BUG: MAX_STACK_TRACE_ENTRIES too low! turning off the locking correctness validator. CPU: 0 UID: 0 PID: 8278 Comm: syz.2.63633 Not tainted 6.13.0-rc3-syzkaller #0 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014 Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120 save_trace+0x78f/0xb60 kernel/locking/lockdep.c:579 mark_lock+0x2d2/0xc60 kernel/locking/lockdep.c:4744 mark_usage kernel/locking/lockdep.c:4670 [inline] __lock_acquire+0x9f1/0x3c40 kernel/locking/lockdep.c:5180 lock_acquire.part.0+0x11b/0x380 kernel/locking/lockdep.c:5849 __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline] _raw_spin_lock+0x2e/0x40 kernel/locking/spinlock.c:154 htab_lock_bucket kernel/bpf/hashtab.c:167 [inline] htab_lru_map_delete_elem+0x1c8/0x790 kernel/bpf/hashtab.c:1484 bpf_prog_029d1888f6cd2729+0x48/0x4c bpf_dispatcher_nop_func include/linux/bpf.h:1290 [inline] __bpf_prog_run include/linux/filter.h:701 [inline] bpf_prog_run include/linux/filter.h:708 [inline] __bpf_trace_run kernel/trace/bpf_trace.c:2362 [inline] bpf_trace_run2+0x231/0x590 kernel/trace/bpf_trace.c:2403 __bpf_trace_tlb_flush+0xd2/0x110 include/trace/events/tlb.h:38 trace_tlb_flush+0xf7/0x180 include/trace/events/tlb.h:38 switch_mm_irqs_off+0x395/0xb10 arch/x86/mm/tlb.c:638 unuse_temporary_mm arch/x86/kernel/alternative.c:1860 [inline] __text_poke+0x543/0xca0 arch/x86/kernel/alternative.c:1970 text_poke_bp_batch+0x1cd/0x760 arch/x86/kernel/alternative.c:2321 text_poke_flush arch/x86/kernel/alternative.c:2515 [inline] text_poke_flush arch/x86/kernel/alternative.c:2512 [inline] text_poke_finish+0x30/0x40 arch/x86/kernel/alternative.c:2522 arch_jump_label_transform_apply+0x1c/0x30 arch/x86/kernel/jump_label.c:146 jump_label_update+0x1d7/0x400 kernel/jump_label.c:920 static_key_enable_cpuslocked+0x1b7/0x270 kernel/jump_label.c:210 static_key_enable+0x1a/0x20 kernel/jump_label.c:223 tracepoint_add_func+0xac8/0xeb0 kernel/tracepoint.c:315 tracepoint_probe_register_prio_may_exist+0xbd/0x110 kernel/tracepoint.c:435 tracepoint_probe_register_may_exist include/linux/tracepoint.h:50 [inline] bpf_probe_register+0x189/0x200 kernel/trace/bpf_trace.c:2430 bpf_raw_tp_link_attach+0x2cd/0x5f0 kernel/bpf/syscall.c:3981 bpf_raw_tracepoint_open kernel/bpf/syscall.c:4012 [inline] __sys_bpf+0x3a4/0x49c0 kernel/bpf/syscall.c:5832 __do_sys_bpf kernel/bpf/syscall.c:5897 [inline] __se_sys_bpf kernel/bpf/syscall.c:5895 [inline] __x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5895 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7faa66f85d19 Code: Unable to access opcode bytes at 0x7faa66f85cef. RSP: 002b:00007faa67df0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 RAX: ffffffffffffffda RBX: 00007faa67175fa0 RCX: 00007faa66f85d19 RDX: 0000000000000010 RSI: 0000000020000080 RDI: 0000000000000011 RBP: 00007faa67001a20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007faa67175fa0 R15: 00007ffe6a6dfb88