REISERFS (device loop0): journal params: device loop0, size 512, journal first block 18, max trans len 256, max batch 225, max commit age 30, max trans age 30 REISERFS (device loop0): checking transaction log (loop0) REISERFS (device loop0): Using tea hash to sort names ================================================================== BUG: KASAN: use-after-free in bin_search_in_dir_item fs/reiserfs/namei.c:40 [inline] BUG: KASAN: use-after-free in search_by_entry_key+0x458/0xe34 fs/reiserfs/namei.c:165 Read of size 4 at addr ffff0001742c2024 by task syz-executor585/4294 CPU: 0 PID: 4294 Comm: syz-executor585 Not tainted 6.1.135-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Call trace: dump_backtrace+0x1c8/0x1f4 arch/arm64/kernel/stacktrace.c:158 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:165 __dump_stack+0x30/0x40 lib/dump_stack.c:88 dump_stack_lvl+0xf8/0x160 lib/dump_stack.c:106 print_address_description+0x88/0x220 mm/kasan/report.c:316 print_report+0x50/0x68 mm/kasan/report.c:427 kasan_report+0xa8/0x100 mm/kasan/report.c:531 __asan_report_load_n_noabort+0x28/0x34 mm/kasan/report_generic.c:361 bin_search_in_dir_item fs/reiserfs/namei.c:40 [inline] search_by_entry_key+0x458/0xe34 fs/reiserfs/namei.c:165 reiserfs_find_entry+0x260/0x13b8 fs/reiserfs/namei.c:322 reiserfs_lookup+0x15c/0x378 fs/reiserfs/namei.c:368 __lookup_slow+0x24c/0x370 fs/namei.c:1690 lookup_one_len+0x178/0x28c fs/namei.c:2740 reiserfs_lookup_privroot+0x8c/0x204 fs/reiserfs/xattr.c:973 reiserfs_fill_super+0x18ec/0x1d40 fs/reiserfs/super.c:2174 mount_bdev+0x264/0x358 fs/super.c:1443 get_super_block+0x44/0x58 fs/reiserfs/super.c:2601 legacy_get_tree+0xd4/0x16c fs/fs_context.c:632 vfs_get_tree+0x90/0x274 fs/super.c:1573 do_new_mount+0x228/0x810 fs/namespace.c:3057 path_mount+0x5b4/0xe78 fs/namespace.c:3387 do_mount fs/namespace.c:3400 [inline] __do_sys_mount fs/namespace.c:3608 [inline] __se_sys_mount fs/namespace.c:3585 [inline] __arm64_sys_mount+0x49c/0x584 fs/namespace.c:3585 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2bc arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:140 do_el0_svc+0x58/0x13c arch/arm64/kernel/syscall.c:204 el0_svc+0x58/0x138 arch/arm64/kernel/entry-common.c:637 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655 el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:585 The buggy address belongs to the physical page: page:000000003de3eee6 refcount:0 mapcount:0 mapping:0000000000000000 index:0x1 pfn:0x1b42c2 flags: 0x5ffc00000000000(node=0|zone=2|lastcpupid=0x7ff) raw: 05ffc00000000000 fffffc0005d0b0c8 ffff0001b3e30e20 0000000000000000 raw: 0000000000000001 0000000000000000 00000000ffffffff 0000000000000000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff0001742c1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff0001742c1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffff0001742c2000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ^ ffff0001742c2080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff0001742c2100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ================================================================== REISERFS (device loop0): Created .reiserfs_priv - reserved for xattr storage.