BUG: MAX_STACK_TRACE_ENTRIES too low! turning off the locking correctness validator. CPU: 1 PID: 1367 Comm: sed Not tainted 5.15.185-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 Call Trace: dump_stack_lvl+0x168/0x230 lib/dump_stack.c:106 save_trace+0x85f/0xa80 kernel/locking/lockdep.c:547 check_prev_add kernel/locking/lockdep.c:3114 [inline] check_prevs_add kernel/locking/lockdep.c:3172 [inline] validate_chain kernel/locking/lockdep.c:3788 [inline] __lock_acquire+0x3b0b/0x7c60 kernel/locking/lockdep.c:5012 lock_acquire+0x197/0x3f0 kernel/locking/lockdep.c:5623 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline] _raw_spin_lock_irqsave+0xa4/0xf0 kernel/locking/spinlock.c:162 htab_lock_bucket kernel/bpf/hashtab.c:183 [inline] htab_map_delete_elem+0x1b2/0x520 kernel/bpf/hashtab.c:1361 bpf_prog_2c29ac5cdc6b1842+0x3a/0xcf4 bpf_dispatcher_nop_func include/linux/bpf.h:790 [inline] __bpf_prog_run include/linux/filter.h:628 [inline] bpf_prog_run include/linux/filter.h:635 [inline] __bpf_trace_run kernel/trace/bpf_trace.c:1878 [inline] bpf_trace_run3+0x17e/0x320 kernel/trace/bpf_trace.c:1916 __bpf_trace_kmem_cache_free+0x99/0xc0 include/trace/events/kmem.h:138 __traceiter_kmem_cache_free+0x30/0x50 include/trace/events/kmem.h:138 trace_kmem_cache_free include/trace/events/kmem.h:138 [inline] kmem_cache_free+0x1e7/0x210 mm/slub.c:3516 mmdrop include/linux/sched/mm.h:49 [inline] finish_task_switch+0x215/0x640 kernel/sched/core.c:4929 context_switch kernel/sched/core.c:5033 [inline] __schedule+0x11c0/0x43b0 kernel/sched/core.c:6376 preempt_schedule_irq+0xb1/0x150 kernel/sched/core.c:6780 irqentry_exit+0x63/0x70 kernel/entry/common.c:432 asm_common_interrupt+0x22/0x40 arch/x86/include/asm/idtentry.h:667 RIP: 0010:check_kcov_mode kernel/kcov.c:183 [inline] RIP: 0010:write_comp_data kernel/kcov.c:227 [inline] RIP: 0010:__sanitizer_cov_trace_cmp8+0x32/0x80 kernel/kcov.c:273 Code: b4 ab 8a 7e 65 8b 15 b5 ab 8a 7e 81 e2 00 01 ff 00 74 11 81 fa 00 01 00 00 75 57 83 b9 34 16 00 00 00 74 4e 8b 91 10 16 00 00 <83> fa 03 75 43 48 8b 91 18 16 00 00 44 8b 89 14 16 00 00 49 c1 e1 RSP: 0018:ffffc9000349fa80 EFLAGS: 00000246 RAX: ffffffff81aeea26 RBX: 00007f92bd534000 RCX: ffff88801d993b80 RDX: 0000000000000000 RSI: 00007f92bd534000 RDI: 00007f92bd534000 RBP: 1ffff1100b0cc821 R08: dffffc0000000000 R09: ffffed100586d1d0 R10: ffffed100586d1d0 R11: 1ffff1100586d1cf R12: ffff888058664128 R13: dffffc0000000000 R14: 00007f92bd534000 R15: ffff888058664108 browse_rb mm/mmap.c:345 [inline] validate_mm+0x296/0x950 mm/mmap.c:422 remove_vma_list mm/mmap.c:2619 [inline] __do_munmap+0xcc4/0xdc0 mm/mmap.c:2890 do_munmap mm/mmap.c:2898 [inline] munmap_vma_range mm/mmap.c:602 [inline] __mmap_region mm/mmap.c:1745 [inline] mmap_region+0x762/0x15e0 mm/mmap.c:2921 do_mmap+0x77a/0xdf0 mm/mmap.c:1574 vm_mmap_pgoff+0x1b2/0x2b0 mm/util.c:551 ksys_mmap_pgoff+0x542/0x780 mm/mmap.c:1623 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x4c/0xa0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x66/0xd0 RIP: 0033:0x7f92bd555242 Code: 08 00 04 00 00 eb e2 90 41 f7 c1 ff 0f 00 00 75 27 55 89 cd 53 48 89 fb 48 85 ff 74 33 41 89 ea 48 89 df b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 5e 5b 5d c3 0f 1f 00 c7 05 46 40 01 00 16 00 RSP: 002b:00007fffda3ebbd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000009 RAX: ffffffffffffffda RBX: 00007f92bd202000 RCX: 00007f92bd555242 RDX: 0000000000000001 RSI: 0000000000026000 RDI: 00007f92bd202000 RBP: 0000000000000812 R08: 0000000000000003 R09: 000000000003a000 R10: 0000000000000812 R11: 0000000000000206 R12: 00007fffda3ebc60 R13: 00007f92bd2346b0 R14: 00007fffda3ec010 R15: 00000ffffb47d77e ---------------- Code disassembly (best guess): 0: b4 ab mov $0xab,%ah 2: 8a 7e 65 mov 0x65(%rsi),%bh 5: 8b 15 b5 ab 8a 7e mov 0x7e8aabb5(%rip),%edx # 0x7e8aabc0 b: 81 e2 00 01 ff 00 and $0xff0100,%edx 11: 74 11 je 0x24 13: 81 fa 00 01 00 00 cmp $0x100,%edx 19: 75 57 jne 0x72 1b: 83 b9 34 16 00 00 00 cmpl $0x0,0x1634(%rcx) 22: 74 4e je 0x72 24: 8b 91 10 16 00 00 mov 0x1610(%rcx),%edx * 2a: 83 fa 03 cmp $0x3,%edx <-- trapping instruction 2d: 75 43 jne 0x72 2f: 48 8b 91 18 16 00 00 mov 0x1618(%rcx),%rdx 36: 44 8b 89 14 16 00 00 mov 0x1614(%rcx),%r9d 3d: 49 rex.WB 3e: c1 .byte 0xc1 3f: e1 .byte 0xe1