hpfs: filesystem error: warning: spare dnodes used, try chkdsk hpfs: Proceeding, but your filesystem could be corrupted if you delete files or directories hpfs: You really don't want any checks? You are crazy... hpfs: hpfs_map_sector(): read error hpfs: code page support is disabled ================================================================== BUG: KASAN: use-after-free in strcmp+0xa7/0xb0 lib/string.c:283 Read of size 1 at addr ffff88805367c000 by task syz.5.165/6773 CPU: 0 UID: 0 PID: 6773 Comm: syz.5.165 Not tainted syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x100/0x190 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:378 [inline] print_report+0x156/0x4c9 mm/kasan/report.c:482 kasan_report+0xdf/0x1e0 mm/kasan/report.c:595 strcmp+0xa7/0xb0 lib/string.c:283 hpfs_get_ea+0x1fa/0xc20 fs/hpfs/ea.c:139 hpfs_read_inode+0x706/0x11c0 fs/hpfs/inode.c:63 hpfs_fill_super+0x1202/0x1f20 fs/hpfs/super.c:651 get_tree_bdev_flags+0x38c/0x620 fs/super.c:1694 vfs_get_tree+0x92/0x320 fs/super.c:1754 fc_mount fs/namespace.c:1193 [inline] do_new_mount_fc fs/namespace.c:3763 [inline] do_new_mount fs/namespace.c:3839 [inline] path_mount+0x7d0/0x23d0 fs/namespace.c:4159 do_mount fs/namespace.c:4172 [inline] __do_sys_mount fs/namespace.c:4361 [inline] __se_sys_mount fs/namespace.c:4338 [inline] __x64_sys_mount+0x293/0x310 fs/namespace.c:4338 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x106/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fcdeaf9da0a Code: 48 c7 c2 e8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fcdebec7e58 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007fcdebec7ee0 RCX: 00007fcdeaf9da0a RDX: 000020000000a000 RSI: 0000200000009ec0 RDI: 00007fcdebec7ea0 RBP: 000020000000a000 R08: 00007fcdebec7ee0 R09: 0000000003a00041 R10: 0000000003a00041 R11: 0000000000000246 R12: 0000200000009ec0 R13: 00007fcdebec7ea0 R14: 0000000000009e22 R15: 0000200000000340 The buggy address belongs to the physical page: page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x20000008a pfn:0x5367c flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff) page_type: f0(buddy) raw: 00fff00000000000 ffffea0001d3b088 ffffea0001d3bfc8 0000000000000000 raw: 000000020000008a 0000000000000000 00000000f0000000 0000000000000000 page dumped because: kasan: bad access detected page_owner tracks the page as freed page last allocated via order 0, migratetype Movable, gfp_mask 0x140dca(GFP_HIGHUSER_MOVABLE|__GFP_ZERO|__GFP_COMP), pid 6725, tgid 6723 (syz.6.155), ts 164155504115, free_ts 166396649720 set_page_owner include/linux/page_owner.h:32 [inline] post_alloc_hook+0x153/0x170 mm/page_alloc.c:1889 prep_new_page mm/page_alloc.c:1897 [inline] get_page_from_freelist+0x111d/0x3140 mm/page_alloc.c:3962 __alloc_frozen_pages_noprof+0x27c/0x2ba0 mm/page_alloc.c:5250 alloc_pages_mpol+0x1fb/0x550 mm/mempolicy.c:2484 folio_alloc_mpol_noprof+0x36/0x340 mm/mempolicy.c:2503 vma_alloc_folio_noprof+0xed/0x1d0 mm/mempolicy.c:2538 folio_prealloc mm/memory.c:1204 [inline] wp_page_copy mm/memory.c:3780 [inline] do_wp_page+0xf28/0x4f00 mm/memory.c:4241 handle_pte_fault mm/memory.c:6333 [inline] __handle_mm_fault+0x1ac8/0x2b60 mm/memory.c:6455 handle_mm_fault+0x36d/0xa20 mm/memory.c:6624 do_user_addr_fault+0x74c/0x12f0 arch/x86/mm/fault.c:1385 handle_page_fault arch/x86/mm/fault.c:1474 [inline] exc_page_fault+0x6f/0xd0 arch/x86/mm/fault.c:1527 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:618 page last free pid 6725 tgid 6723 stack trace: reset_page_owner include/linux/page_owner.h:25 [inline] __free_pages_prepare mm/page_alloc.c:1433 [inline] free_unref_folios+0xaea/0x1790 mm/page_alloc.c:3040 folios_put_refs+0x53c/0x840 mm/swap.c:1002 free_pages_and_swap_cache+0x242/0x480 mm/swap_state.c:423 __tlb_batch_free_encoded_pages+0xe9/0x280 mm/mmu_gather.c:138 tlb_batch_pages_flush mm/mmu_gather.c:151 [inline] tlb_flush_mmu_free mm/mmu_gather.c:398 [inline] tlb_flush_mmu+0xe9/0x590 mm/mmu_gather.c:405 zap_pte_range mm/memory.c:1968 [inline] zap_pmd_range