================================================================== BUG: KASAN: stack-out-of-bounds in user_mode arch/x86/include/asm/ptrace.h:131 [inline] BUG: KASAN: stack-out-of-bounds in trace_page_fault_entries arch/x86/mm/fault.c:1541 [inline] BUG: KASAN: stack-out-of-bounds in do_page_fault+0x66/0x330 arch/x86/mm/fault.c:1553 Read of size 8 at addr ffff8881f5d97da0 by task kworker/u4:0/7 CPU: 1 PID: 7 Comm: kworker/u4:0 Tainted: G W 5.4.268-syzkaller-00012-g51cf29fc2bfc #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 Workqueue: events_unbound toggle_allocation_gate Call Trace: The buggy address belongs to the page: page:ffffea0007d765c0 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 flags: 0x8000000000000000() raw: 8000000000000000 ffffea0007d765c8 ffffea0007d765c8 0000000000000000 raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 page dumped because: kasan: bad access detected page_owner tracks the page as allocated page last allocated via order 0, migratetype Unmovable, gfp_mask 0x0() create_dummy_stack mm/page_owner.c:61 [inline] register_early_stack+0x86/0xe0 mm/page_owner.c:77 init_page_owner+0x2f/0x730 mm/page_owner.c:87 kernel_init_freeable+0x2b4/0x466 init/main.c:1456 kernel_init+0xd/0x380 init/main.c:1375 page_owner free stack trace missing Memory state around the buggy address: ffff8881f5d97c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff8881f5d97d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffff8881f5d97d80: 00 00 00 00 f1 f1 f1 f1 00 f3 f3 f3 00 00 00 00 ^ ffff8881f5d97e00: f1 f1 f1 f1 00 f2 f2 f2 04 f3 f3 f3 00 00 00 00 ffff8881f5d97e80: 00 00 00 00 f1 f1 f1 f1 00 f2 f2 f2 00 f3 f3 f3 ==================================================================