BUG: TASK stack guard page was hit at ffffc90001077ff8 (stack is ffffc90001078000..ffffc90001080000) Oops: stack guard page: 0000 [#1] PREEMPT SMP KASAN PTI CPU: 1 UID: 0 PID: 10185 Comm: syz.5.3373 Not tainted syzkaller #0 f5341d37ab1b0541b3ffd7f2e2acc38550dc07c9 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 RIP: 0010:check_region_inline mm/kasan/generic.c:171 [inline] RIP: 0010:kasan_check_range+0x13/0x2b0 mm/kasan/generic.c:189 Code: c1 03 cc cc cc cc cc b8 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 66 0f 1f 00 b0 01 48 85 f6 0f 84 c0 01 00 00 55 48 89 e5 <41> 57 41 56 41 55 41 54 53 4c 8d 04 37 49 39 f8 0f 82 29 02 00 00 RSP: 0018:ffffc90001078000 EFLAGS: 00010202 RAX: 0000000000000001 RBX: 1ffff1103edee451 RCX: ffffffff81d9b71b RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffffffff87e38238 RBP: ffffc90001078000 R08: ffff8881f6f72280 R09: 0000000000000002 R10: 0000000000000000 R11: 00000000fffffffc R12: 000000000000003f R13: 000000000000f51b R14: 0000000000000fda R15: 0000000000001193 FS: 00007f0f58bf36c0(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffc90001077ff8 CR3: 00000001281b0000 CR4: 00000000003526b0 Call Trace: __kasan_check_read+0x15/0x20 mm/kasan/shadow.c:31 instrument_atomic_read include/linux/instrumented.h:68 [inline] _test_bit include/asm-generic/bitops/instrumented-non-atomic.h:141 [inline] nr_pcp_alloc mm/page_alloc.c:3176 [inline] ___rmqueue_pcplist+0x4fb/0x31b0 mm/page_alloc.c:3215 __rmqueue_pcplist mm/page_alloc.c:3263 [inline] rmqueue_pcplist mm/page_alloc.c:3292 [inline] rmqueue mm/page_alloc.c:3325 [inline] get_page_from_freelist+0x6f5/0x4a20 mm/page_alloc.c:3911 __alloc_pages_noprof+0x35f/0x7e0 mm/page_alloc.c:5264 __alloc_pages_node_noprof include/linux/gfp.h:269 [inline] alloc_pages_node_noprof include/linux/gfp.h:296 [inline] alloc_pages_noprof include/linux/gfp.h:313 [inline] stack_depot_save_flags+0x672/0x800 lib/stackdepot.c:627 kasan_save_stack mm/kasan/common.c:50 [inline] kasan_save_track+0x4f/0x80 mm/kasan/common.c:70 kasan_save_free_info+0x4a/0x60 mm/kasan/generic.c:579 poison_slab_object mm/kasan/common.c:249 [inline] __kasan_slab_free+0x5f/0x80 mm/kasan/common.c:266 kasan_slab_free include/linux/kasan.h:234 [inline] slab_free_hook mm/slub.c:2445 [inline] slab_free mm/slub.c:4714 [inline] kfree+0x158/0x440 mm/slub.c:4871 krealloc_noprof+0xfa/0x130 mm/slab_common.c:-1 ::call rust/kernel/alloc/allocator.rs:102 [inline] ::realloc rust/kernel/alloc/allocator.rs:141 [inline] ::free+0xc6/0x200 rust/kernel/alloc.rs:214 , kernel::alloc::allocator::Kmalloc> as core::ops::drop::Drop>::drop rust/kernel/alloc/kbox.rs:492 [inline] core::ptr::drop_in_place::, kernel::alloc::allocator::Kmalloc>> usr/local/rustup/toolchains/1.91.1-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/core/src/ptr/mod.rs:804 [inline] core::mem::drop::, kernel::alloc::allocator::Kmalloc>> usr/local/rustup/toolchains/1.91.1-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/core/src/mem/mod.rs:961 [inline] as core::ops::drop::Drop>::drop+0x1a9/0x2b0 rust/kernel/sync/arc.rs:404 core::ptr::drop_in_place::> usr/local/rustup/toolchains/1.91.1-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/core/src/ptr/mod.rs:804 [inline] core::ptr::drop_in_place::> usr/local/rustup/toolchains/1.91.1-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/core/src/ptr/mod.rs:804 [inline] core::ptr::drop_in_place::>> usr/local/rustup/toolchains/1.91.1-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/core/src/ptr/mod.rs:804 [inline] ::update_ref+0x1387/0x22a0 drivers/android/binder/process.rs:971 ::cleanup_object drivers/android/binder/allocation.rs:445 [inline] ::drop+0x1741/0x56b0 drivers/android/binder/allocation.rs:258 core::ptr::drop_in_place::+0x26/0x1a0 usr/local/rustup/toolchains/1.91.1-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/core/src/ptr/mod.rs:804 ::copy_transaction_data+0x4009/0x57b0 drivers/android/binder/thread.rs:1230 ::new+0x3a2/0x2150 drivers/android/binder/transaction.rs:81 ::transaction_inner drivers/android/binder/thread.rs:1350 [inline] <::transaction_inner as core::ops::function::FnOnce<(&kernel::sync::arc::Arc, &rust_binder_main::defs::BinderTransactionDataSg)>>::call_once usr/local/rustup/toolchains/1.91.1-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/core/src/ops/function.rs:250 [inline] ::transaction::<::transaction_inner>+0x8c4/0x1110 drivers/android/binder/thread.rs:1325 ::write+0x17dc/0xa690 drivers/android/binder/thread.rs:1464 ::write_read drivers/android/binder/thread.rs:1612 [inline] ::ioctl_write_read drivers/android/binder/process.rs:1609 [inline] ::ioctl drivers/android/binder/process.rs:1674 [inline] rust_binder_main::rust_binder_ioctl+0x1077/0x5da0 drivers/android/binder/rust_binder_main.rs:447 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:907 [inline] __se_sys_ioctl+0x132/0x1b0 fs/ioctl.c:893 __x64_sys_ioctl+0x7f/0xa0 fs/ioctl.c:893 x64_sys_call+0x1878/0x2ee0 arch/x86/include/generated/asm/syscalls_64.h:17 do_syscall_x64 arch/x86/entry/common.c:47 [inline] do_syscall_64+0x57/0xf0 arch/x86/entry/common.c:78 entry_SYSCALL_64_after_hwframe+0x76/0x7e RIP: 0033:0x7f0f57d9aeb9 Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f0f58bf3028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007f0f58015fa0 RCX: 00007f0f57d9aeb9 RDX: 00002000000001c0 RSI: 00000000c0306201 RDI: 0000000000000003 RBP: 00007f0f57e08c1f R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f0f58016038 R14: 00007f0f58015fa0 R15: 00007ffe84972ec8 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:check_region_inline mm/kasan/generic.c:171 [inline] RIP: 0010:kasan_check_range+0x13/0x2b0 mm/kasan/generic.c:189 Code: c1 03 cc cc cc cc cc b8 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 66 0f 1f 00 b0 01 48 85 f6 0f 84 c0 01 00 00 55 48 89 e5 <41> 57 41 56 41 55 41 54 53 4c 8d 04 37 49 39 f8 0f 82 29 02 00 00 RSP: 0018:ffffc90001078000 EFLAGS: 00010202 RAX: 0000000000000001 RBX: 1ffff1103edee451 RCX: ffffffff81d9b71b RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffffffff87e38238 RBP: ffffc90001078000 R08: ffff8881f6f72280 R09: 0000000000000002 R10: 0000000000000000 R11: 00000000fffffffc R12: 000000000000003f R13: 000000000000f51b R14: 0000000000000fda R15: 0000000000001193 FS: 00007f0f58bf36c0(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffc90001077ff8 CR3: 00000001281b0000 CR4: 00000000003526b0 ---------------- Code disassembly (best guess): 0: c1 03 cc roll $0xcc,(%rbx) 3: cc int3 4: cc int3 5: cc int3 6: cc int3 7: b8 00 00 00 00 mov $0x0,%eax c: 90 nop d: 90 nop e: 90 nop f: 90 nop 10: 90 nop 11: 90 nop 12: 90 nop 13: 90 nop 14: 90 nop 15: 90 nop 16: 90 nop 17: 66 0f 1f 00 nopw (%rax) 1b: b0 01 mov $0x1,%al 1d: 48 85 f6 test %rsi,%rsi 20: 0f 84 c0 01 00 00 je 0x1e6 26: 55 push %rbp 27: 48 89 e5 mov %rsp,%rbp * 2a: 41 57 push %r15 <-- trapping instruction 2c: 41 56 push %r14 2e: 41 55 push %r13 30: 41 54 push %r12 32: 53 push %rbx 33: 4c 8d 04 37 lea (%rdi,%rsi,1),%r8 37: 49 39 f8 cmp %rdi,%r8 3a: 0f 82 29 02 00 00 jb 0x269