BUG: stack guard page was hit at ffffc900082bff98 (stack is ffffc900082c0000..ffffc900082c7fff) kernel stack overflow (double-fault): 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 27613 Comm: syz-executor.5 Not tainted 5.10.109-syzkaller-00693-g414e6c8e941c #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:update_stack_state+0x3b/0x580 arch/x86/kernel/unwind_frame.c:190 Code: 49 89 f6 49 89 fd 48 ba 00 00 00 00 00 fc ff df 48 89 f8 48 c1 e8 03 48 89 45 c8 8a 04 10 84 c0 0f 85 7f 04 00 00 41 8b 45 00 <89> 45 bc 4d 8d 65 58 4c 89 e0 48 c1 e8 03 48 89 45 a8 80 3c 10 00 RSP: 0018:ffffc900082bffa0 EFLAGS: 00010246 RAX: 0000000000000001 RBX: ffffc900082c0150 RCX: 1ffff92001058033 RDX: dffffc0000000000 RSI: ffffc900082c01f0 RDI: ffffc900082c0160 RBP: ffffc900082c0038 R08: dffffc0000000001 R09: ffffc900082c0160 R10: fffff52001058038 R11: 1ffff9200105802c R12: 0000000000000000 R13: ffffc900082c0160 R14: ffffc900082c01f0 R15: ffffc900082c0160 FS: 00007fd88a6bd700(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffc900082bff98 CR3: 0000000150f5f000 CR4: 00000000003506b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 00000000e08e8000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: Modules linked in: ---[ end trace b8692a0f63916ed6 ]--- RIP: 0010:update_stack_state+0x3b/0x580 arch/x86/kernel/unwind_frame.c:190 Code: 49 89 f6 49 89 fd 48 ba 00 00 00 00 00 fc ff df 48 89 f8 48 c1 e8 03 48 89 45 c8 8a 04 10 84 c0 0f 85 7f 04 00 00 41 8b 45 00 <89> 45 bc 4d 8d 65 58 4c 89 e0 48 c1 e8 03 48 89 45 a8 80 3c 10 00 RSP: 0018:ffffc900082bffa0 EFLAGS: 00010246 RAX: 0000000000000001 RBX: ffffc900082c0150 RCX: 1ffff92001058033 RDX: dffffc0000000000 RSI: ffffc900082c01f0 RDI: ffffc900082c0160 RBP: ffffc900082c0038 R08: dffffc0000000001 R09: ffffc900082c0160 R10: fffff52001058038 R11: 1ffff9200105802c R12: 0000000000000000 R13: ffffc900082c0160 R14: ffffc900082c01f0 R15: ffffc900082c0160 FS: 00007fd88a6bd700(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffc900082bff98 CR3: 0000000150f5f000 CR4: 00000000003506b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 00000000e08e8000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 49 89 f6 mov %rsi,%r14 3: 49 89 fd mov %rdi,%r13 6: 48 ba 00 00 00 00 00 movabs $0xdffffc0000000000,%rdx d: fc ff df 10: 48 89 f8 mov %rdi,%rax 13: 48 c1 e8 03 shr $0x3,%rax 17: 48 89 45 c8 mov %rax,-0x38(%rbp) 1b: 8a 04 10 mov (%rax,%rdx,1),%al 1e: 84 c0 test %al,%al 20: 0f 85 7f 04 00 00 jne 0x4a5 26: 41 8b 45 00 mov 0x0(%r13),%eax * 2a: 89 45 bc mov %eax,-0x44(%rbp) <-- trapping instruction 2d: 4d 8d 65 58 lea 0x58(%r13),%r12 31: 4c 89 e0 mov %r12,%rax 34: 48 c1 e8 03 shr $0x3,%rax 38: 48 89 45 a8 mov %rax,-0x58(%rbp) 3c: 80 3c 10 00 cmpb $0x0,(%rax,%rdx,1)