BUG: TASK stack guard page was hit at ffffc9001012fff8 (stack is ffffc90010130000..ffffc90010138000) Oops: stack guard page: 0000 [#1] PREEMPT SMP KASAN PTI CPU: 0 UID: 0 PID: 1087 Comm: syz.1.243 Not tainted syzkaller #0 916f3d974aa0fa32e8d6ac226cea77ce335b314b Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 RIP: 0010:update_curr+0xf3/0x9e0 kernel/sched/fair.c:1286 Code: 07 48 89 44 24 40 48 89 5c 24 30 42 c6 44 23 06 01 c6 84 24 b0 00 00 00 00 4d 85 f6 0f 84 fd 04 00 00 48 8b 7c 24 40 4c 89 f6 b8 40 fe ff 48 85 c0 0f 8e e7 04 00 00 48 89 c3 4c 89 6c 24 50 RSP: 0018:ffffc90010130000 EFLAGS: 00010086 RAX: ffff8881f6e4fac0 RBX: 1ffff92002026010 RCX: dffffc0000000000 RDX: 1ffff92002026038 RSI: ffff88810a7a7000 RDI: ffff8881f6e4fac0 RBP: ffffc90010130120 R08: 0000000000000003 R09: 0000000000000004 R10: dffffc0000000000 R11: fffff5200202602a R12: dffffc0000000000 R13: ffff8881f6e4fd10 R14: ffff88810a7a7000 R15: ffff8881f6e4fdf8 FS: 00007f4e58dd46c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffc9001012fff8 CR3: 000000011b2be000 CR4: 00000000003526b0 Call Trace: pick_task_fair+0xc8/0x4e0 kernel/sched/fair.c:9029 pick_next_task_fair+0xb1/0x770 kernel/sched/fair.c:9056 __pick_next_task kernel/sched/core.c:6676 [inline] pick_next_task kernel/sched/core.c:7196 [inline] __schedule+0x6a0/0x1fa0 kernel/sched/core.c:7796 preempt_schedule_irq+0xab/0x110 kernel/sched/core.c:8196 raw_irqentry_exit_cond_resched+0x32/0x40 kernel/entry/common.c:311 irqentry_exit+0x4a/0x60 kernel/entry/common.c:354 sysvec_reschedule_ipi+0x72/0x80 arch/x86/kernel/smp.c:248 asm_sysvec_reschedule_ipi+0x1f/0x30 arch/x86/include/asm/idtentry.h:707 RIP: 0010:__kasan_unpoison_pages+0x28/0x40 mm/kasan/common.c:138 Code: 90 90 66 0f 1f 00 55 48 89 e5 89 f1 48 c1 e7 06 48 b8 00 00 00 00 80 08 05 00 48 01 c7 be 00 10 00 00 48 d3 e6 e8 e8 3b 00 00 01 5d e9 50 f8 c3 03 cc 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 RSP: 0018:ffffc90010130590 EFLAGS: 00000246 RAX: 0000000000000000 RBX: ffffea00041edb00 RCX: 0000000000000000 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed1020f6e000 RBP: ffffc90010130590 R08: ffffea00041edb37 R09: 0000000000000000 R10: ffffed1020f6d800 R11: fffff9400083db67 R12: 0000000000000004 R13: 1ffff920020260b8 R14: 0000000000000002 R15: 0000000000000000 kasan_unpoison_pages include/linux/kasan.h:126 [inline] post_alloc_hook+0x168/0x3f0 mm/page_alloc.c:1848 prep_new_page+0x20/0x120 mm/page_alloc.c:1872 get_page_from_freelist+0x496e/0x4a20 mm/page_alloc.c:3948 __alloc_pages_noprof+0x35f/0x7e0 mm/page_alloc.c:5298 __alloc_pages_node_noprof include/linux/gfp.h:269 [inline] alloc_pages_node_noprof include/linux/gfp.h:296 [inline] alloc_pages_noprof include/linux/gfp.h:313 [inline] stack_depot_save_flags+0x672/0x800 lib/stackdepot.c:627 kasan_save_stack mm/kasan/common.c:50 [inline] kasan_save_track+0x4f/0x80 mm/kasan/common.c:70 kasan_save_free_info+0x4a/0x60 mm/kasan/generic.c:579 poison_slab_object mm/kasan/common.c:249 [inline] __kasan_slab_free+0x5f/0x80 mm/kasan/common.c:266 kasan_slab_free include/linux/kasan.h:234 [inline] slab_free_hook mm/slub.c:2445 [inline] slab_free mm/slub.c:4714 [inline] kfree+0x158/0x440 mm/slub.c:4875 krealloc_noprof+0xfa/0x130 mm/slab_common.c:-1 ::call rust/kernel/alloc/allocator.rs:102 [inline] ::realloc rust/kernel/alloc/allocator.rs:141 [inline] ::free rust/kernel/alloc.rs:214 [inline] >, kernel::alloc::allocator::Kmalloc> as core::ops::drop::Drop>::drop rust/kernel/alloc/kbox.rs:492 [inline] core::ptr::drop_in_place::>, kernel::alloc::allocator::Kmalloc>>+0x114/0x360 usr/local/rustup/toolchains/1.91.1-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/core/src/ptr/mod.rs:804 , kernel::alloc::allocator::Kmalloc>>::into_inner rust/kernel/alloc/kbox.rs:321 [inline] >::remove rust/kernel/rbtree.rs:1251 [inline] <>::remove as