BUG: stack guard page was hit at ffffc90000947fa8 (stack is ffffc90000948000..ffffc9000094ffff)
kernel stack overflow (double-fault): 0000 [#1] PREEMPT SMP KASAN
CPU: 1 PID: 370 Comm: syz-executor123 Not tainted 5.10.109-syzkaller-00693-g414e6c8e941c #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:__unwind_start+0x2f/0x420 arch/x86/kernel/unwind_frame.c:368
Code: 57 41 56 41 55 41 54 53 48 83 ec 50 48 89 4d d0 49 89 d7 49 89 f6 49 89 fd 48 bb 00 00 00 00 00 fc ff df ba 60 00 00 00 31 f6 <e8> ec ed 72 00 49 8d 7d 28 48 89 f8 48 c1 e8 03 80 3c 18 00 74 05
RSP: 0018:ffffc90000947fb8 EFLAGS: 00010246
RAX: ffff88811d6862c0 RBX: dffffc0000000000 RCX: ffffc900009480d0
RDX: 0000000000000060 RSI: 0000000000000000 RDI: ffffc90000948040
RBP: ffffc90000948030 R08: dffffc0000000000 R09: ffffc90000948120
R10: fffff52000129027 R11: 0000000000000000 R12: ffff88811d6862c0
R13: ffffc90000948040 R14: ffff88811d6862c0 R15: 0000000000000000
FS:  00007f0683a87700(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffc90000947fa8 CR3: 0000000106fec000 CR4: 00000000003506a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
Modules linked in:
---[ end trace 36fc3d6e3f1180bc ]---
RIP: 0010:__unwind_start+0x2f/0x420 arch/x86/kernel/unwind_frame.c:368
Code: 57 41 56 41 55 41 54 53 48 83 ec 50 48 89 4d d0 49 89 d7 49 89 f6 49 89 fd 48 bb 00 00 00 00 00 fc ff df ba 60 00 00 00 31 f6 <e8> ec ed 72 00 49 8d 7d 28 48 89 f8 48 c1 e8 03 80 3c 18 00 74 05
RSP: 0018:ffffc90000947fb8 EFLAGS: 00010246
RAX: ffff88811d6862c0 RBX: dffffc0000000000 RCX: ffffc900009480d0
RDX: 0000000000000060 RSI: 0000000000000000 RDI: ffffc90000948040
RBP: ffffc90000948030 R08: dffffc0000000000 R09: ffffc90000948120
R10: fffff52000129027 R11: 0000000000000000 R12: ffff88811d6862c0
R13: ffffc90000948040 R14: ffff88811d6862c0 R15: 0000000000000000
FS:  00007f0683a87700(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffc90000947fa8 CR3: 0000000106fec000 CR4: 00000000003506a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
   0:	57                   	push   %rdi
   1:	41 56                	push   %r14
   3:	41 55                	push   %r13
   5:	41 54                	push   %r12
   7:	53                   	push   %rbx
   8:	48 83 ec 50          	sub    $0x50,%rsp
   c:	48 89 4d d0          	mov    %rcx,-0x30(%rbp)
  10:	49 89 d7             	mov    %rdx,%r15
  13:	49 89 f6             	mov    %rsi,%r14
  16:	49 89 fd             	mov    %rdi,%r13
  19:	48 bb 00 00 00 00 00 	movabs $0xdffffc0000000000,%rbx
  20:	fc ff df
  23:	ba 60 00 00 00       	mov    $0x60,%edx
  28:	31 f6                	xor    %esi,%esi
* 2a:	e8 ec ed 72 00       	callq  0x72ee1b <-- trapping instruction
  2f:	49 8d 7d 28          	lea    0x28(%r13),%rdi
  33:	48 89 f8             	mov    %rdi,%rax
  36:	48 c1 e8 03          	shr    $0x3,%rax
  3a:	80 3c 18 00          	cmpb   $0x0,(%rax,%rbx,1)
  3e:	74 05                	je     0x45