BUG: TASK stack guard page was hit at ffffc9000e9dfff8 (stack is ffffc9000e9e0000..ffffc9000e9e8000) Oops: stack guard page: 0000 [#1] PREEMPT SMP KASAN PTI CPU: 0 UID: 0 PID: 1378 Comm: syz.0.380 Not tainted syzkaller #0 6e9554c60025b20768244e67b1d15d7ce813f552 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 RIP: 0010:get_stack_info_noinstr+0x1a/0x130 arch/x86/kernel/dumpstack_64.c:173 Code: b8 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 66 0f 1f 00 55 48 89 e5 41 57 41 56 41 55 41 54 53 49 89 d6 49 89 f4 49 89 ff 21 01 00 00 b3 01 84 c0 75 0f 65 48 8b 05 d3 ac 65 7a 49 39 c4 RSP: 0018:ffffc9000e9e0000 EFLAGS: 00010286 RAX: ffff888113d93900 RBX: ffffc9000e9e0108 RCX: ffffc9000e9e0108 RDX: ffffc9000e9e00e8 RSI: ffff888113d93900 RDI: ffffc9000e9e00d8 RBP: ffffc9000e9e0028 R08: ffffc9000e9e0147 R09: 0000000000000000 R10: ffffc9000e9e00e8 R11: fffff52001d3c029 R12: ffff888113d93900 R13: ffffc9000e9e00d8 R14: ffffc9000e9e00e8 R15: ffffc9000e9e00d8 FS: 00007f22380996c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffc9000e9dfff8 CR3: 000000010df18000 CR4: 00000000003526b0 DR0: 0000000000000f80 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 Call Trace: get_stack_info+0x3e/0x100 arch/x86/kernel/dumpstack_64.c:199 __unwind_start+0x20b/0x410 arch/x86/kernel/unwind_frame.c:405 unwind_start arch/x86/include/asm/unwind.h:64 [inline] arch_stack_walk+0xf2/0x170 arch/x86/kernel/stacktrace.c:24 stack_trace_save+0xaa/0x100 kernel/stacktrace.c:122 save_stack+0x125/0x240 mm/page_owner.c:174 __set_page_owner+0x8e/0x600 mm/page_owner.c:338 set_page_owner include/linux/page_owner.h:35 [inline] post_alloc_hook+0x3b8/0x3f0 mm/page_alloc.c:1864 prep_new_page+0x20/0x120 mm/page_alloc.c:1872 get_page_from_freelist+0x496e/0x4a20 mm/page_alloc.c:3948 __alloc_pages_noprof+0x35f/0x7e0 mm/page_alloc.c:5298 __alloc_pages_node_noprof include/linux/gfp.h:269 [inline] alloc_pages_node_noprof include/linux/gfp.h:296 [inline] alloc_pages_noprof include/linux/gfp.h:313 [inline] stack_depot_save_flags+0x672/0x800 lib/stackdepot.c:627 kasan_save_stack mm/kasan/common.c:50 [inline] kasan_save_track+0x4f/0x80 mm/kasan/common.c:70 kasan_save_free_info+0x4a/0x60 mm/kasan/generic.c:579 poison_slab_object mm/kasan/common.c:249 [inline] __kasan_slab_free+0x5f/0x80 mm/kasan/common.c:266 kasan_slab_free include/linux/kasan.h:234 [inline] slab_free_hook mm/slub.c:2445 [inline] slab_free mm/slub.c:4714 [inline] kfree+0x158/0x440 mm/slub.c:4871 krealloc_noprof+0xfa/0x130 mm/slab_common.c:-1 ::call rust/kernel/alloc/allocator.rs:102 [inline] ::realloc rust/kernel/alloc/allocator.rs:141 [inline] ::free+0xc6/0x200 rust/kernel/alloc.rs:214 , kernel::alloc::allocator::Kmalloc> as core::ops::drop::Drop>::drop rust/kernel/alloc/kbox.rs:492 [inline] core::ptr::drop_in_place::, kernel::alloc::allocator::Kmalloc>> usr/local/rustup/toolchains/1.91.1-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/core/src/ptr/mod.rs:804 [inline] core::mem::drop::, kernel::alloc::allocator::Kmalloc>> usr/local/rustup/toolchains/1.91.1-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/core/src/mem/mod.rs:961 [inline] as core::ops::drop::Drop>::drop+0x1a9/0x2b0 rust/kernel/sync/arc.rs:404 core::ptr::drop_in_place::> usr/local/rustup/toolchains/1.91.1-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/core/src/ptr/mod.rs:804 [inline] core::ptr::drop_in_place::> usr/local/rustup/toolchains/1.91.1-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/core/src/ptr/mod.rs:804 [inline] core::ptr::drop_in_place::>> usr/local/rustup/toolchains/1.91.1-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/core/src/ptr/mod.rs:804 [inline] ::update_ref+0x1247/0x21a0 drivers/android/binder/process.rs:974 ::cleanup_object drivers/android/binder/allocation.rs:445 [inline] ::drop+0x153b/0x5360 drivers/android/binder/allocation.rs:258 core::ptr::drop_in_place::+0x26/0x1a0 usr/local/rustup/toolchains/1.91.1-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/core/src/ptr/mod.rs:804 ::copy_transaction_data+0x6c90/0x8370 drivers/android/binder/thread.rs:1236 ::new+0x390/0x2070 drivers/android/binder/transaction.rs:85 ::oneway_transaction_inner drivers/android/binder/thread.rs:1425 [inline] <::oneway_transaction_inner as core::ops::function::FnOnce<(&kernel::sync::arc::Arc, &rust_binder_main::defs::BinderTransactionDataSg)>>::call_once usr/local/rustup/toolchains/1.91.1-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/core/src/ops/function.rs:250 [inline] ::transaction::<::oneway_transaction_inner>+0x2f5/0xb80 drivers/android/binder/thread.rs:1331 ::write+0x1988/0xa0f0 drivers/android/binder/thread.rs:1468 ::write_read drivers/android/binder/thread.rs:1618 [inline] ::ioctl_write_read drivers/android/binder/process.rs:1616 [inline] ::ioctl drivers/android/binder/process.rs:1681 [inline] rust_binder_main::rust_binder_ioctl+0x1019/0x55c0 drivers/android/binder/rust_binder_main.rs:460 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:907 [inline] __se_sys_ioctl+0x132/0x1b0 fs/ioctl.c:893 __x64_sys_ioctl+0x7f/0xa0 fs/ioctl.c:893 x64_sys_call+0x1878/0x2ee0 arch/x86/include/generated/asm/syscalls_64.h:17 do_syscall_x64 arch/x86/entry/common.c:47 [inline] do_syscall_64+0x57/0xf0 arch/x86/entry/common.c:78 entry_SYSCALL_64_after_hwframe+0x76/0x7e RIP: 0033:0x7f223719c799 Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f2238099028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007f2237415fa0 RCX: 00007f223719c799 RDX: 00002000000001c0 RSI: 00000000c0306201 RDI: 0000000000000005 RBP: 00007f2237232c99 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f2237416038 R14: 00007f2237415fa0 R15: 00007ffc7e6be8b8 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:get_stack_info_noinstr+0x1a/0x130 arch/x86/kernel/dumpstack_64.c:173 Code: b8 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 66 0f 1f 00 55 48 89 e5 41 57 41 56 41 55 41 54 53 49 89 d6 49 89 f4 49 89 ff 21 01 00 00 b3 01 84 c0 75 0f 65 48 8b 05 d3 ac 65 7a 49 39 c4 RSP: 0018:ffffc9000e9e0000 EFLAGS: 00010286 RAX: ffff888113d93900 RBX: ffffc9000e9e0108 RCX: ffffc9000e9e0108 RDX: ffffc9000e9e00e8 RSI: ffff888113d93900 RDI: ffffc9000e9e00d8 RBP: ffffc9000e9e0028 R08: ffffc9000e9e0147 R09: 0000000000000000 R10: ffffc9000e9e00e8 R11: fffff52001d3c029 R12: ffff888113d93900 R13: ffffc9000e9e00d8 R14: ffffc9000e9e00e8 R15: ffffc9000e9e00d8 FS: 00007f22380996c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffc9000e9dfff8 CR3: 000000010df18000 CR4: 00000000003526b0 DR0: 0000000000000f80 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: b8 00 00 00 00 mov $0x0,%eax 5: 90 nop 6: 90 nop 7: 90 nop 8: 90 nop 9: 90 nop a: 90 nop b: 90 nop c: 90 nop d: 90 nop e: 90 nop f: 90 nop 10: 66 0f 1f 00 nopw (%rax) 14: 55 push %rbp 15: 48 89 e5 mov %rsp,%rbp 18: 41 57 push %r15 1a: 41 56 push %r14 1c: 41 55 push %r13 1e: 41 54 push %r12 20: 53 push %rbx 21: 49 89 d6 mov %rdx,%r14 24: 49 89 f4 mov %rsi,%r12 27: 49 89 ff mov %rdi,%r15 * 2a: e8 21 01 00 00 call 0x150 <-- trapping instruction 2f: b3 01 mov $0x1,%bl 31: 84 c0 test %al,%al 33: 75 0f jne 0x44 35: 65 48 8b 05 d3 ac 65 mov %gs:0x7a65acd3(%rip),%rax # 0x7a65ad10 3c: 7a 3d: 49 39 c4 cmp %rax,%r12