BUG: stack guard page was hit at ffffc900009a7f18 (stack is ffffc900009a8000..ffffc900009affff) kernel stack overflow (double-fault): 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 369 Comm: syz-executor455 Not tainted 5.10.96-syzkaller-00678-ge33a5b611c98 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:rmqueue+0x1b/0x2480 mm/page_alloc.c:3571 Code: d2 e8 49 0f ff ff b0 01 e9 f9 fe ff ff 66 90 55 48 89 e5 41 57 41 56 41 55 41 54 53 48 83 e4 e0 48 81 ec a0 01 00 00 45 89 cc <44> 89 44 24 3c 89 d3 49 89 f7 65 48 8b 04 25 28 00 00 00 48 89 84 RSP: 0018:ffffc900009a7f20 EFLAGS: 00010282 RAX: 0000000000000000 RBX: ffffffff86bc53c0 RCX: 0000000000012cd0 RDX: 0000000000000000 RSI: ffffffff86bc53c0 RDI: ffffffff86bc53c0 RBP: ffffc900009a80e8 R08: 0000000000000901 R09: 0000000000000002 R10: fffffbfff0d78b3c R11: 0000000000000000 R12: 0000000000000002 R13: dffffc0000000000 R14: ffffffff86bc53c0 R15: ffffc900009a825c FS: 00007fd6764c0700(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffc900009a7f18 CR3: 000000011c766000 CR4: 00000000003506a0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: Modules linked in: ---[ end trace 3adc8cc4f6efa096 ]--- RIP: 0010:rmqueue+0x1b/0x2480 mm/page_alloc.c:3571 Code: d2 e8 49 0f ff ff b0 01 e9 f9 fe ff ff 66 90 55 48 89 e5 41 57 41 56 41 55 41 54 53 48 83 e4 e0 48 81 ec a0 01 00 00 45 89 cc <44> 89 44 24 3c 89 d3 49 89 f7 65 48 8b 04 25 28 00 00 00 48 89 84 RSP: 0018:ffffc900009a7f20 EFLAGS: 00010282 RAX: 0000000000000000 RBX: ffffffff86bc53c0 RCX: 0000000000012cd0 RDX: 0000000000000000 RSI: ffffffff86bc53c0 RDI: ffffffff86bc53c0 RBP: ffffc900009a80e8 R08: 0000000000000901 R09: 0000000000000002 R10: fffffbfff0d78b3c R11: 0000000000000000 R12: 0000000000000002 R13: dffffc0000000000 R14: ffffffff86bc53c0 R15: ffffc900009a825c FS: 00007fd6764c0700(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffc900009a7f18 CR3: 000000011c766000 CR4: 00000000003506a0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: d2 e8 shr %cl,%al 2: 49 0f ff ff ud0 %r15,%rdi 6: b0 01 mov $0x1,%al 8: e9 f9 fe ff ff jmpq 0xffffff06 d: 66 90 xchg %ax,%ax f: 55 push %rbp 10: 48 89 e5 mov %rsp,%rbp 13: 41 57 push %r15 15: 41 56 push %r14 17: 41 55 push %r13 19: 41 54 push %r12 1b: 53 push %rbx 1c: 48 83 e4 e0 and $0xffffffffffffffe0,%rsp 20: 48 81 ec a0 01 00 00 sub $0x1a0,%rsp 27: 45 89 cc mov %r9d,%r12d * 2a: 44 89 44 24 3c mov %r8d,0x3c(%rsp) <-- trapping instruction 2f: 89 d3 mov %edx,%ebx 31: 49 89 f7 mov %rsi,%r15 34: 65 48 8b 04 25 28 00 mov %gs:0x28,%rax 3b: 00 00 3d: 48 rex.W 3e: 89 .byte 0x89 3f: 84 .byte 0x84