BUG: MAX_STACK_TRACE_ENTRIES too low!
turning off the locking correctness validator.
CPU: 0 PID: 2942 Comm: syz-executor215 Not tainted 5.15.167-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0x1e3/0x2d0 lib/dump_stack.c:106
save_trace+0x88a/0xab0 kernel/locking/lockdep.c:547
check_prev_add kernel/locking/lockdep.c:3114 [inline]
check_prevs_add kernel/locking/lockdep.c:3172 [inline]
validate_chain+0x28fa/0x5930 kernel/locking/lockdep.c:3788
__lock_acquire+0x1295/0x1ff0 kernel/locking/lockdep.c:5012
lock_acquire+0x1db/0x4f0 kernel/locking/lockdep.c:5623
__raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline]
_raw_spin_lock_irqsave+0xd1/0x120 kernel/locking/spinlock.c:162
htab_lock_bucket kernel/bpf/hashtab.c:183 [inline]
htab_lru_map_delete_elem+0x1c2/0x650 kernel/bpf/hashtab.c:1394
bpf_prog_d284ea97e99fac5b+0x3f/0x5a4
bpf_dispatcher_nop_func include/linux/bpf.h:790 [inline]
__bpf_prog_run include/linux/filter.h:628 [inline]
bpf_prog_run include/linux/filter.h:635 [inline]
__bpf_trace_run kernel/trace/bpf_trace.c:1880 [inline]
bpf_trace_run2+0x19e/0x340 kernel/trace/bpf_trace.c:1917
__bpf_trace_kfree+0x6e/0x90 include/trace/events/kmem.h:118
__traceiter_kfree+0x26/0x40 include/trace/events/kmem.h:118
trace_kfree include/trace/events/kmem.h:118 [inline]
kfree+0x22f/0x270 mm/slub.c:4549
skb_free_head net/core/skbuff.c:655 [inline]
skb_release_data+0x73a/0x8a0 net/core/skbuff.c:677
skb_release_all net/core/skbuff.c:742 [inline]
__kfree_skb+0x4c/0x60 net/core/skbuff.c:756
tcp_clean_rtx_queue net/ipv4/tcp_input.c:3368 [inline]
tcp_ack+0x2326/0x6ab0 net/ipv4/tcp_input.c:3925
tcp_rcv_established+0xf2d/0x1e20 net/ipv4/tcp_input.c:5938
tcp_v4_do_rcv+0x423/0x960 net/ipv4/tcp_ipv4.c:1728
tcp_v4_rcv+0x2740/0x2d80 net/ipv4/tcp_ipv4.c:2140
ip_protocol_deliver_rcu+0x381/0x730 net/ipv4/ip_input.c:204
ip_local_deliver_finish+0x1db/0x320 net/ipv4/ip_input.c:231
NF_HOOK+0x364/0x410 include/linux/netfilter.h:302
dst_input include/net/dst.h:453 [inline]
ip_sublist_rcv_finish net/ipv4/ip_input.c:577 [inline]
ip_list_rcv_finish net/ipv4/ip_input.c:628 [inline]
ip_sublist_rcv+0xb0f/0xe50 net/ipv4/ip_input.c:636
ip_list_rcv+0x422/0x470 net/ipv4/ip_input.c:671
__netif_receive_skb_list_ptype net/core/dev.c:5528 [inline]
__netif_receive_skb_list_core+0x6b1/0x890 net/core/dev.c:5576
__netif_receive_skb_list net/core/dev.c:5628 [inline]
netif_receive_skb_list_internal+0x9ed/0xdf0 net/core/dev.c:5719
gro_normal_list net/core/dev.c:5873 [inline]
napi_complete_done+0x352/0x820 net/core/dev.c:6611
virtqueue_napi_complete drivers/net/virtio_net.c:357 [inline]
virtnet_poll+0xbd1/0x1260 drivers/net/virtio_net.c:1592