core::ops::function::FnOnce<(kernel::rbtree::OccupiedEntry,)>>::call_once usr/local/rustup/toolchains/1.91.1-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/core/src/ops/function.rs:250 [inline] >>::map::>::remove> usr/local/rustup/toolchains/1.91.1-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/core/src/option.rs:1159 [inline] >::remove rust/kernel/rbtree.rs:410 [inline] ::update_ref+0x18b7/0x2660 drivers/android/binder/process.rs:975 ::cleanup_object drivers/android/binder/allocation.rs:445 [inline] ::drop+0x16ed/0x5c60 drivers/android/binder/allocation.rs:258 core::ptr::drop_in_place::+0x1a/0xf0 usr/local/rustup/toolchains/1.91.1-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/core/src/ptr/mod.rs:804 core::ptr::drop_in_place:: usr/local/rustup/toolchains/1.91.1-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/core/src/ptr/mod.rs:804 [inline] ::copy_transaction_data+0x7a55/0x9130 drivers/android/binder/thread.rs:1238 ::new+0x3c7/0x2810 drivers/android/binder/transaction.rs:85 ::transaction_inner drivers/android/binder/thread.rs:1358 [inline] <::transaction_inner as core::ops::function::FnOnce<(&kernel::sync::arc::Arc, &rust_binder_main::defs::BinderTransactionDataSg)>>::call_once usr/local/rustup/toolchains/1.91.1-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/core/src/ops/function.rs:250 [inline] ::transaction::<::transaction_inner>+0xb22/0x1290 drivers/android/binder/thread.rs:1333 ::write+0x15b0/0xaf80 drivers/android/binder/thread.rs:1472 ::write_read drivers/android/binder/thread.rs:1620 [inline] ::ioctl_write_read drivers/android/binder/process.rs:1616 [inline] ::ioctl drivers/android/binder/process.rs:1681 [inline] rust_binder_main::rust_binder_ioctl+0x1192/0x5c20 drivers/android/binder/rust_binder_main.rs:460 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:907 [inline] __se_sys_ioctl+0x135/0x1b0 fs/ioctl.c:893 __x64_sys_ioctl+0x7f/0xa0 fs/ioctl.c:893 x64_sys_call+0x1878/0x2ee0 arch/x86/include/generated/asm/syscalls_64.h:17 do_syscall_x64 arch/x86/entry/common.c:47 [inline] do_syscall_64+0x57/0xf0 arch/x86/entry/common.c:78 entry_SYSCALL_64_after_hwframe+0x76/0x7e RIP: 0033:0x7f4e5a79c819 Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f4e58dd4028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007f4e5aa16270 RCX: 00007f4e5a79c819 RDX: 00002000000001c0 RSI: 00000000c0306201 RDI: 0000000000000005 RBP: 00007f4e5a832c91 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f4e5aa16308 R14: 00007f4e5aa16270 R15: 00007ffec98d68c8 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:update_curr+0xf3/0x9e0 kernel/sched/fair.c:1286 Code: 07 48 89 44 24 40 48 89 5c 24 30 42 c6 44 23 06 01 c6 84 24 b0 00 00 00 00 4d 85 f6 0f 84 fd 04 00 00 48 8b 7c 24 40 4c 89 f6 b8 40 fe ff 48 85 c0 0f 8e e7 04 00 00 48 89 c3 4c 89 6c 24 50 RSP: 0018:ffffc90010130000 EFLAGS: 00010086 RAX: ffff8881f6e4fac0 RBX: 1ffff92002026010 RCX: dffffc0000000000 RDX: 1ffff92002026038 RSI: ffff88810a7a7000 RDI: ffff8881f6e4fac0 RBP: ffffc90010130120 R08: 0000000000000003 R09: 0000000000000004 R10: dffffc0000000000 R11: fffff5200202602a R12: dffffc0000000000 R13: ffff8881f6e4fd10 R14: ffff88810a7a7000 R15: ffff8881f6e4fdf8 FS: 00007f4e58dd46c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffc9001012fff8 CR3: 000000011b2be000 CR4: 00000000003526b0 ---------------- Code disassembly (best guess), 1 bytes skipped: 0: 48 89 44 24 40 mov %rax,0x40(%rsp) 5: 48 89 5c 24 30 mov %rbx,0x30(%rsp) a: 42 c6 44 23 06 01 movb $0x1,0x6(%rbx,%r12,1) 10: c6 84 24 b0 00 00 00 movb $0x0,0xb0(%rsp) 17: 00 18: 4d 85 f6 test %r14,%r14 1b: 0f 84 fd 04 00 00 je 0x51e 21: 48 8b 7c 24 40 mov 0x40(%rsp),%rdi 26: 4c 89 f6 mov %r14,%rsi * 29: e8 b8 40 fe ff call 0xfffe40e6 <-- trapping instruction 2e: 48 85 c0 test %rax,%rax 31: 0f 8e e7 04 00 00 jle 0x51e 37: 48 89 c3 mov %rax,%rbx 3a: 4c 89 6c 24 50 mov %r13,0x50(%rsp)