hpfs: hpfs_map_sector(): read error hpfs: code page support is disabled ================================================================== BUG: KASAN: use-after-free in strcmp+0x6b/0xc0 lib/string.c:283 Read of size 1 at addr ffff88805be618a6 by task syz.1.625/9641 CPU: 1 UID: 0 PID: 9641 Comm: syz.1.625 Not tainted syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 Call Trace: dump_stack_lvl+0xe8/0x150 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:378 [inline] print_report+0xba/0x230 mm/kasan/report.c:482 kasan_report+0x117/0x150 mm/kasan/report.c:595 strcmp+0x6b/0xc0 lib/string.c:283 hpfs_get_ea+0x134/0xee0 fs/hpfs/ea.c:139 hpfs_read_inode+0x1a6/0x1050 fs/hpfs/inode.c:63 hpfs_fill_super+0x123d/0x1fa0 fs/hpfs/super.c:651 get_tree_bdev_flags+0x431/0x4f0 fs/super.c:1694 vfs_get_tree+0x92/0x2a0 fs/super.c:1754 fc_mount fs/namespace.c:1193 [inline] do_new_mount_fc fs/namespace.c:3762 [inline] do_new_mount+0x341/0xd30 fs/namespace.c:3838 do_mount fs/namespace.c:4161 [inline] __do_sys_mount fs/namespace.c:4350 [inline] __se_sys_mount+0x31d/0x420 fs/namespace.c:4327 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x14d/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f025579d20a Code: 48 c7 c2 e8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f0256719e58 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007f0256719ee0 RCX: 00007f025579d20a RDX: 000020000000a000 RSI: 0000200000009ec0 RDI: 00007f0256719ea0 RBP: 000020000000a000 R08: 00007f0256719ee0 R09: 0000000001200041 R10: 0000000001200041 R11: 0000000000000246 R12: 0000200000009ec0 R13: 00007f0256719ea0 R14: 0000000000009e15 R15: 0000200000000080 The buggy address belongs to the physical page: page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x5be61 flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff) raw: 00fff00000000000 ffffea00016f9888 ffffea00016f9808 0000000000000000 raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 page dumped because: kasan: bad access detected page_owner tracks the page as freed page last allocated via order 9, migratetype Unmovable, gfp_mask 0x46dc0(GFP_KERNEL|__GFP_ZERO|__GFP_NOWARN|__GFP_RETRY_MAYFAIL|__GFP_COMP), pid 6284, tgid 6283 (syz.2.82), ts 117952906309, free_ts 117983601934 set_page_owner include/linux/page_owner.h:32 [inline] post_alloc_hook+0x231/0x280 mm/page_alloc.c:1889 prep_new_page mm/page_alloc.c:1897 [inline] get_page_from_freelist+0x24dc/0x2580 mm/page_alloc.c:3962 __alloc_frozen_pages_noprof+0x18d/0x380 mm/page_alloc.c:5250 alloc_pages_mpol+0x232/0x4a0 mm/mempolicy.c:2485 ___kmalloc_large_node+0x4e/0x150 mm/slub.c:5160 __kmalloc_large_node_noprof+0x18/0x90 mm/slub.c:5191 __do_kmalloc_node mm/slub.c:5207 [inline] __kvmalloc_node_noprof+0x7b/0x8a0 mm/slub.c:6711 xlog_write_log_records+0xe0/0x3c0 fs/xfs/xfs_log_recover.c:1530 xlog_clear_stale_blocks+0x1d9/0x3c0 fs/xfs/xfs_log_recover.c:1677 xlog_find_tail+0x655/0x840 fs/xfs/xfs_log_recover.c:1361 xlog_recover+0x4b/0x3e0 fs/xfs/xfs_log_recover.c:3427 xfs_log_mount+0x253/0x3e0 fs/xfs/xfs_log.c:617 xfs_mountfs+0xe70/0x22e0 fs/xfs/xfs_mount.c:1033 xfs_fs_fill_super+0x11b5/0x1600 fs/xfs/xfs_super.c:1938 get_tree_bdev_flags+0x431/0x4f0 fs/super.c:1694 vfs_get_tree+0x92/0x2a0 fs/super.c:1754 page last free pid 6284 tgid 6283 stack trace: reset_page_owner include/linux/page_owner.h:25 [inline] __free_pages_prepare mm/page_alloc.c:1433 [inline] __free_frozen_pages+0xc2b/0xdb0 mm/page_alloc.c:2978 xlog_write_log_records+0x34b/0x3c0 fs/xfs/xfs_log_recover.c:1582 xlog_clear_stale_blocks+0x1d9/0x3c0 fs/xfs/xfs_log_recover.c:1677 xlog_find_tail+0x655/0x840 fs/xfs/xfs_log_recover.c:1361 xlog_recover+0x4b/0x3e0 fs/xfs/xfs_log_recover.c:3427 xfs_log_mount+0x253/0x3e0 fs/xfs/xfs_log.c:617 xfs_mountfs+0xe70/0x22e0 fs/xfs/xfs_mount.c:1033 xfs_fs_fill_super+0x11b5/0x1600 fs/xfs/xfs_super.c:1938 get_tree_bdev_flags+0x431/0x4f0 fs/super.c:1694 vfs_get_tree+0x92/0x2a0 fs/super.c:1754 fc_mount fs/namespace.c:1193 [inline] do_new_mount_fc fs/namespace.c:3762 [inline] do_new_mount+0x341/0xd30 fs/namespace.c:3838 do_mount fs/namespace.c:4161 [inline] __do_sys_mount fs/namespace.c:4350 [inline] __se_sys_mount+0x31d/0x420 fs/namespace.c:4327 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x14d/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f Memory state around the buggy address: ffff88805be61780: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff88805be61800: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff >ffff88805be61880: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ^ ffff88805be61900: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff88805be61980: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ==================================================================