================================================================== BUG: KASAN: stack-out-of-bounds in iov_iter_advance+0x4b3/0x4f0 lib/iov_iter.c:491 Read of size 8 at addr ffff8800b6a77d50 by task syz-executor329/2069 CPU: 1 PID: 2069 Comm: syz-executor329 Not tainted 4.4.158+ #105 0000000000000000 e66ae0773ea2a43f ffff8800b6a77990 ffffffff81a991dd ffffea0002da9dc0 ffff8800b6a77d50 0000000000000000 ffff8800b6a77d50 ffff8800b6a77d48 ffff8800b6a779c8 ffffffff8148a7c9 ffff8800b6a77d50 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x124 lib/dump_stack.c:51 [] print_address_description+0x6c/0x217 mm/kasan/report.c:252 [] kasan_report_error mm/kasan/report.c:351 [inline] [] kasan_report.cold.6+0x175/0x2f7 mm/kasan/report.c:408 [] __asan_report_load8_noabort+0x14/0x20 mm/kasan/report.c:429 [] iov_iter_advance+0x4b3/0x4f0 lib/iov_iter.c:491 [] tun_put_user drivers/net/tun.c:1369 [inline] [] tun_do_read+0x659/0xc10 drivers/net/tun.c:1421 [] tun_chr_read_iter+0xe2/0x1d0 drivers/net/tun.c:1439 [] new_sync_read fs/read_write.c:422 [inline] [] __vfs_read+0x301/0x3d0 fs/read_write.c:434 [] vfs_read+0x130/0x360 fs/read_write.c:454 [] SYSC_pread64 fs/read_write.c:607 [inline] [] SyS_pread64+0x145/0x170 fs/read_write.c:594 [] entry_SYSCALL_64_fastpath+0x1e/0x9a The buggy address belongs to the page: page:ffffea0002da9dc0 count:0 mapcount:0 mapping: (null) index:0x0 flags: 0x0() page dumped because: kasan: bad access detected Memory state around the buggy address: ffff8800b6a77c00: 04 f2 f2 f2 f2 f2 f2 f2 00 02 f2 f2 00 00 00 00 ffff8800b6a77c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffff8800b6a77d00: 00 00 00 f1 f1 f1 f1 00 00 f2 f2 f2 f2 f2 f2 00 ^ ffff8800b6a77d80: 00 00 00 00 f2 f2 f2 f2 f2 f2 f2 00 00 00 00 00 ffff8800b6a77e00: f2 f2 f2 00 00 00 00 00 00 00 00 00 00 00 00 00 ==================================================================