================================================================== BUG: KASAN: stack-out-of-bounds in iov_iter_revert lib/iov_iter.c:1141 [inline] BUG: KASAN: stack-out-of-bounds in iov_iter_revert+0x827/0x8f0 lib/iov_iter.c:1086 Read of size 8 at addr ffff888021f5f7e0 by task syz-executor.2/4020 CPU: 0 PID: 4020 Comm: syz-executor.2 Not tainted 5.10.49 #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x107/0x163 lib/dump_stack.c:118 print_address_description.constprop.0+0x1c/0x210 mm/kasan/report.c:385 __kasan_report mm/kasan/report.c:545 [inline] kasan_report.cold+0x37/0x7c mm/kasan/report.c:562 iov_iter_revert lib/iov_iter.c:1141 [inline] iov_iter_revert+0x827/0x8f0 lib/iov_iter.c:1086 io_write+0x651/0xdf0 fs/io_uring.c:3613 io_issue_sqe+0x1b40/0x3bd0 fs/io_uring.c:6021 __io_queue_sqe+0x132/0xd00 fs/io_uring.c:6344 io_queue_sqe+0x5bc/0x1020 fs/io_uring.c:6410 io_submit_sqe fs/io_uring.c:6479 [inline] io_submit_sqes+0x130d/0x2300 fs/io_uring.c:6707 __do_sys_io_uring_enter+0x1092/0x1910 fs/io_uring.c:9100 do_syscall_64+0x33/0x40 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x466609 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fd486e8f188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 RDX: 0000000000000000 RSI: 00000000000058ab RDI: 0000000000000003 RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 R13: 00007ffedf784ddf R14: 00007fd486e8f300 R15: 0000000000022000 The buggy address belongs to the page: page:00000000d36b0b30 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x21f5f flags: 0x100000000000000() raw: 0100000000000000 0000000000000000 ffffea000087d7c8 0000000000000000 raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 page dumped because: kasan: bad access detected addr ffff888021f5f7e0 is located in stack of task syz-executor.2/4020 at offset 152 in frame: io_write+0x0/0xdf0 fs/io_uring.c:3480 this frame has 3 objects: [48, 56) 'iovec' [80, 120) '__iter' [160, 288) 'inline_vecs' Memory state around the buggy address: ffff888021f5f680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff888021f5f700: 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 00 >ffff888021f5f780: f2 f2 f2 00 00 00 00 00 f2 f2 f2 f2 f2 00 00 00 ^ ffff888021f5f800: 00 00 00 00 00 00 00 00 00 00 00 00 00 f3 f3 f3 ffff888021f5f880: f3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ==================================================================