=====================================================
WARNING: HARDIRQ-safe -> HARDIRQ-unsafe lock order detected
6.8.0-syzkaller-05236-g443574b03387 #0 Not tainted
-----------------------------------------------------
syz-executor.4/5577 [HC0[0]:SC0[2]:HE0:SE0] is trying to acquire:
ffff888060c36200 (&stab->lock){+...}-{2:2}, at: spin_lock_bh include/linux/spinlock.h:356 [inline]
ffff888060c36200 (&stab->lock){+...}-{2:2}, at: __sock_map_delete net/core/sock_map.c:414 [inline]
ffff888060c36200 (&stab->lock){+...}-{2:2}, at: sock_map_delete_elem+0x97/0x140 net/core/sock_map.c:446

and this task is already holding:
ffff88801c7465d8 (&sighand->siglock){-.-.}-{2:2}, at: do_notify_parent+0xc84/0x10a0 kernel/signal.c:2115
which would create a new lock dependency:
 (&sighand->siglock){-.-.}-{2:2} -> (&stab->lock){+...}-{2:2}

but this new dependency connects a HARDIRQ-irq-safe lock:
 (&sighand->siglock){-.-.}-{2:2}

... which became HARDIRQ-irq-safe at:
  lock_acquire+0x1e4/0x530 kernel/locking/lockdep.c:5754
  __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline]
  _raw_spin_lock_irqsave+0xd5/0x120 kernel/locking/spinlock.c:162
  __lock_task_sighand+0x149/0x2e0 kernel/signal.c:1414
  lock_task_sighand include/linux/sched/signal.h:746 [inline]
  do_send_sig_info kernel/signal.c:1300 [inline]
  group_send_sig_info+0x274/0x310 kernel/signal.c:1453
  do_bpf_send_signal+0x85/0x190 kernel/trace/bpf_trace.c:838
  irq_work_single+0xe2/0x240 kernel/irq_work.c:221
  irq_work_run_list kernel/irq_work.c:252 [inline]
  irq_work_run+0x18b/0x350 kernel/irq_work.c:261
  __sysvec_irq_work+0xa8/0x3e0 arch/x86/kernel/irq_work.c:22
  instr_sysvec_irq_work arch/x86/kernel/irq_work.c:17 [inline]
  sysvec_irq_work+0x9e/0xc0 arch/x86/kernel/irq_work.c:17
  asm_sysvec_irq_work+0x1a/0x20 arch/x86/include/asm/idtentry.h:738
  __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:160 [inline]
  _raw_spin_unlock_irq+0x29/0x50 kernel/locking/spinlock.c:202
  spin_unlock_irq include/linux/spinlock.h:401 [inline]
  get_signal+0x156e/0x1850 kernel/signal.c:2910
  arch_do_signal_or_restart+0x96/0x860 arch/x86/kernel/signal.c:310
  exit_to_user_mode_loop kernel/entry/common.c:105 [inline]
  exit_to_user_mode_prepare include/linux/entry-common.h:328 [inline]
  irqentry_exit_to_user_mode+0x79/0x270 kernel/entry/common.c:225
  exc_general_protection+0x410/0x5d0 arch/x86/kernel/traps.c:644
  asm_exc_general_protection+0x26/0x30 arch/x86/include/asm/idtentry.h:617

to a HARDIRQ-irq-unsafe lock:
 (&stab->lock){+...}-{2:2}

... which became HARDIRQ-irq-unsafe at:
...
  lock_acquire+0x1e4/0x530 kernel/locking/lockdep.c:5754
  __raw_spin_lock_bh include/linux/spinlock_api_smp.h:126 [inline]
  _raw_spin_lock_bh+0x35/0x50 kernel/locking/spinlock.c:178
  spin_lock_bh include/linux/spinlock.h:356 [inline]
  __sock_map_delete net/core/sock_map.c:414 [inline]
  sock_map_delete_elem+0x97/0x140 net/core/sock_map.c:446
  bpf_prog_2c29ac5cdc6b1842+0x42/0x46
  bpf_dispatcher_nop_func include/linux/bpf.h:1234 [inline]
  __bpf_prog_run include/linux/filter.h:650 [inline]
  bpf_prog_run include/linux/filter.h:664 [inline]
  __bpf_trace_run kernel/trace/bpf_trace.c:2381 [inline]
  bpf_trace_run4+0x3d7/0x490 kernel/trace/bpf_trace.c:2422
  trace_ext4_ext_rm_leaf include/trace/events/ext4.h:2031 [inline]
  ext4_ext_rm_leaf fs/ext4/extents.c:2600 [inline]
  ext4_ext_remove_space+0x3cf2/0x4db0 fs/ext4/extents.c:2934
  ext4_ext_truncate+0x159/0x2b0 fs/ext4/extents.c:4440
  ext4_truncate+0xa08/0x1130 fs/ext4/inode.c:4146
  ext4_setattr+0x119a/0x1bb0 fs/ext4/inode.c:5454
  notify_change+0xb9d/0xe70 fs/attr.c:499
  do_truncate+0x220/0x310 fs/open.c:66
  handle_truncate fs/namei.c:3301 [inline]
  do_open fs/namei.c:3647 [inline]
  path_openat+0x29fe/0x3240 fs/namei.c:3800
  do_filp_open+0x235/0x490 fs/namei.c:3827
  do_sys_openat2+0x13e/0x1d0 fs/open.c:1407
  do_sys_open fs/open.c:1422 [inline]
  __do_sys_openat fs/open.c:1438 [inline]
  __se_sys_openat fs/open.c:1433 [inline]
  __x64_sys_openat+0x247/0x2a0 fs/open.c:1433
  do_syscall_64+0xfb/0x240
  entry_SYSCALL_64_after_hwframe+0x6d/0x75

other info that might help us debug this:

 Possible interrupt unsafe locking scenario:

       CPU0                    CPU1
       ----                    ----
  lock(&stab->lock);
                               local_irq_disable();
                               lock(&sighand->siglock);
                               lock(&stab->lock);
  <Interrupt>
    lock(&sighand->siglock);

 *** DEADLOCK ***

3 locks held by syz-executor.4/5577:
 #0: ffffffff8de0a058 (tasklist_lock){.+.+}-{2:2}, at: release_task+0x3f6/0x1810 kernel/exit.c:256
 #1: ffff88801c7465d8 (&sighand->siglock){-.-.}-{2:2}, at: do_notify_parent+0xc84/0x10a0 kernel/signal.c:2115
 #2: ffffffff8e131920 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:298 [inline]
 #2: ffffffff8e131920 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:750 [inline]
 #2: ffffffff8e131920 (rcu_read_lock){....}-{1:2}, at: __bpf_trace_run kernel/trace/bpf_trace.c:2380 [inline]
 #2: ffffffff8e131920 (rcu_read_lock){....}-{1:2}, at: bpf_trace_run5+0x197/0x4a0 kernel/trace/bpf_trace.c:2423

