------------[ cut here ]------------ WARNING: CPU: 1 PID: 4354 at kernel/softirq.c:363 __local_bh_enable_ip+0x1b3/0x1f0 Modules linked in: CPU: 1 PID: 4354 Comm: syz-executor.0 Not tainted 5.15.153-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 RIP: 0010:__local_bh_enable_ip+0x1b3/0x1f0 kernel/softirq.c:363 Code: 04 25 28 00 00 00 48 3b 44 24 60 75 4a 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 0f 0b e9 d0 fe ff ff e8 3f 00 00 00 eb a2 <0f> 0b e9 02 ff ff ff 48 c7 c1 c4 c8 e3 8d 80 e1 07 80 c1 03 38 c1 RSP: 0018:ffffc90003126ec0 EFLAGS: 00010046 RAX: 0000000000000000 RBX: 1ffff92000624ddc RCX: 0000000000000001 RDX: 0000000000000000 RSI: 0000000000000201 RDI: ffffffff884ede60 RBP: ffffc90003126f80 R08: dffffc0000000000 R09: ffffed10033abe8b R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 R13: 0000000000000006 R14: ffffc90003126f00 R15: 0000000000000201 FS: 0000000000000000(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fc7ab717bf8 CR3: 00000000645c5000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: sock_hash_delete_elem+0x1a0/0x2f0 net/core/sock_map.c:945 bpf_prog_a404c8dc03f1c97c+0x42/0xfcc bpf_dispatcher_nop_func include/linux/bpf.h:785 [inline] __bpf_prog_run include/linux/filter.h:628 [inline] bpf_prog_run include/linux/filter.h:635 [inline] __bpf_trace_run kernel/trace/bpf_trace.c:1880 [inline] bpf_trace_run3+0x1d1/0x380 kernel/trace/bpf_trace.c:1918 __traceiter_sched_switch+0x7d/0xb0 include/trace/events/sched.h:220 trace_sched_switch include/trace/events/sched.h:220 [inline] __schedule+0x1e8d/0x45b0 kernel/sched/core.c:6373 preempt_schedule_common+0x83/0xd0 kernel/sched/core.c:6552 preempt_schedule+0xd9/0xe0 kernel/sched/core.c:6577 preempt_schedule_thunk+0x16/0x18 arch/x86/entry/thunk_64.S:34 __raw_spin_unlock include/linux/spinlock_api_smp.h:152 [inline] _raw_spin_unlock+0x36/0x40 kernel/locking/spinlock.c:186 spin_unlock include/linux/spinlock.h:403 [inline] zap_pte_range mm/memory.c:1435 [inline] zap_pmd_range mm/memory.c:1494 [inline] zap_pud_range mm/memory.c:1523 [inline] zap_p4d_range mm/memory.c:1544 [inline] unmap_page_range+0x2143/0x2630 mm/memory.c:1565 unmap_vmas+0x1f8/0x390 mm/memory.c:1642 exit_mmap+0x3b6/0x670 mm/mmap.c:3186 __mmput+0x112/0x3b0 kernel/fork.c:1126 exit_mm+0x688/0x7f0 kernel/exit.c:548 do_exit+0x626/0x2480 kernel/exit.c:859 do_group_exit+0x144/0x310 kernel/exit.c:994 get_signal+0xc66/0x14e0 kernel/signal.c:2889 arch_do_signal_or_restart+0xc3/0x1890 arch/x86/kernel/signal.c:867 handle_signal_work kernel/entry/common.c:148 [inline] exit_to_user_mode_loop+0x97/0x130 kernel/entry/common.c:172 exit_to_user_mode_prepare+0xb1/0x140 kernel/entry/common.c:208 __syscall_exit_to_user_mode_work kernel/entry/common.c:290 [inline] syscall_exit_to_user_mode+0x5d/0x250 kernel/entry/common.c:301 do_syscall_64+0x49/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x61/0xcb RIP: 0033:0x7f8613a88e69 Code: Unable to access opcode bytes at RIP 0x7f8613a88e3f. RSP: 002b:00007f8611ffb178 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: 0000000000000001 RBX: 00007f8613bb6f88 RCX: 00007f8613a88e69 RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f8613bb6f8c RBP: 00007f8613bb6f80 R08: 0000000000000010 R09: 00007f8611ffb6c0 R10: 000000000000006a R11: 0000000000000246 R12: 00007f8613bb6f8c R13: 000000000000000b R14: 00007ffed2c258f0 R15: 00007ffed2c259d8