BUG: MAX_STACK_TRACE_ENTRIES too low!
turning off the locking correctness validator.
CPU: 0 PID: 2942 Comm: syz-executor215 Not tainted 5.15.167-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
Call Trace:
 <IRQ>
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x1e3/0x2d0 lib/dump_stack.c:106
 save_trace+0x88a/0xab0 kernel/locking/lockdep.c:547
 check_prev_add kernel/locking/lockdep.c:3114 [inline]
 check_prevs_add kernel/locking/lockdep.c:3172 [inline]
 validate_chain+0x28fa/0x5930 kernel/locking/lockdep.c:3788
 __lock_acquire+0x1295/0x1ff0 kernel/locking/lockdep.c:5012
 lock_acquire+0x1db/0x4f0 kernel/locking/lockdep.c:5623
 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline]
 _raw_spin_lock_irqsave+0xd1/0x120 kernel/locking/spinlock.c:162
 htab_lock_bucket kernel/bpf/hashtab.c:183 [inline]
 htab_lru_map_delete_elem+0x1c2/0x650 kernel/bpf/hashtab.c:1394
 bpf_prog_d284ea97e99fac5b+0x3f/0x5a4
 bpf_dispatcher_nop_func include/linux/bpf.h:790 [inline]
 __bpf_prog_run include/linux/filter.h:628 [inline]
 bpf_prog_run include/linux/filter.h:635 [inline]
 __bpf_trace_run kernel/trace/bpf_trace.c:1880 [inline]
 bpf_trace_run2+0x19e/0x340 kernel/trace/bpf_trace.c:1917
 __bpf_trace_kfree+0x6e/0x90 include/trace/events/kmem.h:118
 __traceiter_kfree+0x26/0x40 include/trace/events/kmem.h:118
 trace_kfree include/trace/events/kmem.h:118 [inline]
 kfree+0x22f/0x270 mm/slub.c:4549
 skb_free_head net/core/skbuff.c:655 [inline]
 skb_release_data+0x73a/0x8a0 net/core/skbuff.c:677
 skb_release_all net/core/skbuff.c:742 [inline]
 __kfree_skb+0x4c/0x60 net/core/skbuff.c:756
 tcp_clean_rtx_queue net/ipv4/tcp_input.c:3368 [inline]
 tcp_ack+0x2326/0x6ab0 net/ipv4/tcp_input.c:3925
 tcp_rcv_established+0xf2d/0x1e20 net/ipv4/tcp_input.c:5938
 tcp_v4_do_rcv+0x423/0x960 net/ipv4/tcp_ipv4.c:1728
 tcp_v4_rcv+0x2740/0x2d80 net/ipv4/tcp_ipv4.c:2140
 ip_protocol_deliver_rcu+0x381/0x730 net/ipv4/ip_input.c:204
 ip_local_deliver_finish+0x1db/0x320 net/ipv4/ip_input.c:231
 NF_HOOK+0x364/0x410 include/linux/netfilter.h:302
 dst_input include/net/dst.h:453 [inline]
 ip_sublist_rcv_finish net/ipv4/ip_input.c:577 [inline]
 ip_list_rcv_finish net/ipv4/ip_input.c:628 [inline]
 ip_sublist_rcv+0xb0f/0xe50 net/ipv4/ip_input.c:636
 ip_list_rcv+0x422/0x470 net/ipv4/ip_input.c:671
 __netif_receive_skb_list_ptype net/core/dev.c:5528 [inline]
 __netif_receive_skb_list_core+0x6b1/0x890 net/core/dev.c:5576
 __netif_receive_skb_list net/core/dev.c:5628 [inline]
 netif_receive_skb_list_internal+0x9ed/0xdf0 net/core/dev.c:5719
 gro_normal_list net/core/dev.c:5873 [inline]
 napi_complete_done+0x352/0x820 net/core/dev.c:6611
 virtqueue_napi_complete drivers/net/virtio_net.c:357 [inline]
 virtnet_poll+0xbd1/0x1260 drivers/net/virtio_net.c:1592
 __napi_poll+0xc7/0x440 net/core/dev.c:7035
 napi_poll net/core/dev.c:7102 [inline]
 net_rx_action+0x617/0xda0 net/core/dev.c:7192