the dependencies between HARDIRQ-irq-safe lock and the holding lock:
-> (&sighand->siglock){-.-.}-{2:2} {
   IN-HARDIRQ-W at:
                    lock_acquire+0x1e4/0x530 kernel/locking/lockdep.c:5754
                    __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline]
                    _raw_spin_lock_irqsave+0xd5/0x120 kernel/locking/spinlock.c:162
                    __lock_task_sighand+0x149/0x2e0 kernel/signal.c:1414
                    lock_task_sighand include/linux/sched/signal.h:746 [inline]
                    do_send_sig_info kernel/signal.c:1300 [inline]
                    group_send_sig_info+0x274/0x310 kernel/signal.c:1453
                    do_bpf_send_signal+0x85/0x190 kernel/trace/bpf_trace.c:838
                    irq_work_single+0xe2/0x240 kernel/irq_work.c:221
                    irq_work_run_list kernel/irq_work.c:252 [inline]
                    irq_work_run+0x18b/0x350 kernel/irq_work.c:261
                    __sysvec_irq_work+0xa8/0x3e0 arch/x86/kernel/irq_work.c:22
                    instr_sysvec_irq_work arch/x86/kernel/irq_work.c:17 [inline]
                    sysvec_irq_work+0x9e/0xc0 arch/x86/kernel/irq_work.c:17
                    asm_sysvec_irq_work+0x1a/0x20 arch/x86/include/asm/idtentry.h:738
                    __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:160 [inline]
                    _raw_spin_unlock_irq+0x29/0x50 kernel/locking/spinlock.c:202
                    spin_unlock_irq include/linux/spinlock.h:401 [inline]
                    get_signal+0x156e/0x1850 kernel/signal.c:2910
                    arch_do_signal_or_restart+0x96/0x860 arch/x86/kernel/signal.c:310
                    exit_to_user_mode_loop kernel/entry/common.c:105 [inline]
                    exit_to_user_mode_prepare include/linux/entry-common.h:328 [inline]
                    irqentry_exit_to_user_mode+0x79/0x270 kernel/entry/common.c:225
                    exc_general_protection+0x410/0x5d0 arch/x86/kernel/traps.c:644
                    asm_exc_general_protection+0x26/0x30 arch/x86/include/asm/idtentry.h:617
   IN-SOFTIRQ-W at:
                    lock_acquire+0x1e4/0x530 kernel/locking/lockdep.c:5754
                    __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline]
                    _raw_spin_lock_irqsave+0xd5/0x120 kernel/locking/spinlock.c:162
                    __lock_task_sighand+0x149/0x2e0 kernel/signal.c:1414
                    lock_task_sighand include/linux/sched/signal.h:746 [inline]
                    do_send_sig_info kernel/signal.c:1300 [inline]
                    group_send_sig_info+0x274/0x310 kernel/signal.c:1453
                    bpf_send_signal_common+0x2dd/0x430 kernel/trace/bpf_trace.c:881
                    ____bpf_send_signal kernel/trace/bpf_trace.c:886 [inline]
                    bpf_send_signal+0x19/0x30 kernel/trace/bpf_trace.c:884
                    0xffffffffa0001b07
                    bpf_dispatcher_nop_func include/linux/bpf.h:1234 [inline]
                    __bpf_prog_run include/linux/filter.h:657 [inline]
                    bpf_prog_run include/linux/filter.h:664 [inline]
                    __bpf_trace_run kernel/trace/bpf_trace.c:2381 [inline]
                    bpf_trace_run2+0x204/0x420 kernel/trace/bpf_trace.c:2420
                    trace_kfree include/trace/events/kmem.h:94 [inline]
                    kfree+0x291/0x380 mm/slub.c:4396
                    ip_dst_metrics_put include/net/ip.h:537 [inline]
                    ip6_dst_destroy+0x87/0x3c0 net/ipv6/route.c:361
                    dst_destroy+0x138/0x460 net/core/dst.c:116
                    rcu_do_batch kernel/rcu/tree.c:2196 [inline]
                    rcu_core+0xafd/0x1830 kernel/rcu/tree.c:2471
                    __do_softirq+0x2bc/0x943 kernel/softirq.c:554
                    invoke_softirq kernel/softirq.c:428 [inline]
                    __irq_exit_rcu+0xf2/0x1c0 kernel/softirq.c:633
                    irq_exit_rcu+0x9/0x30 kernel/softirq.c:645
                    instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1043 [inline]
                    sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1043
                    asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702
                    syscall_enter_from_user_mode_work include/linux/entry-common.h:165 [inline]
                    syscall_enter_from_user_mode include/linux/entry-common.h:198 [inline]
                    do_syscall_64+0xbc/0x240 arch/x86/entry/common.c:79
                    entry_SYSCALL_64_after_hwframe+0x6d/0x75
   INITIAL USE at:
                   lock_acquire+0x1e4/0x530 kernel/locking/lockdep.c:5754
                   __raw_spin_lock_irq include/linux/spinlock_api_smp.h:119 [inline]
                   _raw_spin_lock_irq+0xd3/0x120 kernel/locking/spinlock.c:170
                   spin_lock_irq include/linux/spinlock.h:376 [inline]
                   calculate_sigpending+0x4f/0x90 kernel/signal.c:188
                   ret_from_fork+0x24/0x80 arch/x86/kernel/process.c:143
                   ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:243
 }
 ... key      at: [<ffffffff926bf8c0>] sighand_ctor.__key+0x0/0x20

the dependencies between the lock to be acquired
 and HARDIRQ-irq-unsafe lock:
-> (&stab->lock){+...}-{2:2} {
   HARDIRQ-ON-W at:
                    lock_acquire+0x1e4/0x530 kernel/locking/lockdep.c:5754
                    __raw_spin_lock_bh include/linux/spinlock_api_smp.h:126 [inline]
                    _raw_spin_lock_bh+0x35/0x50 kernel/locking/spinlock.c:178
                    spin_lock_bh include/linux/spinlock.h:356 [inline]
                    __sock_map_delete net/core/sock_map.c:414 [inline]
                    sock_map_delete_elem+0x97/0x140 net/core/sock_map.c:446
                    bpf_prog_2c29ac5cdc6b1842+0x42/0x46
                    bpf_dispatcher_nop_func include/linux/bpf.h:1234 [inline]
                    __bpf_prog_run include/linux/filter.h:650 [inline]
                    bpf_prog_run include/linux/filter.h:664 [inline]
                    __bpf_trace_run kernel/trace/bpf_trace.c:2381 [inline]
                    bpf_trace_run4+0x3d7/0x490 kernel/trace/bpf_trace.c:2422
                    trace_ext4_ext_rm_leaf include/trace/events/ext4.h:2031 [inline]
                    ext4_ext_rm_leaf fs/ext4/extents.c:2600 [inline]
                    ext4_ext_remove_space+0x3cf2/0x4db0 fs/ext4/extents.c:2934
                    ext4_ext_truncate+0x159/0x2b0 fs/ext4/extents.c:4440
                    ext4_truncate+0xa08/0x1130 fs/ext4/inode.c:4146
                    ext4_setattr+0x119a/0x1bb0 fs/ext4/inode.c:5454
                    notify_change+0xb9d/0xe70 fs/attr.c:499
                    do_truncate+0x220/0x310 fs/open.c:66
                    handle_truncate fs/namei.c:3301 [inline]
                    do_open fs/namei.c:3647 [inline]
                    path_openat+0x29fe/0x3240 fs/namei.c:3800
                    do_filp_open+0x235/0x490 fs/namei.c:3827
                    do_sys_openat2+0x13e/0x1d0 fs/open.c:1407
                    do_sys_open fs/open.c:1422 [inline]
                    __do_sys_openat fs/open.c:1438 [inline]
                    __se_sys_openat fs/open.c:1433 [inline]
                    __x64_sys_openat+0x247/0x2a0 fs/open.c:1433
                    do_syscall_64+0xfb/0x240
                    entry_SYSCALL_64_after_hwframe+0x6d/0x75
   INITIAL USE at:
                   lock_acquire+0x1e4/0x530 kernel/locking/lockdep.c:5754
                   __raw_spin_lock_bh include/linux/spinlock_api_smp.h:126 [inline]
                   _raw_spin_lock_bh+0x35/0x50 kernel/locking/spinlock.c:178
                   spin_lock_bh include/linux/spinlock.h:356 [inline]
                   __sock_map_delete net/core/sock_map.c:414 [inline]
                   sock_map_delete_elem+0x97/0x140 net/core/sock_map.c:446
                   bpf_prog_2c29ac5cdc6b1842+0x42/0x46
                   bpf_dispatcher_nop_func include/linux/bpf.h:1234 [inline]
                   __bpf_prog_run include/linux/filter.h:650 [inline]
                   bpf_prog_run include/linux/filter.h:664 [inline]
