hpfs: hpfs_map_sector(): read error hpfs: code page support is disabled hpfs: hpfs_map_sector(): read error ================================================================== BUG: KASAN: use-after-free in strcmp+0xc0/0xf4 lib/string.c:361 Read of size 1 at addr ffff0000f74eb8a6 by task syz.2.3/4447 CPU: 1 PID: 4447 Comm: syz.2.3 Not tainted syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/03/2025 Call trace: dump_backtrace+0x1c8/0x1f4 arch/arm64/kernel/stacktrace.c:158 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:165 __dump_stack+0x30/0x40 lib/dump_stack.c:88 dump_stack_lvl+0xf8/0x160 lib/dump_stack.c:106 print_address_description+0x88/0x218 mm/kasan/report.c:316 print_report+0x50/0x68 mm/kasan/report.c:420 kasan_report+0xa8/0x100 mm/kasan/report.c:524 __asan_report_load1_noabort+0x2c/0x38 mm/kasan/report_generic.c:348 strcmp+0xc0/0xf4 lib/string.c:361 hpfs_get_ea+0xfc/0x968 fs/hpfs/ea.c:139 hpfs_read_inode+0x3d8/0xcac fs/hpfs/inode.c:70 hpfs_fill_super+0xe64/0x1800 fs/hpfs/super.c:712 mount_bdev+0x264/0x358 fs/super.c:1443 hpfs_mount+0x44/0x58 fs/hpfs/super.c:758 legacy_get_tree+0xd4/0x16c fs/fs_context.c:632 vfs_get_tree+0x90/0x274 fs/super.c:1573 do_new_mount+0x228/0x810 fs/namespace.c:3078 path_mount+0x5b4/0xe78 fs/namespace.c:3408 do_mount fs/namespace.c:3421 [inline] __do_sys_mount fs/namespace.c:3629 [inline] __se_sys_mount fs/namespace.c:3606 [inline] __arm64_sys_mount+0x49c/0x584 fs/namespace.c:3606 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2bc arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:140 do_el0_svc+0x58/0x13c arch/arm64/kernel/syscall.c:204 el0_svc+0x58/0x138 arch/arm64/kernel/entry-common.c:637 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655 el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:585 The buggy address belongs to the physical page: page:00000000d82aecdd refcount:1 mapcount:1 mapping:0000000000000000 index:0xffffabffb pfn:0x1374eb memcg:ffff0000cd0e0000 anon flags: 0x5ffe000000a0014(uptodate|lru|mappedtodisk|swapbacked|node=0|zone=2|lastcpupid=0x7ff) raw: 05ffe000000a0014 fffffc0003dd3048 fffffc0003dd3a08 ffff0000f2d24771 raw: 0000000ffffabffb 0000000000000000 0000000100000000 ffff0000cd0e0000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff0000f74eb780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff0000f74eb800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffff0000f74eb880: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ^ ffff0000f74eb900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff0000f74eb980: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ================================================================== hpfs: hpfs_map_sector(): read error hpfs: hpfs_map_sector(): read error hpfs: hpfs_map_sector(): read error hpfs: hpfs_map_4sectors(): unaligned read hpfs: hpfs_map_4sectors(): unaligned read hpfs: filesystem error: unable to find root dir mmap: syz.2.3 (4447) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst.