BUG: TASK stack guard page was hit at ffffc9000fcbffe8 (stack is ffffc9000fcc0000..ffffc9000fcc8000) Oops: stack guard page: 0000 [#1] PREEMPT SMP KASAN PTI CPU: 1 UID: 0 PID: 3984 Comm: syz.3.1102 Not tainted syzkaller #0 955f6180463debd82b9f2b9d8786ee899826498b Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 RIP: 0010:__unwind_start+0x33/0x410 arch/x86/kernel/unwind_frame.c:378 Code: 57 41 56 41 55 41 54 53 48 83 ec 40 48 89 4d c8 49 89 d4 49 89 f7 48 89 fb 49 be 00 00 00 00 00 fc ff df ba 60 00 00 00 31 f6 38 b0 9a 00 48 8d 7b 28 48 89 f8 48 c1 e8 03 42 80 3c 30 00 74 RSP: 0018:ffffc9000fcbfff0 EFLAGS: 00010246 RAX: ffff88812aba2600 RBX: ffffc9000fcc0068 RCX: ffffc9000fcc00f0 RDX: 0000000000000060 RSI: 0000000000000000 RDI: ffffc9000fcc0068 RBP: ffffc9000fcc0058 R08: dffffc0000000000 R09: 0000000000000000 R10: ffffc9000fcc01b0 R11: 0000000000000002 R12: 0000000000000000 R13: 0000000000000000 R14: dffffc0000000000 R15: ffff88812aba2600 FS: 00007effb48486c0(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffc9000fcbffe8 CR3: 0000000118144000 CR4: 00000000003526b0 Call Trace: Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:__unwind_start+0x33/0x410 arch/x86/kernel/unwind_frame.c:378 Code: 57 41 56 41 55 41 54 53 48 83 ec 40 48 89 4d c8 49 89 d4 49 89 f7 48 89 fb 49 be 00 00 00 00 00 fc ff df ba 60 00 00 00 31 f6 38 b0 9a 00 48 8d 7b 28 48 89 f8 48 c1 e8 03 42 80 3c 30 00 74 RSP: 0018:ffffc9000fcbfff0 EFLAGS: 00010246 RAX: ffff88812aba2600 RBX: ffffc9000fcc0068 RCX: ffffc9000fcc00f0 RDX: 0000000000000060 RSI: 0000000000000000 RDI: ffffc9000fcc0068 RBP: ffffc9000fcc0058 R08: dffffc0000000000 R09: 0000000000000000 R10: ffffc9000fcc01b0 R11: 0000000000000002 R12: 0000000000000000 R13: 0000000000000000 R14: dffffc0000000000 R15: ffff88812aba2600 FS: 00007effb48486c0(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffc9000fcbffe8 CR3: 0000000118144000 CR4: 00000000003526b0 ---------------- Code disassembly (best guess): 0: 57 push %rdi 1: 41 56 push %r14 3: 41 55 push %r13 5: 41 54 push %r12 7: 53 push %rbx 8: 48 83 ec 40 sub $0x40,%rsp c: 48 89 4d c8 mov %rcx,-0x38(%rbp) 10: 49 89 d4 mov %rdx,%r12 13: 49 89 f7 mov %rsi,%r15 16: 48 89 fb mov %rdi,%rbx 19: 49 be 00 00 00 00 00 movabs $0xdffffc0000000000,%r14 20: fc ff df 23: ba 60 00 00 00 mov $0x60,%edx 28: 31 f6 xor %esi,%esi * 2a: e8 38 b0 9a 00 call 0x9ab067 <-- trapping instruction 2f: 48 8d 7b 28 lea 0x28(%rbx),%rdi 33: 48 89 f8 mov %rdi,%rax 36: 48 c1 e8 03 shr $0x3,%rax 3a: 42 80 3c 30 00 cmpb $0x0,(%rax,%r14,1) 3f: 74 .byte 0x74