================================================================== BUG: KASAN: stack-out-of-bounds in user_mode arch/x86/include/asm/ptrace.h:131 [inline] BUG: KASAN: stack-out-of-bounds in trace_page_fault_entries arch/x86/mm/fault.c:1516 [inline] BUG: KASAN: stack-out-of-bounds in do_page_fault+0x66/0x330 arch/x86/mm/fault.c:1528 Read of size 8 at addr ffff8881f5d8fda0 by task kworker/u4:0/7 CPU: 0 PID: 7 Comm: kworker/u4:0 Not tainted 5.4.290-syzkaller-00017-g6b07fcd94a6a #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Workqueue: events_unbound toggle_allocation_gate Call Trace: The buggy address belongs to the page: page:ffffea0007d763c0 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 flags: 0x8000000000000000() raw: 8000000000000000 ffffea0007d763c8 ffffea0007d763c8 0000000000000000 raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 page dumped because: kasan: bad access detected page_owner tracks the page as allocated page last allocated via order 0, migratetype Unmovable, gfp_mask 0x0() create_dummy_stack mm/page_owner.c:61 [inline] register_early_stack+0x86/0xe0 mm/page_owner.c:77 init_page_owner+0x2f/0x730 mm/page_owner.c:87 kernel_init_freeable+0x2b4/0x466 init/main.c:1456 kernel_init+0xd/0x380 init/main.c:1375 page_owner free stack trace missing Memory state around the buggy address: ffff8881f5d8fc80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff8881f5d8fd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffff8881f5d8fd80: 00 00 00 00 f1 f1 f1 f1 00 f3 f3 f3 00 00 00 00 ^ ffff8881f5d8fe00: f1 f1 f1 f1 00 f2 f2 f2 04 f3 f3 f3 00 00 00 00 ffff8881f5d8fe80: 00 00 00 00 f1 f1 f1 f1 00 f2 f2 f2 00 f3 f3 f3 ==================================================================