BUG: stack guard page was hit at ffffc90006307fe8 (stack is ffffc90006308000..ffffc9000630ffff) kernel stack overflow (double-fault): 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 961 Comm: syz-executor.2 Not tainted 5.10.112-syzkaller-00287-gde64d941a71a #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:__unwind_start+0x2f/0x420 arch/x86/kernel/unwind_frame.c:368 Code: 57 41 56 41 55 41 54 53 48 83 ec 50 48 89 4d d0 49 89 d7 49 89 f4 49 89 fd 49 be 00 00 00 00 00 fc ff df ba 60 00 00 00 31 f6 1c 42 73 00 49 8d 7d 28 48 89 f8 48 c1 e8 03 42 80 3c 30 00 74 RSP: 0018:ffffc90006307ff8 EFLAGS: 00010246 RAX: ffff8881129d93c0 RBX: 1ffff92000c6102e RCX: ffffc90006308110 RDX: 0000000000000060 RSI: 0000000000000000 RDI: ffffc90006308080 RBP: ffffc90006308070 R08: dffffc0000000000 R09: ffffc90006308240 R10: fffff52000c61058 R11: 1ffff92000c61048 R12: ffff8881129d93c0 R13: ffffc90006308080 R14: dffffc0000000000 R15: 0000000000000000 FS: 00007fbc45055700(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffc90006307fe8 CR3: 000000011c974000 CR4: 00000000003506a0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: Modules linked in: ---[ end trace f5f496476f1ca9da ]--- RIP: 0010:__unwind_start+0x2f/0x420 arch/x86/kernel/unwind_frame.c:368 Code: 57 41 56 41 55 41 54 53 48 83 ec 50 48 89 4d d0 49 89 d7 49 89 f4 49 89 fd 49 be 00 00 00 00 00 fc ff df ba 60 00 00 00 31 f6 1c 42 73 00 49 8d 7d 28 48 89 f8 48 c1 e8 03 42 80 3c 30 00 74 RSP: 0018:ffffc90006307ff8 EFLAGS: 00010246 RAX: ffff8881129d93c0 RBX: 1ffff92000c6102e RCX: ffffc90006308110 RDX: 0000000000000060 RSI: 0000000000000000 RDI: ffffc90006308080 RBP: ffffc90006308070 R08: dffffc0000000000 R09: ffffc90006308240 R10: fffff52000c61058 R11: 1ffff92000c61048 R12: ffff8881129d93c0 R13: ffffc90006308080 R14: dffffc0000000000 R15: 0000000000000000 FS: 00007fbc45055700(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffc90006307fe8 CR3: 000000011c974000 CR4: 00000000003506a0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 57 push %rdi 1: 41 56 push %r14 3: 41 55 push %r13 5: 41 54 push %r12 7: 53 push %rbx 8: 48 83 ec 50 sub $0x50,%rsp c: 48 89 4d d0 mov %rcx,-0x30(%rbp) 10: 49 89 d7 mov %rdx,%r15 13: 49 89 f4 mov %rsi,%r12 16: 49 89 fd mov %rdi,%r13 19: 49 be 00 00 00 00 00 movabs $0xdffffc0000000000,%r14 20: fc ff df 23: ba 60 00 00 00 mov $0x60,%edx 28: 31 f6 xor %esi,%esi * 2a: e8 1c 42 73 00 callq 0x73424b <-- trapping instruction 2f: 49 8d 7d 28 lea 0x28(%r13),%rdi 33: 48 89 f8 mov %rdi,%rax 36: 48 c1 e8 03 shr $0x3,%rax 3a: 42 80 3c 30 00 cmpb $0x0,(%rax,%r14,1) 3f: 74 .byte 0x74