BUG: stack guard page was hit at ffffc90002aefed8 (stack is ffffc90002af0000..ffffc90002af7fff) kernel stack overflow (double-fault): 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 1766 Comm: syz-executor.0 Not tainted 5.10.110-syzkaller-01300-ge08dd85cc95e #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:rmqueue+0x1b/0x1fc0 mm/page_alloc.c:3571 Code: 10 ff ff b0 01 e9 fc fe ff ff 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 53 48 83 e4 e0 48 81 ec a0 01 00 00 45 89 cc <44> 89 44 24 1c 89 d3 49 89 f5 65 48 8b 04 25 28 00 00 00 48 89 84 RSP: 0018:ffffc90002aefee0 EFLAGS: 00010282 RAX: 0000000000000000 RBX: ffffffff869b4b40 RCX: 0000000000102800 RDX: 0000000000000002 RSI: ffffffff869b4b40 RDI: ffffffff869b4b40 RBP: ffffc90002af00b8 R08: 0000000000000901 R09: 0000000000000000 R10: fffffbfff0d36a2c R11: 1ffffffff0d36a2b R12: 0000000000000000 R13: ffffffff869b57c0 R14: ffffc90002af023c R15: ffffffff869b4b40 FS: 00007f9af5bf2700(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffc90002aefed8 CR3: 000000011ccf6000 CR4: 00000000003506a0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: Modules linked in: ---[ end trace 81ef1a3e2da491b4 ]--- RIP: 0010:rmqueue+0x1b/0x1fc0 mm/page_alloc.c:3571 Code: 10 ff ff b0 01 e9 fc fe ff ff 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 53 48 83 e4 e0 48 81 ec a0 01 00 00 45 89 cc <44> 89 44 24 1c 89 d3 49 89 f5 65 48 8b 04 25 28 00 00 00 48 89 84 RSP: 0018:ffffc90002aefee0 EFLAGS: 00010282 RAX: 0000000000000000 RBX: ffffffff869b4b40 RCX: 0000000000102800 RDX: 0000000000000002 RSI: ffffffff869b4b40 RDI: ffffffff869b4b40 RBP: ffffc90002af00b8 R08: 0000000000000901 R09: 0000000000000000 R10: fffffbfff0d36a2c R11: 1ffffffff0d36a2b R12: 0000000000000000 R13: ffffffff869b57c0 R14: ffffc90002af023c R15: ffffffff869b4b40 FS: 00007f9af5bf2700(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffc90002aefed8 CR3: 000000011ccf6000 CR4: 00000000003506a0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess), 3 bytes skipped: 0: b0 01 mov $0x1,%al 2: e9 fc fe ff ff jmpq 0xffffff03 7: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) c: 55 push %rbp d: 48 89 e5 mov %rsp,%rbp 10: 41 57 push %r15 12: 41 56 push %r14 14: 41 55 push %r13 16: 41 54 push %r12 18: 53 push %rbx 19: 48 83 e4 e0 and $0xffffffffffffffe0,%rsp 1d: 48 81 ec a0 01 00 00 sub $0x1a0,%rsp 24: 45 89 cc mov %r9d,%r12d * 27: 44 89 44 24 1c mov %r8d,0x1c(%rsp) <-- trapping instruction 2c: 89 d3 mov %edx,%ebx 2e: 49 89 f5 mov %rsi,%r13 31: 65 48 8b 04 25 28 00 mov %gs:0x28,%rax 38: 00 00 3a: 48 rex.W 3b: 89 .byte 0x89 3c: 84 .byte 0x84