BUG: TASK stack guard page was hit at ffffc90003b6fff8 (stack is ffffc90003b70000..ffffc90003b78000) Oops: stack guard page: 0000 [#1] PREEMPT SMP KASAN PTI CPU: 1 UID: 0 PID: 1265 Comm: syz.0.269 Not tainted syzkaller #0 b63f8bde1ed88225065c0993fd28f42162285c42 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 RIP: 0010:get_stack_info_noinstr+0x1a/0x130 arch/x86/kernel/dumpstack_64.c:173 Code: b8 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 66 0f 1f 00 55 48 89 e5 41 57 41 56 41 55 41 54 53 49 89 d6 49 89 f4 49 89 ff 21 01 00 00 b3 01 84 c0 75 0f 65 48 8b 05 13 2d 67 7a 49 39 c4 RSP: 0018:ffffc90003b70000 EFLAGS: 00010286 RAX: ffff88811ee3df00 RBX: ffffc90003b70108 RCX: ffffc90003b70108 RDX: ffffc90003b700e8 RSI: ffff88811ee3df00 RDI: ffffc90003b700d8 RBP: ffffc90003b70028 R08: ffffc90003b70147 R09: 0000000000000000 R10: ffffc90003b700e8 R11: fffff5200076e029 R12: ffff88811ee3df00 R13: ffffc90003b700d8 R14: ffffc90003b700e8 R15: ffffc90003b700d8 FS: 00007f8763ab66c0(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffc90003b6fff8 CR3: 0000000118ffa000 CR4: 00000000003526b0 Call Trace: get_stack_info+0x3e/0x100 arch/x86/kernel/dumpstack_64.c:199 __unwind_start+0x20b/0x410 arch/x86/kernel/unwind_frame.c:405 unwind_start arch/x86/include/asm/unwind.h:64 [inline] arch_stack_walk+0xf2/0x170 arch/x86/kernel/stacktrace.c:24 stack_trace_save+0xaa/0x100 kernel/stacktrace.c:122 save_stack+0x125/0x240 mm/page_owner.c:174 __set_page_owner+0x8e/0x600 mm/page_owner.c:338 set_page_owner include/linux/page_owner.h:35 [inline] post_alloc_hook+0x3b8/0x3f0 mm/page_alloc.c:1826 prep_new_page+0x1c/0x110 mm/page_alloc.c:1834 get_page_from_freelist+0x496e/0x4a20 mm/page_alloc.c:3914 __alloc_pages_noprof+0x35f/0x7e0 mm/page_alloc.c:5264 __alloc_pages_node_noprof include/linux/gfp.h:269 [inline] alloc_pages_node_noprof include/linux/gfp.h:296 [inline] alloc_pages_noprof include/linux/gfp.h:313 [inline] stack_depot_save_flags+0x672/0x800 lib/stackdepot.c:627 kasan_save_stack mm/kasan/common.c:49 [inline] kasan_save_track+0x4f/0x80 mm/kasan/common.c:69 kasan_save_free_info+0x4a/0x60 mm/kasan/generic.c:579 poison_slab_object mm/kasan/common.c:248 [inline] __kasan_slab_free+0x5f/0x80 mm/kasan/common.c:265 kasan_slab_free include/linux/kasan.h:233 [inline] slab_free_hook mm/slub.c:2445 [inline] slab_free mm/slub.c:4714 [inline] kfree+0x158/0x440 mm/slub.c:4871 krealloc_noprof+0xfa/0x130 mm/slab_common.c:-1 ::call rust/kernel/alloc/allocator.rs:102 [inline] ::realloc rust/kernel/alloc/allocator.rs:141 [inline] ::free+0xc6/0x200 rust/kernel/alloc.rs:214 >, kernel::alloc::allocator::Kmalloc> as core::ops::drop::Drop>::drop rust/kernel/alloc/kbox.rs:492 [inline] core::ptr::drop_in_place::>, kernel::alloc::allocator::Kmalloc>> usr/local/rustup/toolchains/1.91.1-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/core/src/ptr/mod.rs:804 [inline] , kernel::alloc::allocator::Kmalloc>>::into_inner rust/kernel/alloc/kbox.rs:321 [inline] >::remove rust/kernel/rbtree.rs:1251 [inline] <>::remove as core::ops::function::FnOnce<(kernel::rbtree::OccupiedEntry,)>>::call_once usr/local/rustup/toolchains/1.91.1-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/core/src/ops/function.rs:250 [inline] >>::map::>::remove> usr/local/rustup/toolchains/1.91.1-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/core/src/option.rs:1159 [inline] >::remove rust/kernel/rbtree.rs:410 [inline] ::update_ref+0x152c/0x22a0 