                   __bpf_trace_run kernel/trace/bpf_trace.c:2381 [inline]
                   bpf_trace_run4+0x3d7/0x490 kernel/trace/bpf_trace.c:2422
                   trace_ext4_ext_rm_leaf include/trace/events/ext4.h:2031 [inline]
                   ext4_ext_rm_leaf fs/ext4/extents.c:2600 [inline]
                   ext4_ext_remove_space+0x3cf2/0x4db0 fs/ext4/extents.c:2934
                   ext4_ext_truncate+0x159/0x2b0 fs/ext4/extents.c:4440
                   ext4_truncate+0xa08/0x1130 fs/ext4/inode.c:4146
                   ext4_setattr+0x119a/0x1bb0 fs/ext4/inode.c:5454
                   notify_change+0xb9d/0xe70 fs/attr.c:499
                   do_truncate+0x220/0x310 fs/open.c:66
                   handle_truncate fs/namei.c:3301 [inline]
                   do_open fs/namei.c:3647 [inline]
                   path_openat+0x29fe/0x3240 fs/namei.c:3800
                   do_filp_open+0x235/0x490 fs/namei.c:3827
                   do_sys_openat2+0x13e/0x1d0 fs/open.c:1407
                   do_sys_open fs/open.c:1422 [inline]
                   __do_sys_openat fs/open.c:1438 [inline]
                   __se_sys_openat fs/open.c:1433 [inline]
                   __x64_sys_openat+0x247/0x2a0 fs/open.c:1433
                   do_syscall_64+0xfb/0x240
                   entry_SYSCALL_64_after_hwframe+0x6d/0x75
 }
 ... key      at: [<ffffffff948822e0>] sock_map_alloc.__key+0x0/0x20
 ... acquired at:
   lock_acquire+0x1e4/0x530 kernel/locking/lockdep.c:5754
   __raw_spin_lock_bh include/linux/spinlock_api_smp.h:126 [inline]
   _raw_spin_lock_bh+0x35/0x50 kernel/locking/spinlock.c:178
   spin_lock_bh include/linux/spinlock.h:356 [inline]
   __sock_map_delete net/core/sock_map.c:414 [inline]
   sock_map_delete_elem+0x97/0x140 net/core/sock_map.c:446
   bpf_prog_2c29ac5cdc6b1842+0x42/0x46
   bpf_dispatcher_nop_func include/linux/bpf.h:1234 [inline]
   __bpf_prog_run include/linux/filter.h:650 [inline]
   bpf_prog_run include/linux/filter.h:664 [inline]
   __bpf_trace_run kernel/trace/bpf_trace.c:2381 [inline]
   bpf_trace_run5+0x3f2/0x4a0 kernel/trace/bpf_trace.c:2423
   trace_signal_generate+0x194/0x200 include/trace/events/signal.h:50
   __send_signal_locked+0xb44/0xdc0 kernel/signal.c:1187
   do_notify_parent+0xd96/0x10a0 kernel/signal.c:2143
   release_task+0x1237/0x1810 kernel/exit.c:275
   exit_notify kernel/exit.c:774 [inline]
   do_exit+0x1aed/0x27e0 kernel/exit.c:898
   do_group_exit+0x207/0x2c0 kernel/exit.c:1027
   get_signal+0x176e/0x1850 kernel/signal.c:2907
   arch_do_signal_or_restart+0x96/0x860 arch/x86/kernel/signal.c:310
   exit_to_user_mode_loop kernel/entry/common.c:105 [inline]
   exit_to_user_mode_prepare include/linux/entry-common.h:328 [inline]
   __syscall_exit_to_user_mode_work kernel/entry/common.c:201 [inline]
   syscall_exit_to_user_mode+0xc9/0x360 kernel/entry/common.c:212
   do_syscall_64+0x10a/0x240 arch/x86/entry/common.c:89
   entry_SYSCALL_64_after_hwframe+0x6d/0x75


