==================================================================
BUG: KASAN: use-after-free in strcmp+0x6f/0xc0
Read of size 1 at addr ffff888041a28002 by task syz.6.341/8761

CPU: 0 UID: 0 PID: 8761 Comm: syz.6.341 Not tainted syzkaller #0 PREEMPT(full) 
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
Call Trace:
 <TASK>
 dump_stack_lvl+0x189/0x250
 print_report+0xca/0x240
 kasan_report+0x118/0x150
 strcmp+0x6f/0xc0
 hpfs_get_ea+0x114/0xdb0
 hpfs_read_inode+0x19d/0x1010
 hpfs_fill_super+0x129d/0x2040
 get_tree_bdev_flags+0x40e/0x4d0
 vfs_get_tree+0x92/0x2b0
 do_new_mount+0x2a2/0x9e0
 __se_sys_mount+0x317/0x410
 do_syscall_64+0xfa/0x3b0
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f9f8e99034a
Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 1a 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f9f8f810e68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
RAX: ffffffffffffffda RBX: 00007f9f8f810ef0 RCX: 00007f9f8e99034a
RDX: 000020000000a000 RSI: 0000200000009ec0 RDI: 00007f9f8f810eb0
RBP: 000020000000a000 R08: 00007f9f8f810ef0 R09: 0000000003a00041
R10: 0000000003a00041 R11: 0000000000000246 R12: 0000200000009ec0
R13: 00007f9f8f810eb0 R14: 0000000000009e22 R15: 0000200000000180
 </TASK>

The buggy address belongs to the physical page:
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xb5a pfn:0x41a28
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000000000 ffffea000107b9c8 ffffea0001068a48 0000000000000000
raw: 0000000000000b5a 0000000000000000 00000000ffffffff 0000000000000000
page dumped because: kasan: bad access detected
page_owner tracks the page as freed
page last allocated via order 0, migratetype Movable, gfp_mask 0x140cca(GFP_HIGHUSER_MOVABLE|__GFP_COMP), pid 8697, tgid 8696 (syz.6.334), ts 193182978278, free_ts 193411235069
 post_alloc_hook+0x240/0x2a0
 get_page_from_freelist+0x21e4/0x22c0
 __alloc_frozen_pages_noprof+0x181/0x370
 alloc_pages_mpol+0x232/0x4a0
 folio_alloc_mpol_noprof+0x39/0x70
 shmem_alloc_and_add_folio+0x447/0xf60
 shmem_get_folio_gfp+0x59d/0x1660
 shmem_write_begin+0xf7/0x2b0
 generic_perform_write+0x2c5/0x900
 shmem_file_write_iter+0xf8/0x120
 vfs_write+0x5c9/0xb30
 ksys_write+0x145/0x250
 do_syscall_64+0xfa/0x3b0
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
page last free pid 8697 tgid 8696 stack trace:
 free_unref_folios+0xdbd/0x1520
 folios_put_refs+0x559/0x640
 shmem_undo_range+0x49e/0x14b0
 shmem_evict_inode+0x272/0xa70
 evict+0x504/0x9c0
 __dentry_kill+0x209/0x660
 dput+0x19f/0x2b0
 __fput+0x68e/0xa70
 fput_close_sync+0x119/0x200
 __x64_sys_close+0x7f/0x110
 do_syscall_64+0xfa/0x3b0
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Memory state around the buggy address:
 ffff888041a27f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 ffff888041a27f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
>ffff888041a28000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                   ^
 ffff888041a28080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
 ffff888041a28100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
==================================================================
