BUG: MAX_STACK_TRACE_ENTRIES too low!
turning off the locking correctness validator.
CPU: 1 PID: 4230 Comm: syz-executor Not tainted syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
Call Trace:
dump_stack_lvl+0x168/0x230 lib/dump_stack.c:106
save_trace+0x85f/0xa80 kernel/locking/lockdep.c:547
check_prev_add kernel/locking/lockdep.c:3114 [inline]
check_prevs_add kernel/locking/lockdep.c:3172 [inline]
validate_chain kernel/locking/lockdep.c:3788 [inline]
__lock_acquire+0x3b0b/0x7c60 kernel/locking/lockdep.c:5012
lock_acquire+0x197/0x3f0 kernel/locking/lockdep.c:5623
__raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline]
_raw_spin_lock_irqsave+0xa4/0xf0 kernel/locking/spinlock.c:162
htab_lock_bucket kernel/bpf/hashtab.c:183 [inline]
htab_lru_map_delete_elem+0x1b1/0x640 kernel/bpf/hashtab.c:1397
bpf_prog_9dc0996bccb7470f+0x60/0xb70
bpf_dispatcher_nop_func include/linux/bpf.h:888 [inline]
__bpf_prog_run include/linux/filter.h:628 [inline]
bpf_prog_run include/linux/filter.h:635 [inline]
__bpf_trace_run kernel/trace/bpf_trace.c:1878 [inline]
bpf_trace_run2+0x15b/0x2d0 kernel/trace/bpf_trace.c:1915
__bpf_trace_kfree+0x6e/0x90 include/trace/events/kmem.h:118
__traceiter_kfree+0x26/0x40 include/trace/events/kmem.h:118
trace_kfree include/trace/events/kmem.h:118 [inline]
kfree+0x25f/0x2a0 mm/slub.c:4554
skb_free_head net/core/skbuff.c:655 [inline]
skb_release_data+0x6fe/0x850 net/core/skbuff.c:677
skb_release_all net/core/skbuff.c:742 [inline]
__kfree_skb+0x4c/0x60 net/core/skbuff.c:756
tcp_data_queue+0x1962/0x5700 net/ipv4/tcp_input.c:-1
tcp_rcv_established+0xad0/0x1cb0 net/ipv4/tcp_input.c:6066
tcp_v4_do_rcv+0x44b/0x9b0 net/ipv4/tcp_ipv4.c:1731
tcp_v4_rcv+0x268f/0x2cb0 net/ipv4/tcp_ipv4.c:2143
ip_protocol_deliver_rcu+0x3ad/0x770 net/ipv4/ip_input.c:204
ip_local_deliver_finish+0x1d5/0x320 net/ipv4/ip_input.c:231
NF_HOOK+0x2d6/0x360 include/linux/netfilter.h:302
NF_HOOK+0x2d6/0x360 include/linux/netfilter.h:302
__netif_receive_skb_one_core net/core/dev.c:5525 [inline]
__netif_receive_skb+0xcc/0x290 net/core/dev.c:5639
process_backlog+0x364/0x780 net/core/dev.c:6516
__napi_poll+0xc0/0x430 net/core/dev.c:7075
napi_poll net/core/dev.c:7142 [inline]
net_rx_action+0x4a8/0x9c0 net/core/dev.c:7232
handle_softirqs+0x328/0x820 kernel/softirq.c:576
do_softirq+0x13b/0x200 kernel/softirq.c:477
__local_bh_enable_ip+0x174/0x1b0 kernel/softirq.c:401
rcu_read_unlock_bh include/linux/rcupdate.h:810 [inline]
ip_finish_output2+0xd32/0x1080 net/ipv4/ip_output.c:229
dst_output include/net/dst.h:452 [inline]
ip_local_out net/ipv4/ip_output.c:126 [inline]
__ip_queue_xmit+0x11c3/0x1c00 net/ipv4/ip_output.c:532
__tcp_transmit_skb+0x1ced/0x31c0 net/ipv4/tcp_output.c:1404
tcp_recvmsg_locked+0x1f25/0x2760 net/ipv4/tcp.c:2533
tcp_recvmsg+0x350/0x710 net/ipv4/tcp.c:2563
inet_recvmsg+0x136/0x1e0 net/ipv4/af_inet.c:868
sock_recvmsg_nosec net/socket.c:968 [inline]
sock_recvmsg net/socket.c:986 [inline]
sock_read_iter+0x2a2/0x340 net/socket.c:1067
call_read_iter include/linux/fs.h:2167 [inline]
new_sync_read fs/read_write.c:404 [inline]
vfs_read+0x725/0xcf0 fs/read_write.c:485
ksys_read+0x14d/0x250 fs/read_write.c:623
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x4c/0xa0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x66/0xd0
RIP: 0033:0x7fb5b2aeb11d
Code: a8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb bd e8 a8 48 00 00 0f 1f 84 00 00 00 00 00 80 3d 41 d4 22 00 00 74 17 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 5b c3 66 2e 0f 1f 84 00 00 00 00 00 48 83 ec
RSP: 002b:00007ffdd0a2d6a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
RAX: ffffffffffffffda RBX: 00007ffdd0a2dc00 RCX: 00007fb5b2aeb11d
RDX: 0000000000000004 RSI: 00007ffdd0a2d6bc RDI: 0000000000000003
RBP: 0000000000000000 R08: 0000000000000284 R09: 002938f8b2d0dd5e
R10: 0000014c447048ee R11: 0000000000000246 R12: 00007ffdd0a2dad0
R13: 0000000000000004 R14: 00007ffdd0a2d6bc R15: 00007ffdd0a2d750