0x40 kernel/locking/spinlock.c:154 htab_lock_bucket kernel/bpf/hashtab.c:167 [inline] htab_map_delete_elem+0x1c8/0x740 kernel/bpf/hashtab.c:1447 bpf_prog_9dc0996bccb7470f+0x69/0x6d bpf_dispatcher_nop_func include/linux/bpf.h:1290 [inline] __bpf_prog_run include/linux/filter.h:701 [inline] bpf_prog_run include/linux/filter.h:708 [inline] __bpf_trace_run kernel/trace/bpf_trace.c:2371 [inline] bpf_trace_run2+0x231/0x590 kernel/trace/bpf_trace.c:2412 __traceiter_kfree+0x2d/0x50 include/trace/events/kmem.h:94 __do_trace_kfree include/trace/events/kmem.h:94 [inline] trace_kfree include/trace/events/kmem.h:94 [inline] kfree+0x244/0x4d0 mm/slub.c:4744 krealloc_noprof+0x1b1/0x380 mm/slub.c:4875 copy_array.constprop.0+0x88/0x110 kernel/bpf/verifier.c:1361 copy_stack_state kernel/bpf/verifier.c:1419 [inline] copy_func_state kernel/bpf/verifier.c:1632 [inline] copy_verifier_state kernel/bpf/verifier.c:1672 [inline] copy_verifier_state+0x9af/0xe70 kernel/bpf/verifier.c:1635 is_state_visited kernel/bpf/verifier.c:18812 [inline] do_check kernel/bpf/verifier.c:18974 [inline] do_check_common+0x459e/0xb960 kernel/bpf/verifier.c:22273 do_check_main kernel/bpf/verifier.c:22364 [inline] bpf_check+0x775c/0xabe0 kernel/bpf/verifier.c:23160 bpf_prog_load+0xe3c/0x2480 kernel/bpf/syscall.c:2952 __sys_bpf+0x4043/0x49c0 kernel/bpf/syscall.c:5795 __do_sys_bpf kernel/bpf/syscall.c:5902 [inline] __se_sys_bpf kernel/bpf/syscall.c:5900 [inline] __x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5900 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f03f48fcce9 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 c1 17 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffe1d1dd948 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f03f48fcce9 RDX: 0000000000000090 RSI: 00004000000000c0 RDI: 0000000000000005 RBP: 0000000000000000 R08: 0000000000000000 R09: 00000000000000a0 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000