stack backtrace:
CPU: 0 PID: 5577 Comm: syz-executor.4 Not tainted 6.8.0-syzkaller-05236-g443574b03387 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
Call Trace:
 <TASK>
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x1e7/0x2e0 lib/dump_stack.c:106
 print_bad_irq_dependency kernel/locking/lockdep.c:2626 [inline]
 check_irq_usage kernel/locking/lockdep.c:2865 [inline]
 check_prev_add kernel/locking/lockdep.c:3138 [inline]
 check_prevs_add kernel/locking/lockdep.c:3253 [inline]
 validate_chain+0x4dc7/0x58e0 kernel/locking/lockdep.c:3869
 __lock_acquire+0x1346/0x1fd0 kernel/locking/lockdep.c:5137
 lock_acquire+0x1e4/0x530 kernel/locking/lockdep.c:5754
 __raw_spin_lock_bh include/linux/spinlock_api_smp.h:126 [inline]
 _raw_spin_lock_bh+0x35/0x50 kernel/locking/spinlock.c:178
 spin_lock_bh include/linux/spinlock.h:356 [inline]
 __sock_map_delete net/core/sock_map.c:414 [inline]
 sock_map_delete_elem+0x97/0x140 net/core/sock_map.c:446
 bpf_prog_2c29ac5cdc6b1842+0x42/0x46
 bpf_dispatcher_nop_func include/linux/bpf.h:1234 [inline]
 __bpf_prog_run include/linux/filter.h:650 [inline]
 bpf_prog_run include/linux/filter.h:664 [inline]
 __bpf_trace_run kernel/trace/bpf_trace.c:2381 [inline]
 bpf_trace_run5+0x3f2/0x4a0 kernel/trace/bpf_trace.c:2423
 trace_signal_generate+0x194/0x200 include/trace/events/signal.h:50
 __send_signal_locked+0xb44/0xdc0 kernel/signal.c:1187
 do_notify_parent+0xd96/0x10a0 kernel/signal.c:2143
 release_task+0x1237/0x1810 kernel/exit.c:275
 exit_notify kernel/exit.c:774 [inline]
 do_exit+0x1aed/0x27e0 kernel/exit.c:898
 do_group_exit+0x207/0x2c0 kernel/exit.c:1027
 get_signal+0x176e/0x1850 kernel/signal.c:2907
 arch_do_signal_or_restart+0x96/0x860 arch/x86/kernel/signal.c:310
 exit_to_user_mode_loop kernel/entry/common.c:105 [inline]
 exit_to_user_mode_prepare include/linux/entry-common.h:328 [inline]
 __syscall_exit_to_user_mode_work kernel/entry/common.c:201 [inline]
 syscall_exit_to_user_mode+0xc9/0x360 kernel/entry/common.c:212
 do_syscall_64+0x10a/0x240 arch/x86/entry/common.c:89
 entry_SYSCALL_64_after_hwframe+0x6d/0x75
RIP: 0033:0x7f325067dea9
Code: Unable to access opcode bytes at 0x7f325067de7f.
RSP: 002b:00007f3251305178 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: 0000000000000001 RBX: 00007f32507abf88 RCX: 00007f325067dea9
RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f32507abf8c
RBP: 00007f32507abf80 R08: 00007f32513060b0 R09: 00007f32513056c0
R10: 000000000000000a R11: 0000000000000246 R12: 00007f32507abf8c
R13: 000000000000000b R14: 00007ffc9c2a1070 R15: 00007ffc9c2a1158
 </TASK>
------------[ cut here ]------------
raw_local_irq_restore() called with IRQs enabled
WARNING: CPU: 0 PID: 5577 at kernel/locking/irqflag-debug.c:10 warn_bogus_irq_restore+0x29/0x40 kernel/locking/irqflag-debug.c:10
Modules linked in:
CPU: 0 PID: 5577 Comm: syz-executor.4 Not tainted 6.8.0-syzkaller-05236-g443574b03387 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
RIP: 0010:warn_bogus_irq_restore+0x29/0x40 kernel/locking/irqflag-debug.c:10
Code: 90 f3 0f 1e fa 90 80 3d de 59 01 04 00 74 06 90 c3 cc cc cc cc c6 05 cf 59 01 04 01 90 48 c7 c7 20 ba aa 8b e8 f8 d5 e7 f5 90 <0f> 0b 90 90 90 c3 cc cc cc cc 66 2e 0f 1f 84 00 00 00 00 00 0f 1f
RSP: 0018:ffffc90012a7f718 EFLAGS: 00010246
RAX: 9aa857565b0b6100 RBX: 1ffff9200254fee8 RCX: ffff888022191e00
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffffc90012a7f7b0 R08: ffffffff8157cc12 R09: 1ffff9200254fe38
R10: dffffc0000000000 R11: fffff5200254fe39 R12: dffffc0000000000
R13: 1ffff9200254fee4 R14: ffffc90012a7f740 R15: 0000000000000046
FS:  0000000000000000(0000) GS:ffff8880b9400000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000000 CR3: 000000007bb4e000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 <TASK>
 __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:151 [inline]
 _raw_spin_unlock_irqrestore+0x120/0x140 kernel/locking/spinlock.c:194
 spin_unlock_irqrestore include/linux/spinlock.h:406 [inline]
 do_notify_parent+0xdcf/0x10a0 kernel/signal.c:2145
 release_task+0x1237/0x1810 kernel/exit.c:275
 exit_notify kernel/exit.c:774 [inline]
 do_exit+0x1aed/0x27e0 kernel/exit.c:898
 do_group_exit+0x207/0x2c0 kernel/exit.c:1027
 get_signal+0x176e/0x1850 kernel/signal.c:2907
 arch_do_signal_or_restart+0x96/0x860 arch/x86/kernel/signal.c:310
 exit_to_user_mode_loop kernel/entry/common.c:105 [inline]
 exit_to_user_mode_prepare include/linux/entry-common.h:328 [inline]
 __syscall_exit_to_user_mode_work kernel/entry/common.c:201 [inline]
 syscall_exit_to_user_mode+0xc9/0x360 kernel/entry/common.c:212
 do_syscall_64+0x10a/0x240 arch/x86/entry/common.c:89
 entry_SYSCALL_64_after_hwframe+0x6d/0x75
RIP: 0033:0x7f325067dea9
Code: Unable to access opcode bytes at 0x7f325067de7f.
RSP: 002b:00007f3251305178 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: 0000000000000001 RBX: 00007f32507abf88 RCX: 00007f325067dea9
RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f32507abf8c
RBP: 00007f32507abf80 R08: 00007f32513060b0 R09: 00007f32513056c0
R10: 000000000000000a R11: 0000000000000246 R12: 00007f32507abf8c
R13: 000000000000000b R14: 00007ffc9c2a1070 R15: 00007ffc9c2a1158
 </TASK>