 handle_softirqs+0x3a7/0x930 kernel/softirq.c:558
 __do_softirq kernel/softirq.c:592 [inline]
 invoke_softirq kernel/softirq.c:432 [inline]
 __irq_exit_rcu+0x157/0x240 kernel/softirq.c:641
 irq_exit_rcu+0x5/0x20 kernel/softirq.c:653
 common_interrupt+0xa4/0xc0 arch/x86/kernel/irq.c:240
 </IRQ>
 <TASK>
 asm_common_interrupt+0x22/0x40 arch/x86/include/asm/idtentry.h:629
RIP: 0010:debug_check_no_locks_freed+0x29d/0x4a0 kernel/locking/lockdep.c:6419
Code: 00 00 00 fc ff df f6 44 24 61 02 48 8b 5c 24 38 0f 85 42 01 00 00 f7 44 24 30 00 02 00 00 74 01 fb 48 c7 44 24 40 0e 36 e0 45 <48> c7 04 1a 00 00 00 00 66 c7 44 1a 09 00 00 c6 44 1a 0b 00 65 48
RSP: 0018:ffffc90002f178c0 EFLAGS: 00000206
RAX: 0000000000000000 RBX: 1ffff920005e2f20 RCX: 0000000000000002
RDX: dffffc0000000000 RSI: 0000000000000040 RDI: ffff888077c509d0
RBP: ffffc90002f179c0 R08: ffffffff814b4623 R09: fffffbfff18fb579
R10: 0000000000000000 R11: dffffc0000000001 R12: ffffc90002f17940
R13: 1ffff11005316c85 R14: ffffc90002f17920 R15: ffffffff8a89dd00
 __raw_spin_lock_init+0x27/0x100 kernel/locking/spinlock_debug.c:23
 copy_process+0xed9/0x3ef0 kernel/fork.c:2098
 kernel_clone+0x210/0x960 kernel/fork.c:2604
 __do_sys_clone3 kernel/fork.c:2879 [inline]
 __se_sys_clone3+0x3e1/0x430 kernel/fork.c:2863
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x3b/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x66/0xd0
RIP: 0033:0x7f6bac4163f9
Code: ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 b8 ea ff ff ff 48 85 ff 74 2c 48 85 d2 74 27 49 89 c8 b8 b3 01 00 00 0f 05 <48> 85 c0 7c 18 74 01 c3 31 ed 48 83 e4 f0 4c 89 c7 ff d2 48 89 c7
RSP: 002b:00007ffe8726b398 EFLAGS: 00000206 ORIG_RAX: 00000000000001b3
RAX: ffffffffffffffda RBX: 00007f6bac3c5b30 RCX: 00007f6bac4163f9
RDX: 00007f6bac3c5b30 RSI: 0000000000000058 RDI: 00007ffe8726b3e0
RBP: 00007f6bac3aa6c0 R08: 00007f6bac3aa6c0 R09: 00007ffe8726b4c7
R10: 0000000000000008 R11: 0000000000000206 R12: ffffffffffffffb0
R13: 0000000000000000 R14: 00007ffe8726b3e0 R15: 00007ffe8726b4c8
 </TASK>
----------------
Code disassembly (best guess), 5 bytes skipped:
   0:	df f6                	fcomip %st(6),%st
   2:	44 24 61             	rex.R and $0x61,%al
   5:	02 48 8b             	add    -0x75(%rax),%cl
   8:	5c                   	pop    %rsp
   9:	24 38                	and    $0x38,%al
   b:	0f 85 42 01 00 00    	jne    0x153
  11:	f7 44 24 30 00 02 00 	testl  $0x200,0x30(%rsp)
  18:	00
  19:	74 01                	je     0x1c
  1b:	fb                   	sti
  1c:	48 c7 44 24 40 0e 36 	movq   $0x45e0360e,0x40(%rsp)
  23:	e0 45
* 25:	48 c7 04 1a 00 00 00 	movq   $0x0,(%rdx,%rbx,1) <-- trapping instruction
  2c:	00
  2d:	66 c7 44 1a 09 00 00 	movw   $0x0,0x9(%rdx,%rbx,1)
  34:	c6 44 1a 0b 00       	movb   $0x0,0xb(%rdx,%rbx,1)
  39:	65                   	gs
  3a:	48                   	rex.W