BUG: TASK stack guard page was hit at ffffc90004787ff8 (stack is ffffc90004788000..ffffc90004790000) Oops: stack guard page: 0000 [#1] PREEMPT SMP KASAN PTI CPU: 0 UID: 0 PID: 9741 Comm: syz.8.3144 Not tainted syzkaller #0 f5341d37ab1b0541b3ffd7f2e2acc38550dc07c9 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 RIP: 0010:check_region_inline mm/kasan/generic.c:171 [inline] RIP: 0010:kasan_check_range+0x13/0x2b0 mm/kasan/generic.c:189 Code: c1 03 cc cc cc cc cc b8 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 66 0f 1f 00 b0 01 48 85 f6 0f 84 c0 01 00 00 55 48 89 e5 <41> 57 41 56 41 55 41 54 53 4c 8d 04 37 49 39 f8 0f 82 29 02 00 00 RSP: 0018:ffffc90004788000 EFLAGS: 00010202 RAX: 0000000000000001 RBX: 1ffff1103edce451 RCX: ffffffff81d9b71b RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffffffff87e38238 RBP: ffffc90004788000 R08: ffff8881f6e72280 R09: 0000000000000002 R10: 0000000000000000 R11: 00000000fffffffc R12: 000000000000003f R13: 000000000000f51b R14: 0000000000000fda R15: 00000000000011d2 FS: 00007f67925e36c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffc90004787ff8 CR3: 0000000103782000 CR4: 00000000003526b0 Call Trace: __kasan_check_read+0x15/0x20 mm/kasan/shadow.c:31 instrument_atomic_read include/linux/instrumented.h:68 [inline] _test_bit include/asm-generic/bitops/instrumented-non-atomic.h:141 [inline] nr_pcp_alloc mm/page_alloc.c:3176 [inline] ___rmqueue_pcplist+0x4fb/0x31b0 mm/page_alloc.c:3215 __rmqueue_pcplist mm/page_alloc.c:3263 [inline] rmqueue_pcplist mm/page_alloc.c:3292 [inline] rmqueue mm/page_alloc.c:3325 [inline] get_page_from_freelist+0x6f5/0x4a20 mm/page_alloc.c:3911 __alloc_pages_noprof+0x35f/0x7e0 mm/page_alloc.c:5264 __alloc_pages_node_noprof include/linux/gfp.h:269 [inline] alloc_pages_node_noprof include/linux/gfp.h:296 [inline] alloc_pages_noprof include/linux/gfp.h:313 [inline] stack_depot_save_flags+0x672/0x800 lib/stackdepot.c:627 stack_depot_save+0x12/0x20 lib/stackdepot.c:686 save_stack+0x133/0x240 mm/page_owner.c:175 __set_page_owner+0x8e/0x600 mm/page_owner.c:338 set_page_owner include/linux/page_owner.h:35 [inline] post_alloc_hook+0x3b8/0x3f0 mm/page_alloc.c:1826 prep_new_page+0x1c/0x110 mm/page_alloc.c:1834 get_page_from_freelist+0x496e/0x4a20 mm/page_alloc.c:3914 __alloc_pages_noprof+0x35f/0x7e0 mm/page_alloc.c:5264 __alloc_pages_node_noprof include/linux/gfp.h:269 [inline] alloc_pages_node_noprof include/linux/gfp.h:296 [inline] alloc_pages_noprof include/linux/gfp.h:313 [inline] stack_depot_save_flags+0x672/0x800 lib/stackdepot.c:627 kasan_save_stack mm/kasan/common.c:50 [inline] kasan_save_track+0x4f/0x80 mm/kasan/common.c:70 kasan_save_alloc_info+0x40/0x50 mm/kasan/generic.c:565 poison_kmalloc_redzone mm/kasan/common.c:379 [inline] __kasan_kmalloc+0x96/0xb0 mm/kasan/common.c:396 kasan_kmalloc include/linux/kasan.h:261 [inline] __do_kmalloc_node mm/slub.c:4395 [inline] __kmalloc_node_track_caller_noprof+0x251/0x4f0 mm/slub.c:4414 __do_krealloc mm/slab_common.c:1239 [inline] krealloc_noprof+0x8d/0x130 mm/slab_common.c:1288 ::call rust/kernel/alloc/allocator.rs:102 [inline] ::realloc rust/kernel/alloc/allocator.rs:141 [inline] ::alloc+0xb4/0x200 rust/kernel/alloc.rs:159 >, kernel::alloc::allocator::Kmalloc>>::new_uninit rust/kernel/alloc/kbox.rs:269 [inline] >, kernel::alloc::allocator::Kmalloc> as kernel::init::InPlaceInit>>>::try_init::>::new_uninit::{closure#1}, kernel::sync::arc::ArcInner>, kernel::alloc::AllocError>> rust/kernel/alloc/kbox.rs:386 [inline] >::new_uninit rust/kernel/sync/arc.rs:646 [inline] ::insert_or_update_handle+0x420/0x1f00 drivers/android/binder/process.rs:845 ::transfer_binder_object+0x1d1/0x6b0 drivers/android/binder/allocation.rs:398 ::translate_object+0xeeb/0x6640 drivers/android/binder/thread.rs:793 ::copy_transaction_data+0x300b/0x57b0 drivers/android/binder/thread.rs:1186 ::new+0x3a2/0x2150 drivers/android/binder/transaction.rs:81 ::transaction_inner drivers/android/binder/thread.rs:1350 [inline] <::transaction_inner as core::ops::function::FnOnce<(&kernel::sync::arc::Arc, &rust_binder_main::defs::BinderTransactionDataSg)>>::call_once usr/local/rustup/toolchains/1.91.1-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/core/src/ops/function.rs:250 [inline] ::transaction::<::transaction_inner>+0x8c4/0x1110 drivers/android/binder/thread.rs:1325 ::write+0x17dc/0xa690 drivers/android/binder/thread.rs:1464 ::write_read drivers/android/binder/thread.rs:1612 [inline] ::ioctl_write_read drivers/android/binder/process.rs:1609 [inline] ::ioctl drivers/android/binder/process.rs:1674 [inline] rust_binder_main::rust_binder_ioctl+0x1077/0x5da0 drivers/android/binder/rust_binder_main.rs:447 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:907 [inline] __se_sys_ioctl+0x132/0x1b0 fs/ioctl.c:893 __x64_sys_ioctl+0x7f/0xa0 fs/ioctl.c:893 x64_sys_call+0x1878/0x2ee0 arch/x86/include/generated/asm/syscalls_64.h:17 do_syscall_x64 arch/x86/entry/common.c:47 [inline] do_syscall_64+0x57/0xf0 arch/x86/entry/common.c:78 entry_SYSCALL_64_after_hwframe+0x76/0x7e RIP: 0033:0x7f6793b9aeb9 Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f67925e3028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007f6793e15fa0 RCX: 00007f6793b9aeb9 RDX: 0000200000000100 RSI: 00000000c0306201 RDI: 0000000000000003 RBP: 00007f6793c08c1f R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f6793e16038 R14: 00007f6793e15fa0 R15: 00007ffc598bb568 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:check_region_inline mm/kasan/generic.c:171 [inline] RIP: 0010:kasan_check_range+0x13/0x2b0 mm/kasan/generic.c:189 Code: c1 03 cc cc cc cc cc b8 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 66 0f 1f 00 b0 01 48 85 f6 0f 84 c0 01 00 00 55 48 89 e5 <41> 57 41 56 41 55 41 54 53 4c 8d 04 37 49 39 f8 0f 82 29 02 00 00 RSP: 0018:ffffc90004788000 EFLAGS: 00010202 RAX: 0000000000000001 RBX: 1ffff1103edce451 RCX: ffffffff81d9b71b RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffffffff87e38238 RBP: ffffc90004788000 R08: ffff8881f6e72280 R09: 0000000000000002 R10: 0000000000000000 R11: 00000000fffffffc R12: 000000000000003f R13: 000000000000f51b R14: 0000000000000fda R15: 00000000000011d2 FS: 00007f67925e36c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffc90004787ff8 CR3: 0000000103782000 CR4: 00000000003526b0 ---------------- Code disassembly (best guess): 0: c1 03 cc roll $0xcc,(%rbx) 3: cc int3 4: cc int3 5: cc int3 6: cc int3 7: b8 00 00 00 00 mov $0x0,%eax c: 90 nop d: 90 nop e: 90 nop f: 90 nop 10: 90 nop 11: 90 nop 12: 90 nop 13: 90 nop 14: 90 nop 15: 90 nop 16: 90 nop 17: 66 0f 1f 00 nopw (%rax) 1b: b0 01 mov $0x1,%al 1d: 48 85 f6 test %rsi,%rsi 20: 0f 84 c0 01 00 00 je 0x1e6 26: 55 push %rbp 27: 48 89 e5 mov %rsp,%rbp * 2a: 41 57 push %r15 <-- trapping instruction 2c: 41 56 push %r14 2e: 41 55 push %r13 30: 41 54 push %r12 32: 53 push %rbx 33: 4c 8d 04 37 lea (%rdi,%rsi,1),%r8 37: 49 39 f8 cmp %rdi,%r8 3a: 0f 82 29 02 00 00 jb 0x269