BUG: TASK stack guard page was hit at ffffc90005d67ff8 (stack is ffffc90005d68000..ffffc90005d70000) Oops: stack guard page: 0000 [#1] PREEMPT SMP KASAN PTI CPU: 0 UID: 0 PID: 4650 Comm: syz.4.1648 Not tainted syzkaller #0 b63f8bde1ed88225065c0993fd28f42162285c42 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 RIP: 0010:check_region_inline mm/kasan/generic.c:171 [inline] RIP: 0010:kasan_check_range+0x13/0x2b0 mm/kasan/generic.c:189 Code: c0 03 cc cc cc cc cc b8 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 66 0f 1f 00 b0 01 48 85 f6 0f 84 c0 01 00 00 55 48 89 e5 <41> 57 41 56 41 55 41 54 53 4c 8d 04 37 49 39 f8 0f 82 29 02 00 00 RSP: 0018:ffffc90005d68000 EFLAGS: 00010202 RAX: 1ffffffff0fc6a01 RBX: ffffffff87e35ad0 RCX: ffffffff81d88d14 RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffffffff87e35ad0 RBP: ffffc90005d68000 R08: 0000000000000101 R09: 00000000000bde61 R10: 0000000000000002 R11: fffffbfff0fc6b51 R12: 000000000000260b R13: 0000000000000002 R14: 0000000000000003 R15: ffffffff87e35480 FS: 00007f466cb766c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffc90005d67ff8 CR3: 00000001219f2000 CR4: 00000000003526b0 Call Trace: __kasan_check_read+0x15/0x20 mm/kasan/shadow.c:31 instrument_atomic_read include/linux/instrumented.h:68 [inline] atomic_long_read include/linux/atomic/atomic-instrumented.h:3188 [inline] zone_page_state include/linux/vmstat.h:214 [inline] __zone_watermark_unusable_free mm/page_alloc.c:3508 [inline] __zone_watermark_ok+0x134/0x630 mm/page_alloc.c:3535 zone_watermark_fast+0x1f7/0x3d0 mm/page_alloc.c:3650 get_page_from_freelist+0x429/0x4a20 mm/page_alloc.c:3857 __alloc_pages_noprof+0x35f/0x7e0 mm/page_alloc.c:5264 __alloc_pages_node_noprof include/linux/gfp.h:269 [inline] alloc_pages_node_noprof include/linux/gfp.h:296 [inline] alloc_pages_noprof include/linux/gfp.h:313 [inline] stack_depot_save_flags+0x672/0x800 lib/stackdepot.c:627 stack_depot_save+0x12/0x20 lib/stackdepot.c:686 save_stack+0x133/0x240 mm/page_owner.c:175 __set_page_owner+0x8e/0x600 mm/page_owner.c:338 set_page_owner include/linux/page_owner.h:35 [inline] post_alloc_hook+0x3b8/0x3f0 mm/page_alloc.c:1826 prep_new_page+0x1c/0x110 mm/page_alloc.c:1834 get_page_from_freelist+0x496e/0x4a20 mm/page_alloc.c:3914 __alloc_pages_noprof+0x35f/0x7e0 mm/page_alloc.c:5264 __alloc_pages_node_noprof include/linux/gfp.h:269 [inline] alloc_pages_node_noprof include/linux/gfp.h:296 [inline] alloc_pages_noprof include/linux/gfp.h:313 [inline] stack_depot_save_flags+0x672/0x800 lib/stackdepot.c:627 kasan_save_stack mm/kasan/common.c:49 [inline] kasan_save_track+0x4f/0x80 mm/kasan/common.c:69 kasan_save_free_info+0x4a/0x60 mm/kasan/generic.c:579 poison_slab_object mm/kasan/common.c:248 [inline] __kasan_slab_free+0x5f/0x80 mm/kasan/common.c:265 kasan_slab_free include/linux/kasan.h:233 [inline] slab_free_hook mm/slub.c:2445 [inline] slab_free mm/slub.c:4714 [inline] kfree+0x158/0x440 mm/slub.c:4871 krealloc_noprof+0xfa/0x130 mm/slab_common.c:-1 ::call rust/kernel/alloc/allocator.rs:102 [inline] ::realloc rust/kernel/alloc/allocator.rs:141 [inline] ::free+0xc6/0x200 rust/kernel/alloc.rs:214 , kernel::alloc::allocator::Kmalloc> as core::ops::drop::Drop>::drop rust/kernel/alloc/kvec.rs:835 [inline] core::ptr::drop_in_place::, kernel::alloc::allocator::Kmalloc>>+0x2bc/0x430 usr/local/rustup/toolchains/1.91.1-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/core/src/ptr/mod.rs:804 core::ptr::drop_in_place::> usr/local/rustup/toolchains/1.91.1-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/core/src/ptr/mod.rs:804 [inline] core::ptr::drop_in_place::>> usr/local/rustup/toolchains/1.91.1-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/core/src/ptr/mod.rs:804 [inline] >::reserve_new+0x1559/0x3740 drivers/android/binder/range_alloc/mod.rs:224 >::reserve_new+0x116e/0x3740 drivers/android/binder/range_alloc/mod.rs:188 ::buffer_alloc drivers/android/binder/process.rs:1034 [inline] ::copy_transaction_data+0x1569/0x5500 drivers/android/binder/thread.rs:1099 ::new+0x3b2/0x2120 drivers/android/binder/transaction.rs:81 ::transaction_inner drivers/android/binder/thread.rs:1328 [inline] <::transaction_inner as core::ops::function::FnOnce<(&kernel::sync::arc::Arc, &rust_binder_main::defs::BinderTransactionDataSg)>>::call_once usr/local/rustup/toolchains/1.91.1-x86_64-unknown-linux-gnu/lib/rustlib/src/rust/library/core/src/ops/function.rs:250 [inline] ::transaction::<::transaction_inner>+0x8c4/0x1110 drivers/android/binder/thread.rs:1303 ::write+0x17dc/0xa690 drivers/android/binder/thread.rs:1442 ::write_read drivers/android/binder/thread.rs:1590 [inline] ::ioctl_write_read drivers/android/binder/process.rs:1609 [inline] ::ioctl drivers/android/binder/process.rs:1674 [inline] rust_binder_main::rust_binder_ioctl+0x1077/0x5da0 drivers/android/binder/rust_binder_main.rs:447 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:907 [inline] __se_sys_ioctl+0x132/0x1b0 fs/ioctl.c:893 __x64_sys_ioctl+0x7f/0xa0 fs/ioctl.c:893 x64_sys_call+0x1878/0x2ee0 arch/x86/include/generated/asm/syscalls_64.h:17 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0x57/0xf0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x76/0x7e RIP: 0033:0x7f466bd9acb9 Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f466cb76028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007f466c015fa0 RCX: 00007f466bd9acb9 RDX: 0000200000000100 RSI: 00000000c0306201 RDI: 0000000000000004 RBP: 00007f466be08bf7 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f466c016038 R14: 00007f466c015fa0 R15: 00007ffd74203cc8 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:check_region_inline mm/kasan/generic.c:171 [inline] RIP: 0010:kasan_check_range+0x13/0x2b0 mm/kasan/generic.c:189 Code: c0 03 cc cc cc cc cc b8 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 66 0f 1f 00 b0 01 48 85 f6 0f 84 c0 01 00 00 55 48 89 e5 <41> 57 41 56 41 55 41 54 53 4c 8d 04 37 49 39 f8 0f 82 29 02 00 00 RSP: 0018:ffffc90005d68000 EFLAGS: 00010202 RAX: 1ffffffff0fc6a01 RBX: ffffffff87e35ad0 RCX: ffffffff81d88d14 RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffffffff87e35ad0 RBP: ffffc90005d68000 R08: 0000000000000101 R09: 00000000000bde61 R10: 0000000000000002 R11: fffffbfff0fc6b51 R12: 000000000000260b R13: 0000000000000002 R14: 0000000000000003 R15: ffffffff87e35480 FS: 00007f466cb766c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffc90005d67ff8 CR3: 00000001219f2000 CR4: 00000000003526b0 ---------------- Code disassembly (best guess): 0: c0 03 cc rolb $0xcc,(%rbx) 3: cc int3 4: cc int3 5: cc int3 6: cc int3 7: b8 00 00 00 00 mov $0x0,%eax c: 90 nop d: 90 nop e: 90 nop f: 90 nop 10: 90 nop 11: 90 nop 12: 90 nop 13: 90 nop 14: 90 nop 15: 90 nop 16: 90 nop 17: 66 0f 1f 00 nopw (%rax) 1b: b0 01 mov $0x1,%al 1d: 48 85 f6 test %rsi,%rsi 20: 0f 84 c0 01 00 00 je 0x1e6 26: 55 push %rbp 27: 48 89 e5 mov %rsp,%rbp * 2a: 41 57 push %r15 <-- trapping instruction 2c: 41 56 push %r14 2e: 41 55 push %r13 30: 41 54 push %r12 32: 53 push %rbx 33: 4c 8d 04 37 lea (%rdi,%rsi,1),%r8 37: 49 39 f8 cmp %rdi,%r8 3a: 0f 82 29 02 00 00 jb 0x269