BUG: stack guard page was hit at ffffc900009a7f18 (stack is ffffc900009a8000..ffffc900009affff)
kernel stack overflow (double-fault): 0000 [#1] PREEMPT SMP KASAN
CPU: 1 PID: 369 Comm: syz-executor455 Not tainted 5.10.96-syzkaller-00678-ge33a5b611c98 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:rmqueue+0x1b/0x2480 mm/page_alloc.c:3571
Code: d2 e8 49 0f ff ff b0 01 e9 f9 fe ff ff 66 90 55 48 89 e5 41 57 41 56 41 55 41 54 53 48 83 e4 e0 48 81 ec a0 01 00 00 45 89 cc <44> 89 44 24 3c 89 d3 49 89 f7 65 48 8b 04 25 28 00 00 00 48 89 84
RSP: 0018:ffffc900009a7f20 EFLAGS: 00010282
RAX: 0000000000000000 RBX: ffffffff86bc53c0 RCX: 0000000000012cd0
RDX: 0000000000000000 RSI: ffffffff86bc53c0 RDI: ffffffff86bc53c0
RBP: ffffc900009a80e8 R08: 0000000000000901 R09: 0000000000000002
R10: fffffbfff0d78b3c R11: 0000000000000000 R12: 0000000000000002
R13: dffffc0000000000 R14: ffffffff86bc53c0 R15: ffffc900009a825c
FS: 00007fd6764c0700(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffc900009a7f18 CR3: 000000011c766000 CR4: 00000000003506a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
Modules linked in:
---[ end trace 3adc8cc4f6efa096 ]---
RIP: 0010:rmqueue+0x1b/0x2480 mm/page_alloc.c:3571
Code: d2 e8 49 0f ff ff b0 01 e9 f9 fe ff ff 66 90 55 48 89 e5 41 57 41 56 41 55 41 54 53 48 83 e4 e0 48 81 ec a0 01 00 00 45 89 cc <44> 89 44 24 3c 89 d3 49 89 f7 65 48 8b 04 25 28 00 00 00 48 89 84
RSP: 0018:ffffc900009a7f20 EFLAGS: 00010282
RAX: 0000000000000000 RBX: ffffffff86bc53c0 RCX: 0000000000012cd0
RDX: 0000000000000000 RSI: ffffffff86bc53c0 RDI: ffffffff86bc53c0
RBP: ffffc900009a80e8 R08: 0000000000000901 R09: 0000000000000002
R10: fffffbfff0d78b3c R11: 0000000000000000 R12: 0000000000000002
R13: dffffc0000000000 R14: ffffffff86bc53c0 R15: ffffc900009a825c
FS: 00007fd6764c0700(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffc900009a7f18 CR3: 000000011c766000 CR4: 00000000003506a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
0: d2 e8 shr %cl,%al
2: 49 0f ff ff ud0 %r15,%rdi
6: b0 01 mov $0x1,%al
8: e9 f9 fe ff ff jmpq 0xffffff06
d: 66 90 xchg %ax,%ax
f: 55 push %rbp
10: 48 89 e5 mov %rsp,%rbp
13: 41 57 push %r15
15: 41 56 push %r14
17: 41 55 push %r13
19: 41 54 push %r12
1b: 53 push %rbx
1c: 48 83 e4 e0 and $0xffffffffffffffe0,%rsp
20: 48 81 ec a0 01 00 00 sub $0x1a0,%rsp
27: 45 89 cc mov %r9d,%r12d
* 2a: 44 89 44 24 3c mov %r8d,0x3c(%rsp) <-- trapping instruction
2f: 89 d3 mov %edx,%ebx
31: 49 89 f7 mov %rsi,%r15
34: 65 48 8b 04 25 28 00 mov %gs:0x28,%rax
3b: 00 00
3d: 48 rex.W
3e: 89 .byte 0x89
3f: 84 .byte 0x84