BUG: stack guard page was hit at ffffc90000c0ff18 (stack is ffffc90000c10000..ffffc90000c17fff) kernel stack overflow (double-fault): 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 377 Comm: syz-executor275 Not tainted 5.10.104-syzkaller-00407-g9e96a3d6ae39 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:rmqueue+0x1b/0x2480 mm/page_alloc.c:3571 Code: d2 e8 c9 10 ff ff b0 01 e9 f9 fe ff ff 66 90 55 48 89 e5 41 57 41 56 41 55 41 54 53 48 83 e4 e0 48 81 ec a0 01 00 00 45 89 cc <44> 89 44 24 3c 89 d3 49 89 f7 65 48 8b 04 25 28 00 00 00 48 89 84 RSP: 0018:ffffc90000c0ff20 EFLAGS: 00010282 RAX: 0000000000000000 RBX: ffffffff86bc0140 RCX: 0000000000012cd0 RDX: 0000000000000000 RSI: ffffffff86bc0140 RDI: ffffffff86bc0140 RBP: ffffc90000c100e8 R08: 0000000000000901 R09: 0000000000000002 R10: fffffbfff0d780ec R11: 0000000000000000 R12: 0000000000000002 R13: dffffc0000000000 R14: ffffffff86bc0140 R15: ffffc90000c1025c FS: 00007fbc7ddc7700(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffc90000c0ff18 CR3: 00000001075f8000 CR4: 00000000003506b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: Modules linked in: ---[ end trace 3a570347c37fc0bf ]--- RIP: 0010:rmqueue+0x1b/0x2480 mm/page_alloc.c:3571 Code: d2 e8 c9 10 ff ff b0 01 e9 f9 fe ff ff 66 90 55 48 89 e5 41 57 41 56 41 55 41 54 53 48 83 e4 e0 48 81 ec a0 01 00 00 45 89 cc <44> 89 44 24 3c 89 d3 49 89 f7 65 48 8b 04 25 28 00 00 00 48 89 84 RSP: 0018:ffffc90000c0ff20 EFLAGS: 00010282 RAX: 0000000000000000 RBX: ffffffff86bc0140 RCX: 0000000000012cd0 RDX: 0000000000000000 RSI: ffffffff86bc0140 RDI: ffffffff86bc0140 RBP: ffffc90000c100e8 R08: 0000000000000901 R09: 0000000000000002 R10: fffffbfff0d780ec R11: 0000000000000000 R12: 0000000000000002 R13: dffffc0000000000 R14: ffffffff86bc0140 R15: ffffc90000c1025c FS: 00007fbc7ddc7700(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffc90000c0ff18 CR3: 00000001075f8000 CR4: 00000000003506b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess), 1 bytes skipped: 0: e8 c9 10 ff ff callq 0xffff10ce 5: b0 01 mov $0x1,%al 7: e9 f9 fe ff ff jmpq 0xffffff05 c: 66 90 xchg %ax,%ax e: 55 push %rbp f: 48 89 e5 mov %rsp,%rbp 12: 41 57 push %r15 14: 41 56 push %r14 16: 41 55 push %r13 18: 41 54 push %r12 1a: 53 push %rbx 1b: 48 83 e4 e0 and $0xffffffffffffffe0,%rsp 1f: 48 81 ec a0 01 00 00 sub $0x1a0,%rsp 26: 45 89 cc mov %r9d,%r12d * 29: 44 89 44 24 3c mov %r8d,0x3c(%rsp) <-- trapping instruction 2e: 89 d3 mov %edx,%ebx 30: 49 89 f7 mov %rsi,%r15 33: 65 48 8b 04 25 28 00 mov %gs:0x28,%rax 3a: 00 00 3c: 48 rex.W 3d: 89 .byte 0x89 3e: 84 .byte 0x84