__napi_poll+0xc7/0x440 net/core/dev.c:7035
napi_poll net/core/dev.c:7102 [inline]
net_rx_action+0x617/0xda0 net/core/dev.c:7192
handle_softirqs+0x3a7/0x930 kernel/softirq.c:558
__do_softirq kernel/softirq.c:592 [inline]
invoke_softirq kernel/softirq.c:432 [inline]
__irq_exit_rcu+0x157/0x240 kernel/softirq.c:641
irq_exit_rcu+0x5/0x20 kernel/softirq.c:653
common_interrupt+0xa4/0xc0 arch/x86/kernel/irq.c:240
asm_common_interrupt+0x22/0x40 arch/x86/include/asm/idtentry.h:629
RIP: 0010:debug_check_no_locks_freed+0x29d/0x4a0 kernel/locking/lockdep.c:6419
Code: 00 00 00 fc ff df f6 44 24 61 02 48 8b 5c 24 38 0f 85 42 01 00 00 f7 44 24 30 00 02 00 00 74 01 fb 48 c7 44 24 40 0e 36 e0 45 <48> c7 04 1a 00 00 00 00 66 c7 44 1a 09 00 00 c6 44 1a 0b 00 65 48
RSP: 0018:ffffc90002f178c0 EFLAGS: 00000206
RAX: 0000000000000000 RBX: 1ffff920005e2f20 RCX: 0000000000000002
RDX: dffffc0000000000 RSI: 0000000000000040 RDI: ffff888077c509d0
RBP: ffffc90002f179c0 R08: ffffffff814b4623 R09: fffffbfff18fb579
R10: 0000000000000000 R11: dffffc0000000001 R12: ffffc90002f17940
R13: 1ffff11005316c85 R14: ffffc90002f17920 R15: ffffffff8a89dd00
__raw_spin_lock_init+0x27/0x100 kernel/locking/spinlock_debug.c:23
copy_process+0xed9/0x3ef0 kernel/fork.c:2098
kernel_clone+0x210/0x960 kernel/fork.c:2604
__do_sys_clone3 kernel/fork.c:2879 [inline]
__se_sys_clone3+0x3e1/0x430 kernel/fork.c:2863
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x3b/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x66/0xd0
RIP: 0033:0x7f6bac4163f9
Code: ff ff f7 d8 64 89 01 48 83 c8 ff c3 0f 1f 44 00 00 b8 ea ff ff ff 48 85 ff 74 2c 48 85 d2 74 27 49 89 c8 b8 b3 01 00 00 0f 05 <48> 85 c0 7c 18 74 01 c3 31 ed 48 83 e4 f0 4c 89 c7 ff d2 48 89 c7
RSP: 002b:00007ffe8726b398 EFLAGS: 00000206 ORIG_RAX: 00000000000001b3
RAX: ffffffffffffffda RBX: 00007f6bac3c5b30 RCX: 00007f6bac4163f9
RDX: 00007f6bac3c5b30 RSI: 0000000000000058 RDI: 00007ffe8726b3e0
RBP: 00007f6bac3aa6c0 R08: 00007f6bac3aa6c0 R09: 00007ffe8726b4c7
R10: 0000000000000008 R11: 0000000000000206 R12: ffffffffffffffb0
R13: 0000000000000000 R14: 00007ffe8726b3e0 R15: 00007ffe8726b4c8
----------------
Code disassembly (best guess), 5 bytes skipped:
0: df f6 fcomip %st(6),%st
2: 44 24 61 rex.R and $0x61,%al
5: 02 48 8b add -0x75(%rax),%cl
8: 5c pop %rsp
9: 24 38 and $0x38,%al
b: 0f 85 42 01 00 00 jne 0x153
11: f7 44 24 30 00 02 00 testl $0x200,0x30(%rsp)
18: 00
19: 74 01 je 0x1c
1b: fb sti
1c: 48 c7 44 24 40 0e 36 movq $0x45e0360e,0x40(%rsp)
23: e0 45
* 25: 48 c7 04 1a 00 00 00 movq $0x0,(%rdx,%rbx,1) <-- trapping instruction
2c: 00
2d: 66 c7 44 1a 09 00 00 movw $0x0,0x9(%rdx,%rbx,1)
34: c6 44 1a 0b 00 movb $0x0,0xb(%rdx,%rbx,1)
39: 65 gs
3a: 48 rex.W