BUG: TASK stack guard page was hit at ffffc9000b937fd8 (stack is ffffc9000b938000..ffffc9000b940000) Oops: stack guard page: 0000 [#1] PREEMPT SMP KASAN PTI CPU: 1 UID: 0 PID: 332 Comm: syz.3.4 Not tainted syzkaller #0 a88889f1fd4bd040639a1a4060abea1bc20e1fef Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 RIP: 0010:arch_stack_walk+0x74/0x170 arch/x86/kernel/stacktrace.c:18 Code: 00 00 48 c7 45 b0 00 00 00 00 48 c7 45 a8 00 00 00 00 48 c7 45 a0 00 00 00 00 48 c7 45 98 00 00 00 00 48 c7 45 90 00 00 00 00 <48> c7 45 88 00 00 00 00 48 c7 45 80 00 00 00 00 48 c7 85 78 ff ff RSP: 0018:ffffc9000b937fe8 EFLAGS: 00010296 RAX: 5847ee3fb1a3bb00 RBX: ffffc9000b9380a0 RCX: 0000000000000000 RDX: ffff888130eca600 RSI: ffffc9000b9380a0 RDI: ffffffff8175cdf0 RBP: ffffc9000b938070 R08: ffffc9000b9381df R09: 0000000000000000 R10: ffffc9000b938160 R11: fffff5200172703c R12: ffff888130eca600 R13: 1ffff110261d9580 R14: ffffffff8175cdf0 R15: 0000000000000000 FS: 00007f72b09756c0(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffc9000b937fd8 CR3: 000000010c766000 CR4: 00000000003526b0 Call Trace: Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:arch_stack_walk+0x74/0x170 arch/x86/kernel/stacktrace.c:18 Code: 00 00 48 c7 45 b0 00 00 00 00 48 c7 45 a8 00 00 00 00 48 c7 45 a0 00 00 00 00 48 c7 45 98 00 00 00 00 48 c7 45 90 00 00 00 00 <48> c7 45 88 00 00 00 00 48 c7 45 80 00 00 00 00 48 c7 85 78 ff ff RSP: 0018:ffffc9000b937fe8 EFLAGS: 00010296 RAX: 5847ee3fb1a3bb00 RBX: ffffc9000b9380a0 RCX: 0000000000000000 RDX: ffff888130eca600 RSI: ffffc9000b9380a0 RDI: ffffffff8175cdf0 RBP: ffffc9000b938070 R08: ffffc9000b9381df R09: 0000000000000000 R10: ffffc9000b938160 R11: fffff5200172703c R12: ffff888130eca600 R13: 1ffff110261d9580 R14: ffffffff8175cdf0 R15: 0000000000000000 FS: 00007f72b09756c0(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffc9000b937fd8 CR3: 000000010c766000 CR4: 00000000003526b0 ---------------- Code disassembly (best guess): 0: 00 00 add %al,(%rax) 2: 48 c7 45 b0 00 00 00 movq $0x0,-0x50(%rbp) 9: 00 a: 48 c7 45 a8 00 00 00 movq $0x0,-0x58(%rbp) 11: 00 12: 48 c7 45 a0 00 00 00 movq $0x0,-0x60(%rbp) 19: 00 1a: 48 c7 45 98 00 00 00 movq $0x0,-0x68(%rbp) 21: 00 22: 48 c7 45 90 00 00 00 movq $0x0,-0x70(%rbp) 29: 00 * 2a: 48 c7 45 88 00 00 00 movq $0x0,-0x78(%rbp) <-- trapping instruction 31: 00 32: 48 c7 45 80 00 00 00 movq $0x0,-0x80(%rbp) 39: 00 3a: 48 rex.W 3b: c7 .byte 0xc7 3c: 85 78 ff test %edi,-0x1(%rax) 3f: ff .byte 0xff