audit: type=1800 audit(1656768669.103:8): pid=10319 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="bus" dev="sda1" ino=14056 res=0 ================================================================== BUG: KASAN: stack-out-of-bounds in iov_iter_revert lib/iov_iter.c:919 [inline] BUG: KASAN: stack-out-of-bounds in iov_iter_revert+0x800/0x900 lib/iov_iter.c:868 Read of size 8 at addr ffff88808ed67d38 by task syz-executor.1/10295 audit: type=1804 audit(1656768669.133:9): pid=10319 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir2633670145/syzkaller.kCw3ru/51/bus" dev="sda1" ino=14056 res=1 CPU: 1 PID: 10295 Comm: syz-executor.1 Not tainted 4.14.285-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 print_address_description.cold+0x54/0x1d3 mm/kasan/report.c:252 kasan_report_error.cold+0x8a/0x191 mm/kasan/report.c:351 kasan_report mm/kasan/report.c:409 [inline] __asan_report_load8_noabort+0x68/0x70 mm/kasan/report.c:430 iov_iter_revert lib/iov_iter.c:919 [inline] iov_iter_revert+0x800/0x900 lib/iov_iter.c:868 generic_file_read_iter+0x1183/0x21c0 mm/filemap.c:2257 fuse_file_read_iter+0x1bd/0x270 fs/fuse/file.c:949 call_read_iter include/linux/fs.h:1774 [inline] new_sync_read fs/read_write.c:401 [inline] __vfs_read+0x449/0x620 fs/read_write.c:413 vfs_read+0x139/0x340 fs/read_write.c:447 SYSC_read fs/read_write.c:574 [inline] SyS_read+0xf2/0x210 fs/read_write.c:567 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x7f235a303109 RSP: 002b:00007f2358c57168 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 RAX: ffffffffffffffda RBX: 00007f235a416030 RCX: 00007f235a303109 RDX: 000000007ffff000 RSI: 0000000020008380 RDI: 0000000000000005 RBP: 00007f235a35d05d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffde3e959df R14: 00007f2358c57300 R15: 0000000000022000 The buggy address belongs to the page: page:ffffea00023b59c0 count:0 mapcount:0 mapping: (null) index:0x0 flags: 0xfff00000000000() raw: 00fff00000000000 0000000000000000 0000000000000000 00000000ffffffff raw: 0000000000000000 ffffea00023b59e0 0000000000000000 0000000000000000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff88808ed67c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff88808ed67c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffff88808ed67d00: 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 00 00 00 00 ^ ffff88808ed67d80: 00 f2 f2 f2 f2 f2 00 00 00 00 00 f3 f3 f3 f3 f3 ffff88808ed67e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ==================================================================