BUG: MAX_STACK_TRACE_ENTRIES too low!
turning off the locking correctness validator.
CPU: 0 UID: 0 PID: 14844 Comm: syz.4.8077 Not tainted 6.13.0-rc3-syzkaller-g9468f39ba478 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120
save_trace+0x926/0xb50 kernel/locking/lockdep.c:579
check_prev_add kernel/locking/lockdep.c:3222 [inline]
check_prevs_add kernel/locking/lockdep.c:3280 [inline]
validate_chain+0x2bde/0x5920 kernel/locking/lockdep.c:3904
__lock_acquire+0x1397/0x2100 kernel/locking/lockdep.c:5226
lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5849
__raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline]
_raw_spin_lock+0x2e/0x40 kernel/locking/spinlock.c:154
htab_lock_bucket+0x1a4/0x370 kernel/bpf/hashtab.c:167
htab_lru_map_delete_elem+0x1f1/0x700 kernel/bpf/hashtab.c:1484
bpf_prog_0fa55d542c80f9a0+0x6a/0x6e
bpf_dispatcher_nop_func include/linux/bpf.h:1290 [inline]
__bpf_prog_run include/linux/filter.h:701 [inline]
bpf_prog_run include/linux/filter.h:708 [inline]
__bpf_trace_run kernel/trace/bpf_trace.c:2365 [inline]
bpf_trace_run2+0x2ec/0x540 kernel/trace/bpf_trace.c:2406
__traceiter_kfree+0x2b/0x50 include/trace/events/kmem.h:94
trace_kfree include/trace/events/kmem.h:94 [inline]
kfree+0x382/0x430 mm/slub.c:4748
security_task_free+0xa4/0x1a0 security/security.c:3172
__put_task_struct+0xf9/0x290 kernel/fork.c:983
put_task_struct include/linux/sched/task.h:144 [inline]
delayed_put_task_struct+0x125/0x300 kernel/exit.c:227
rcu_do_batch kernel/rcu/tree.c:2567 [inline]
rcu_core+0xaaa/0x17a0 kernel/rcu/tree.c:2823
handle_softirqs+0x2d4/0x9b0 kernel/softirq.c:561
do_softirq+0x11b/0x1e0 kernel/softirq.c:462
__local_bh_enable_ip+0x1bb/0x200 kernel/softirq.c:389
spin_unlock_bh include/linux/spinlock.h:396 [inline]
bpf_map_alloc_id+0x87/0xe0 kernel/bpf/syscall.c:448
map_create+0xdc3/0x11c0 kernel/bpf/syscall.c:1499
__sys_bpf+0x6d1/0x810 kernel/bpf/syscall.c:5772
__do_sys_bpf kernel/bpf/syscall.c:5897 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5895 [inline]
__x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:5895
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fad56385d29
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffd9520be98 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007fad56575fa0 RCX: 00007fad56385d29
RDX: 0000000000000048 RSI: 0000000020000040 RDI: 1900000000000000
RBP: 00007fad56401b08 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007fad56575fa0 R14: 00007fad56575fa0 R15: 0000000000000082