BUG: TASK stack guard page was hit at ffffc9000b917ff8 (stack is ffffc9000b918000..ffffc9000b920000) Oops: stack guard page: 0000 [#1] PREEMPT SMP KASAN PTI CPU: 0 UID: 0 PID: 441 Comm: syz.0.48 Not tainted syzkaller #0 2d062ab55dbbb5fe01543989d0c3f882a8d2e457 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 RIP: 0010:check_region_inline mm/kasan/generic.c:171 [inline] RIP: 0010:kasan_check_range+0x13/0x2b0 mm/kasan/generic.c:189 Code: cc cc cc cc cc cc cc b8 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 66 0f 1f 00 b0 01 48 85 f6 0f 84 c0 01 00 00 55 48 89 e5 <41> 57 41 56 41 55 41 54 53 4c 8d 04 37 49 39 f8 0f 82 29 02 00 00 RSP: 0018:ffffc9000b918000 EFLAGS: 00010202 RAX: ffffea0004589601 RBX: 0000000000000000 RCX: ffffffff81d999a9 RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffffea0004589630 RBP: ffffc9000b918000 R08: ffff8881f6e72280 R09: 0000000000000002 R10: 0000000000000000 R11: 00000000fffffffc R12: ffffea0004589630 R13: dffffc0000000000 R14: ffffc9000b918080 R15: 1ffff9200172300c FS: 00007f5d046b96c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffc9000b917ff8 CR3: 0000000114b86000 CR4: 00000000003526b0 Call Trace: __kasan_check_read+0x15/0x20 mm/kasan/shadow.c:31 instrument_atomic_read include/linux/instrumented.h:68 [inline] atomic_read include/linux/atomic/atomic-instrumented.h:32 [inline] page_expected_state mm/page_alloc.c:1053 [inline] check_new_page mm/page_alloc.c:1756 [inline] check_new_pages+0x139/0x390 mm/page_alloc.c:1769 ___rmqueue_pcplist+0x3ae/0x31b0 mm/page_alloc.c:3271 __rmqueue_pcplist mm/page_alloc.c:3297 [inline] rmqueue_pcplist mm/page_alloc.c:3326 [inline] rmqueue mm/page_alloc.c:3359 [inline] get_page_from_freelist+0x6f5/0x4a20 mm/page_alloc.c:3945 __alloc_pages_noprof+0x35f/0x7e0 mm/page_alloc.c:5298 __alloc_pages_node_noprof include/linux/gfp.h:269 [inline] alloc_pages_node_noprof include/linux/gfp.h:296 [inline] alloc_pages_noprof include/linux/gfp.h:313 [inline] stack_depot_save_flags+0x672/0x800 lib/stackdepot.c:627 stack_depot_save+0x12/0x20 lib/stackdepot.c:686 save_stack+0x133/0x240 mm/page_owner.c:175 __set_page_owner+0x8e/0x600 mm/page_owner.c:338 set_page_owner include/linux/page_owner.h:35 [inline] post_alloc_hook+0x3b8/0x3f0 mm/page_alloc.c:1864 prep_new_page+0x20/0x120 mm/page_alloc.c:1872 get_page_from_freelist+0x496e/0x4a20 mm/page_alloc.c:3948 __alloc_pages_noprof+0x35f/0x7e0 mm/page_alloc.c:5298 __alloc_pages_node_noprof include/linux/gfp.h:269 [inline] alloc_pages_node_noprof include/linux/gfp.h:296 [inline] alloc_pages_noprof include/linux/gfp.h:313 [inline] stack_depot_save_flags+0x672/0x800 lib/stackdepot.c:627 kasan_save_stack mm/kasan/common.c:50 [inline] kasan_save_track+0x4f/0x80 mm/kasan/common.c:70 kasan_save_alloc_info+0x40/0x50 mm/kasan/generic.c:565 poison_kmalloc_redzone mm/kasan/common.c:379 [inline] __kasan_kmalloc+0x96/0xb0 mm/kasan/common.c:396 kasan_kmalloc include/linux/kasan.h:261 [inline] __do_kmalloc_node mm/slub.c:4395 [inline] __kmalloc_node_track_caller_noprof+0x251/0x4f0 mm/slub.c:4414 __do_krealloc mm/slab_common.c:1239 [inline] krealloc_noprof+0x8d/0x130 mm/slab_common.c:1288 ::call rust/kernel/alloc/allocator.rs:102 [inline] ::realloc rust/kernel/alloc/allocator.rs:141 [inline] ::alloc+0xb4/0x200 rust/kernel/alloc.rs:159 >, kernel::alloc::allocator::Kmalloc>>::new_uninit rust/kernel/alloc/kbox.rs:269 [inline] >, kernel::alloc::allocator::Kmalloc> as kernel::init::InPlaceInit>>>::try_init::>::new_uninit::{closure#1}, kernel::sync::arc::ArcInner>, kernel::alloc::AllocError>> rust/kernel/alloc/kbox.rs:386 [inline] >::new_uninit rust/kernel/sync/arc.rs:646 [inline] ::insert_or_update_handle+0x3ed/0x1e70 drivers/android/binder/process.rs:845 ::transfer_binder_object+0x1d1/0x6b0 drivers/android/binder/allocation.rs:398 ::translate_object drivers/android/binder/thread.rs:793 [inline] ::copy_transaction_data+0x3691/0x8520 drivers/android/binder/thread.rs:1182 ::new+0x3a2/0x2150 drivers/android/binder/transaction.rs:81 ::transaction_inner drivers/android/binder/thread.rs:1346 [inline] <::transaction_inner as core::ops::function::FnOnce<(&kernel::sync::arc::Arc, &rust_binder_main::defs::BinderTransactionDataSg)>>::call_once usr/local/rustup/toolchains/1.91.1-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/core/src/ops/function.rs:250 [inline] ::transaction::<::transaction_inner>+0x8c4/0x1110 drivers/android/binder/thread.rs:1321 ::write+0x17dc/0xa690 drivers/android/binder/thread.rs:1460 ::write_read drivers/android/binder/thread.rs:1608 [inline] ::ioctl_write_read drivers/android/binder/process.rs:1609 [inline] ::ioctl drivers/android/binder/process.rs:1674 [inline] rust_binder_main::rust_binder_ioctl+0x1077/0x5da0 drivers/android/binder/rust_binder_main.rs:449 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:907 [inline] __se_sys_ioctl+0x135/0x1b0 fs/ioctl.c:893 __x64_sys_ioctl+0x7f/0xa0 fs/ioctl.c:893 x64_sys_call+0x1878/0x2ee0 arch/x86/include/generated/asm/syscalls_64.h:17 do_syscall_x64 arch/x86/entry/common.c:47 [inline] do_syscall_64+0x57/0xf0 arch/x86/entry/common.c:78 entry_SYSCALL_64_after_hwframe+0x76/0x7e RIP: 0033:0x7f5d0379c629 Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f5d046b9028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007f5d03a15fa0 RCX: 00007f5d0379c629 RDX: 00002000000001c0 RSI: 00000000c0306201 RDI: 0000000000000003 RBP: 00007f5d03832b39 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f5d03a16038 R14: 00007f5d03a15fa0 R15: 00007ffca9fe0ca8 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:check_region_inline mm/kasan/generic.c:171 [inline] RIP: 0010:kasan_check_range+0x13/0x2b0 mm/kasan/generic.c:189 Code: cc cc cc cc cc cc cc b8 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 66 0f 1f 00 b0 01 48 85 f6 0f 84 c0 01 00 00 55 48 89 e5 <41> 57 41 56 41 55 41 54 53 4c 8d 04 37 49 39 f8 0f 82 29 02 00 00 RSP: 0018:ffffc9000b918000 EFLAGS: 00010202 RAX: ffffea0004589601 RBX: 0000000000000000 RCX: ffffffff81d999a9 RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffffea0004589630 RBP: ffffc9000b918000 R08: ffff8881f6e72280 R09: 0000000000000002 R10: 0000000000000000 R11: 00000000fffffffc R12: ffffea0004589630 R13: dffffc0000000000 R14: ffffc9000b918080 R15: 1ffff9200172300c FS: 00007f5d046b96c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffc9000b917ff8 CR3: 0000000114b86000 CR4: 00000000003526b0 ---------------- Code disassembly (best guess): 0: cc int3 1: cc int3 2: cc int3 3: cc int3 4: cc int3 5: cc int3 6: cc int3 7: b8 00 00 00 00 mov $0x0,%eax c: 90 nop d: 90 nop e: 90 nop f: 90 nop 10: 90 nop 11: 90 nop 12: 90 nop 13: 90 nop 14: 90 nop 15: 90 nop 16: 90 nop 17: 66 0f 1f 00 nopw (%rax) 1b: b0 01 mov $0x1,%al 1d: 48 85 f6 test %rsi,%rsi 20: 0f 84 c0 01 00 00 je 0x1e6 26: 55 push %rbp 27: 48 89 e5 mov %rsp,%rbp * 2a: 41 57 push %r15 <-- trapping instruction 2c: 41 56 push %r14 2e: 41 55 push %r13 30: 41 54 push %r12 32: 53 push %rbx 33: 4c 8d 04 37 lea (%rdi,%rsi,1),%r8 37: 49 39 f8 cmp %rdi,%r8 3a: 0f 82 29 02 00 00 jb 0x269