drivers/android/binder/process.rs:972 ::cleanup_object drivers/android/binder/allocation.rs:445 [inline] ::drop+0x1215/0x5110 drivers/android/binder/allocation.rs:258 core::ptr::drop_in_place::+0x26/0x1a0 usr/local/rustup/toolchains/1.91.1-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/core/src/ptr/mod.rs:804 ::copy_transaction_data+0x2722/0x5500 drivers/android/binder/thread.rs:1208 ::new+0x3b2/0x2120 drivers/android/binder/transaction.rs:81 ::transaction_inner drivers/android/binder/thread.rs:1328 [inline] <::transaction_inner as core::ops::function::FnOnce<(&kernel::sync::arc::Arc, &rust_binder_main::defs::BinderTransactionDataSg)>>::call_once usr/local/rustup/toolchains/1.91.1-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/core/src/ops/function.rs:250 [inline] ::transaction::<::transaction_inner>+0x8c4/0x1110 drivers/android/binder/thread.rs:1303 ::write+0x17dc/0xa690 drivers/android/binder/thread.rs:1442 ::write_read drivers/android/binder/thread.rs:1590 [inline] ::ioctl_write_read drivers/android/binder/process.rs:1609 [inline] ::ioctl drivers/android/binder/process.rs:1674 [inline] rust_binder_main::rust_binder_ioctl+0x1077/0x5da0 drivers/android/binder/rust_binder_main.rs:447 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:907 [inline] __se_sys_ioctl+0x132/0x1b0 fs/ioctl.c:893 __x64_sys_ioctl+0x7f/0xa0 fs/ioctl.c:893 x64_sys_call+0x1878/0x2ee0 arch/x86/include/generated/asm/syscalls_64.h:17 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0x57/0xf0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x76/0x7e RIP: 0033:0x7f8762b9acb9 Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f8763ab6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007f8762e15fa0 RCX: 00007f8762b9acb9 RDX: 0000200000000100 RSI: 00000000c0306201 RDI: 0000000000000004 RBP: 00007f8762c08bf7 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f8762e16038 R14: 00007f8762e15fa0 R15: 00007ffc2a3b4658 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:get_stack_info_noinstr+0x1a/0x130 arch/x86/kernel/dumpstack_64.c:173 Code: b8 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 66 0f 1f 00 55 48 89 e5 41 57 41 56 41 55 41 54 53 49 89 d6 49 89 f4 49 89 ff 21 01 00 00 b3 01 84 c0 75 0f 65 48 8b 05 13 2d 67 7a 49 39 c4 RSP: 0018:ffffc90003b70000 EFLAGS: 00010286 RAX: ffff88811ee3df00 RBX: ffffc90003b70108 RCX: ffffc90003b70108 RDX: ffffc90003b700e8 RSI: ffff88811ee3df00 RDI: ffffc90003b700d8 RBP: ffffc90003b70028 R08: ffffc90003b70147 R09: 0000000000000000 R10: ffffc90003b700e8 R11: fffff5200076e029 R12: ffff88811ee3df00 R13: ffffc90003b700d8 R14: ffffc90003b700e8 R15: ffffc90003b700d8 FS: 00007f8763ab66c0(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffc90003b6fff8 CR3: 0000000118ffa000 CR4: 00000000003526b0 ---------------- Code disassembly (best guess): 0: b8 00 00 00 00 mov $0x0,%eax 5: 90 nop 6: 90 nop 7: 90 nop 8: 90 nop 9: 90 nop a: 90 nop b: 90 nop c: 90 nop d: 90 nop e: 90 nop f: 90 nop 10: 66 0f 1f 00 nopw (%rax) 14: 55 push %rbp 15: 48 89 e5 mov %rsp,%rbp 18: 41 57 push %r15 1a: 41 56 push %r14 1c: 41 55 push %r13 1e: 41 54 push %r12 20: 53 push %rbx 21: 49 89 d6 mov %rdx,%r14 24: 49 89 f4 mov %rsi,%r12 27: 49 89 ff mov %rdi,%r15 * 2a: e8 21 01 00 00 call 0x150 <-- trapping instruction 2f: b3 01 mov $0x1,%bl 31: 84 c0 test %al,%al 33: 75 0f jne 0x44 35: 65 48 8b 05 13 2d 67 mov %gs:0x7a672d13(%rip),%rax # 0x7a672d50 3c: 7a 3d: 49 39 c4 cmp %rax,%r12