BUG: stack guard page was hit at ffffc90002bb7fe8 (stack is ffffc90002bb8000..ffffc90002bbffff) kernel stack overflow (double-fault): 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 29515 Comm: syz-executor.2 Tainted: G W 5.10.110-syzkaller-01300-ge08dd85cc95e #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:xas_load+0x1e/0x2a0 lib/xarray.c:232 Code: 5d c3 cc cc cc cc cc cc cc cc cc cc 55 48 89 e5 41 57 41 56 41 55 41 54 53 48 83 ec 38 49 89 fc 49 be 00 00 00 00 00 fc ff df dd 70 fd fe 4c 89 e7 e8 75 02 00 00 49 89 c7 49 8d 4c 24 10 49 RSP: 0000:ffffc90002bb7ff0 EFLAGS: 00010286 RAX: 1ffff9200057701b RBX: ffffc90002bb80c0 RCX: dffffc0000000000 RDX: 0000000000000010 RSI: 0000000000000000 RDI: ffffc90002bb80c0 RBP: ffffc90002bb8050 R08: dffffc0000000000 R09: ffffc90002bb80e0 R10: fffff5200057701e R11: 1ffff9200057701c R12: ffffc90002bb80c0 R13: 1ffff92000577014 R14: dffffc0000000000 R15: ffffc90002bb80d8 FS: 00007f977a258700(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffc90002bb7fe8 CR3: 0000000111e22000 CR4: 00000000003506a0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: Modules linked in: ---[ end trace 2a93c2fe5b5e4f8a ]--- RIP: 0010:xas_load+0x1e/0x2a0 lib/xarray.c:232 Code: 5d c3 cc cc cc cc cc cc cc cc cc cc 55 48 89 e5 41 57 41 56 41 55 41 54 53 48 83 ec 38 49 89 fc 49 be 00 00 00 00 00 fc ff df dd 70 fd fe 4c 89 e7 e8 75 02 00 00 49 89 c7 49 8d 4c 24 10 49 RSP: 0000:ffffc90002bb7ff0 EFLAGS: 00010286 RAX: 1ffff9200057701b RBX: ffffc90002bb80c0 RCX: dffffc0000000000 RDX: 0000000000000010 RSI: 0000000000000000 RDI: ffffc90002bb80c0 RBP: ffffc90002bb8050 R08: dffffc0000000000 R09: ffffc90002bb80e0 R10: fffff5200057701e R11: 1ffff9200057701c R12: ffffc90002bb80c0 R13: 1ffff92000577014 R14: dffffc0000000000 R15: ffffc90002bb80d8 FS: 00007f977a258700(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffc90002bb7fe8 CR3: 0000000111e22000 CR4: 00000000003506a0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 5d pop %rbp 1: c3 retq 2: cc int3 3: cc int3 4: cc int3 5: cc int3 6: cc int3 7: cc int3 8: cc int3 9: cc int3 a: cc int3 b: cc int3 c: 55 push %rbp d: 48 89 e5 mov %rsp,%rbp 10: 41 57 push %r15 12: 41 56 push %r14 14: 41 55 push %r13 16: 41 54 push %r12 18: 53 push %rbx 19: 48 83 ec 38 sub $0x38,%rsp 1d: 49 89 fc mov %rdi,%r12 20: 49 be 00 00 00 00 00 movabs $0xdffffc0000000000,%r14 27: fc ff df * 2a: e8 dd 70 fd fe callq 0xfefd710c <-- trapping instruction 2f: 4c 89 e7 mov %r12,%rdi 32: e8 75 02 00 00 callq 0x2ac 37: 49 89 c7 mov %rax,%r15 3a: 49 8d 4c 24 10 lea 0x10(%r12),%rcx 3f: 49 rex.WB