BUG: TASK stack guard page was hit at ffffc9000db7fff8 (stack is ffffc9000db80000..ffffc9000db88000) Oops: stack guard page: 0000 [#1] PREEMPT SMP KASAN PTI CPU: 1 UID: 0 PID: 430 Comm: syz.3.39 Not tainted syzkaller #0 4629476e74998a42e0eeb731ff095178aeeee8c1 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 RIP: 0010:__asan_memset+0x8/0x50 mm/kasan/shadow.c:83 Code: ba 01 00 00 00 e8 68 e4 ff ff 5d e9 52 b6 c3 03 cc 90 b8 26 7d a8 24 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 55 48 89 e5 <41> 57 41 56 53 48 89 d3 41 89 f6 49 89 ff 48 8b 4d 08 48 89 d6 ba RSP: 0018:ffffc9000db80000 EFLAGS: 00010246 RAX: ffff888115ba1300 RBX: ffffc9000db80088 RCX: ffffc9000db80110 RDX: 0000000000000060 RSI: 0000000000000000 RDI: ffffc9000db80088 RBP: ffffc9000db80000 R08: dffffc0000000000 R09: 0000000000000000 R10: ffffc9000db801c0 R11: fffff52001b700a4 R12: 0000000000000000 R13: 0000000000000010 R14: dffffc0000000000 R15: ffff888115ba1300 FS: 00007fafdf4c86c0(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffc9000db7fff8 CR3: 0000000133dd8000 CR4: 00000000003526b0 Call Trace: __unwind_start+0x38/0x410 arch/x86/kernel/unwind_frame.c:378 unwind_start arch/x86/include/asm/unwind.h:64 [inline] arch_stack_walk+0xf2/0x170 arch/x86/kernel/stacktrace.c:24 stack_trace_save+0xaa/0x100 kernel/stacktrace.c:122 kasan_save_stack mm/kasan/common.c:49 [inline] kasan_save_track+0x3e/0x80 mm/kasan/common.c:70 kasan_save_alloc_info+0x40/0x50 mm/kasan/generic.c:565 poison_kmalloc_redzone mm/kasan/common.c:379 [inline] __kasan_kmalloc+0x96/0xb0 mm/kasan/common.c:396 kasan_kmalloc include/linux/kasan.h:261 [inline] __kmalloc_cache_noprof+0x23c/0x470 mm/slub.c:4426 kmalloc_noprof include/linux/slab.h:881 [inline] add_stack_record_to_list mm/page_owner.c:190 [inline] inc_stack_record_count mm/page_owner.c:232 [inline] __set_page_owner+0x2af/0x600 mm/page_owner.c:347 set_page_owner include/linux/page_owner.h:35 [inline] post_alloc_hook+0x3b8/0x3f0 mm/page_alloc.c:1864 prep_new_page+0x20/0x120 mm/page_alloc.c:1872 get_page_from_freelist+0x496e/0x4a20 mm/page_alloc.c:3948 __alloc_pages_noprof+0x35f/0x7e0 mm/page_alloc.c:5298 __alloc_pages_node_noprof include/linux/gfp.h:269 [inline] alloc_pages_node_noprof include/linux/gfp.h:296 [inline] alloc_pages_noprof include/linux/gfp.h:313 [inline] stack_depot_save_flags+0x672/0x800 lib/stackdepot.c:627 kasan_save_stack mm/kasan/common.c:50 [inline] kasan_save_track+0x4f/0x80 mm/kasan/common.c:70 kasan_save_free_info+0x4a/0x60 mm/kasan/generic.c:579 poison_slab_object mm/kasan/common.c:249 [inline] __kasan_slab_free+0x5f/0x80 mm/kasan/common.c:266 kasan_slab_free include/linux/kasan.h:234 [inline] slab_free_hook mm/slub.c:2445 [inline] slab_free mm/slub.c:4714 [inline] kfree+0x158/0x440 mm/slub.c:4875 krealloc_noprof+0xfa/0x130 mm/slab_common.c:-1 ::call rust/kernel/alloc/allocator.rs:102 [inline] ::realloc rust/kernel/alloc/allocator.rs:141 [inline] ::free rust/kernel/alloc.rs:214 [inline] >>, kernel::alloc::allocator::Kmalloc> as core::ops::drop::Drop>::drop rust/kernel/alloc/kbox.rs:492 [inline] core::ptr::drop_in_place::>>, kernel::alloc::allocator::Kmalloc>>+0x114/0x360 usr/local/rustup/toolchains/1.91.1-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/core/src/ptr/mod.rs:804 >, kernel::alloc::allocator::Kmalloc>>::into_inner rust/kernel/alloc/kbox.rs:321 [inline] >>::remove rust/kernel/rbtree.rs:1251 [inline] <>>::remove as core::ops::function::FnOnce<(kernel::rbtree::OccupiedEntry>,)>>::call_once usr/local/rustup/toolchains/1.91.1-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/core/src/ops/function.rs:250 [inline] >>>::map::, >>::remove> usr/local/rustup/toolchains/1.91.1-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/core/src/option.rs:1159 [inline] >>::remove rust/kernel/rbtree.rs:410 [inline] ::update_ref+0x16c0/0x2660 drivers/android/binder/process.rs:974 ::cleanup_object drivers/android/binder/allocation.rs:445 [inline] ::drop+0x16ed/0x5c60 drivers/android/binder/allocation.rs:258 core::ptr::drop_in_place::+0x1a/0xf0 usr/local/rustup/toolchains/1.91.1-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/core/src/ptr/mod.rs:804 core::ptr::drop_in_place:: usr/local/rustup/toolchains/1.91.1-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/core/src/ptr/mod.rs:804 [inline] ::copy_transaction_data+0x7a55/0x9130 drivers/android/binder/thread.rs:1238 ::new+0x3c7/0x2810 drivers/android/binder/transaction.rs:85 ::transaction_inner drivers/android/binder/thread.rs:1358 [inline] <::transaction_inner as core::ops::function::FnOnce<(&kernel::sync::arc::Arc, &rust_binder_main::defs::BinderTransactionDataSg)>>::call_once usr/local/rustup/toolchains/1.91.1-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/core/src/ops/function.rs:250 [inline] ::transaction::<::transaction_inner>+0xb22/0x1290 drivers/android/binder/thread.rs:1333 ::write+0x15b0/0xaf80 drivers/android/binder/thread.rs:1472 ::write_read drivers/android/binder/thread.rs:1620 [inline] ::ioctl_write_read drivers/android/binder/process.rs:1616 [inline] ::ioctl drivers/android/binder/process.rs:1681 [inline] rust_binder_main::rust_binder_ioctl+0x1192/0x5c20 drivers/android/binder/rust_binder_main.rs:460 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:907 [inline] __se_sys_ioctl+0x132/0x1b0 fs/ioctl.c:893 __x64_sys_ioctl+0x7f/0xa0 fs/ioctl.c:893 x64_sys_call+0x1878/0x2ee0 arch/x86/include/generated/asm/syscalls_64.h:17 do_syscall_x64 arch/x86/entry/common.c:47 [inline] do_syscall_64+0x57/0xf0 arch/x86/entry/common.c:78 entry_SYSCALL_64_after_hwframe+0x76/0x7e RIP: 0033:0x7fafde59c819 Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fafdf4c8028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007fafde815fa0 RCX: 00007fafde59c819 RDX: 00002000000001c0 RSI: 00000000c0306201 RDI: 0000000000000006 RBP: 00007fafde632c91 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007fafde816038 R14: 00007fafde815fa0 R15: 00007ffe6e39cb58 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:__asan_memset+0x8/0x50 mm/kasan/shadow.c:83 Code: ba 01 00 00 00 e8 68 e4 ff ff 5d e9 52 b6 c3 03 cc 90 b8 26 7d a8 24 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 55 48 89 e5 <41> 57 41 56 53 48 89 d3 41 89 f6 49 89 ff 48 8b 4d 08 48 89 d6 ba RSP: 0018:ffffc9000db80000 EFLAGS: 00010246 RAX: ffff888115ba1300 RBX: ffffc9000db80088 RCX: ffffc9000db80110 RDX: 0000000000000060 RSI: 0000000000000000 RDI: ffffc9000db80088 RBP: ffffc9000db80000 R08: dffffc0000000000 R09: 0000000000000000 R10: ffffc9000db801c0 R11: fffff52001b700a4 R12: 0000000000000000 R13: 0000000000000010 R14: dffffc0000000000 R15: ffff888115ba1300 FS: 00007fafdf4c86c0(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffc9000db7fff8 CR3: 0000000133dd8000 CR4: 00000000003526b0 ---------------- Code disassembly (best guess): 0: ba 01 00 00 00 mov $0x1,%edx 5: e8 68 e4 ff ff call 0xffffe472 a: 5d pop %rbp b: e9 52 b6 c3 03 jmp 0x3c3b662 10: cc int3 11: 90 nop 12: b8 26 7d a8 24 mov $0x24a87d26,%eax 17: 90 nop 18: 90 nop 19: 90 nop 1a: 90 nop 1b: 90 nop 1c: 90 nop 1d: 90 nop 1e: 90 nop 1f: 90 nop 20: 90 nop 21: 90 nop 22: f3 0f 1e fa endbr64 26: 55 push %rbp 27: 48 89 e5 mov %rsp,%rbp * 2a: 41 57 push %r15 <-- trapping instruction 2c: 41 56 push %r14 2e: 53 push %rbx 2f: 48 89 d3 mov %rdx,%rbx 32: 41 89 f6 mov %esi,%r14d 35: 49 89 ff mov %rdi,%r15 38: 48 8b 4d 08 mov 0x8(%rbp),%rcx 3c: 48 89 d6 mov %rdx,%rsi 3f: ba .byte 0xba