mm/memory.c:2021 [inline] zap_pud_range mm/memory.c:2049 [inline] zap_p4d_range mm/memory.c:2070 [inline] unmap_page_range+0x2333/0x4840 mm/memory.c:2091 unmap_single_vma+0x153/0x240 mm/memory.c:2133 unmap_vmas+0x295/0x590 mm/memory.c:2171 exit_mmap+0x1ef/0xa30 mm/mmap.c:1302 __mmput+0x12a/0x410 kernel/fork.c:1174 mmput+0x67/0x80 kernel/fork.c:1197 exit_mm kernel/exit.c:581 [inline] do_exit+0x819/0x2b60 kernel/exit.c:964 do_group_exit+0xd5/0x2a0 kernel/exit.c:1118 get_signal+0x1ec7/0x21e0 kernel/signal.c:3034 arch_do_signal_or_restart+0x91/0x7a0 arch/x86/kernel/signal.c:337 __exit_to_user_mode_loop kernel/entry/common.c:64 [inline] exit_to_user_mode_loop+0x86/0x4a0 kernel/entry/common.c:98 Memory state around the buggy address: ffff88805367bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff88805367bf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffff88805367c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ^ ffff88805367c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff88805367c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ================================================================== ================================================================== BUG: KASAN: use-after-free in strcmp+0xa7/0xb0 lib/string.c:283 Read of size 1 at addr ffff88805367c005 by task syz.5.165/6773 CPU: 1 UID: 0 PID: 6773 Comm: syz.5.165 Tainted: G B syzkaller #0 PREEMPT(full) Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x100/0x190 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:378 [inline] print_report+0x156/0x4c9 mm/kasan/report.c:482 kasan_report+0xdf/0x1e0 mm/kasan/report.c:595 strcmp+0xa7/0xb0 lib/string.c:283 hpfs_get_ea+0x1fa/0xc20 fs/hpfs/ea.c:139 hpfs_read_inode+0x706/0x11c0 fs/hpfs/inode.c:63 hpfs_fill_super+0x1202/0x1f20 fs/hpfs/super.c:651 get_tree_bdev_flags+0x38c/0x620 fs/super.c:1694 vfs_get_tree+0x92/0x320 fs/super.c:1754 fc_mount fs/namespace.c:1193 [inline] do_new_mount_fc fs/namespace.c:3763 [inline] do_new_mount fs/namespace.c:3839 [inline] path_mount+0x7d0/0x23d0 fs/namespace.c:4159 do_mount fs/namespace.c:4172 [inline] __do_sys_mount fs/namespace.c:4361 [inline] __se_sys_mount fs/namespace.c:4338 [inline] __x64_sys_mount+0x293/0x310 fs/namespace.c:4338 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x106/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fcdeaf9da0a Code: 48 c7 c2 e8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fcdebec7e58 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007fcdebec7ee0 RCX: 00007fcdeaf9da0a RDX: 000020000000a000 RSI: 0000200000009ec0 RDI: 00007fcdebec7ea0 RBP: 000020000000a000 R08: 00007fcdebec7ee0 R09: 0000000003a00041 R10: 0000000003a00041 R11: 0000000000000246 R12: 0000200000009ec0 R13: 00007fcdebec7ea0 R14: 0000000000009e22 R15: 0000200000000340 The buggy address belongs to the physical page: page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x20000008a pfn:0x5367c flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff) page_type: f0(buddy) raw: 00fff00000000000 ffffea00014dd388 ffffea0001d9bb88 0000000000000000 raw: 000000020000008a 0000000000000001 00000000f0000000 0000000000000000 page dumped because: kasan: bad access detected page_owner tracks the page as freed page last allocated via order 0, migratetype Movable, gfp_mask 0x140dca(GFP_HIGHUSER_MOVABLE|__GFP_ZERO|__GFP_COMP), pid 6725, tgid 6723 (syz.6.155), ts 164155504115, free_ts 166396649720 set_page_owner include/linux/page_owner.h:32 [inline] post_alloc_hook+0x153/0x170 mm/page_alloc.c:1889 prep_new_page mm/page_alloc.c:1897 [inline] get_page_from_freelist+0x111d/0x3140 mm/page_alloc.c:3962 __alloc_frozen_pages_noprof+0x27c/0x2ba0 mm/page_alloc.c:5250 alloc_pages_mpol+0x1fb/0x550 mm/mempolicy.c:2484 folio_alloc_mpol_noprof+0x36/0x340 mm/mempolicy.c:2503 vma_alloc_folio_noprof+0xed/0x1d0 mm/mempolicy.c:2538 folio_prealloc mm/memory.c:1204 [inline] wp_page_copy mm/memory.c:3780 [inline] do_wp_page+0xf28/0x4f00 mm/memory.c:4241 handle_pte_fault mm/memory.c:6333 [inline] __handle_mm_fault+0x1ac8/0x2b60 mm/memory.c:6455 handle_mm_fault+0x36d/0xa20 mm/memory.c:6624 do_user_addr_fault+0x74c/0x12f0 arch/x86/mm/fault.c:1385 handle_page_fault arch/x86/mm/fault.c:1474 [inline] exc_page_fault+0x6f/0xd0 arch/x86/mm/fault.c:1527 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:618 page last free pid 6725 tgid 6723 stack trace: reset_page_owner include/linux/page_owner.h:25 [inline] __free_pages_prepare mm/page_alloc.c:1433 [inline] free_unref_folios+0xaea/0x1790 mm/page_alloc.c:3040 folios_put_refs+0x53c/0x840 mm/swap.c:1002 free_pages_and_swap_cache+0x242/0x480 mm/swap_state.c:423 __tlb_batch_free_encoded_pages+0xe9/0x280 mm/mmu_gather.c:138 tlb_batch_pages_flush mm/mmu_gather.c:151 [inline] tlb_flush_mmu_free mm/mmu_gather.c:398 [inline] tlb_flush_mmu+0xe9/0x590 mm/mmu_gather.c:405 zap_pte_range mm/memory.c:1968 [inline] zap_pmd_range mm/memory.c:2021 [inline] zap_pud_range mm/memory.c:2049 [inline] zap_p4d_range mm/memory.c:2070 [inline] unmap_page_range+0x2333/0x4840 mm/memory.c:2091 unmap_single_vma+0x153/0x240 mm/memory.c:2133 unmap_vmas+0x295/0x590 mm/memory.c:2171 exit_mmap+0x1ef/0xa30 mm/mmap.c:1302 __mmput+0x12a/0x410 kernel/fork.c:1174 mmput+0x67/0x80 kernel/fork.c:1197 exit_mm kernel/exit.c:581 [inline] do_exit+0x819/0x2b60 kernel/exit.c:964 do_group_exit+0xd5/0x2a0 kernel/exit.c:1118 get_signal+0x1ec7/0x21e0 kernel/signal.c:3034 arch_do_signal_or_restart+0x91/0x7a0 arch/x86/kernel/signal.c:337 __exit_to_user_mode_loop kernel/entry/common.c:64 [inline] exit_to_user_mode_loop+0x86/0x4a0 kernel/entry/common.c:98 Memory state around the buggy address: ffff88805367bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff88805367bf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffff88805367c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ^ ffff88805367c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff88805367c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ================================================================== ================================================================== BUG: KASAN: use-after-free in next_ea fs/hpfs/hpfs_fn.h:152 [inline] BUG: KASAN: use-after-free in hpfs_get_ea+0xb0d/0xc20 fs/hpfs/ea.c:138 Read of size 1 at addr ffff88805367c002 by task syz.5.165/6773 CPU: 0 UID: 0 PID: 6773 Comm: syz.5.165 Tainted: G B syzkaller #0 PREEMPT(full) Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x100/0x190 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:378 [inline] print_report+0x156/0x4c9 mm/kasan/report.c:482 kasan_report+0xdf/0x1e0 mm/kasan/report.c:595 next_ea fs/hpfs/hpfs_fn.h:152 [inline] hpfs_get_ea+0xb0d/0xc20 fs/hpfs/ea.c:138 hpfs_read_inode+0x706/0x11c0 fs/hpfs/inode.c:63 hpfs_fill_super+0x1202/0x1f20 fs/hpfs/super.c:651 get_tree_bdev_flags+0x38c/0x620 fs/super.c:1694 vfs_get_tree+0x92/0x320 fs/super.c:1754 fc_mount fs/namespace.c:1193 [inline] do_new_mount_fc fs/namespace.c:3763 [inline] do_new_mount fs/namespace.c:3839 [inline] path_mount+0x7d0/0x23d0 fs/namespace.c:4159 do_mount fs/namespace.c:4172 [inline] __do_sys_mount fs/namespace.c:4361 [inline] __se_sys_mount fs/namespace.c:4338 [inline] __x64_sys_mount+0x293/0x310 fs/namespace.c:4338 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x106/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fcdeaf9da0a Code: 48 c7 c2 e8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fcdebec7e58 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007fcdebec7ee0 RCX: 00007fcdeaf9da0a RDX: 000020000000a000 RSI: 0000200000009ec0 RDI: 00007fcdebec7ea0 RBP: 000020000000a000 R08: 00007fcdebec7ee0 R09: 0000000003a00041 R10: 0000000003a00041 R11: 0000000000000246 R12: 0000200000009ec0 R13: 00007fcdebec7ea0 R14: 0000000000009e22 R15: 0000200000000340 The buggy address belongs to the physical page: page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x20000008a pfn:0x5367c flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff) page_type: f0(buddy) raw: 00fff00000000000 ffffea00014dd388 ffffea0001d9bb88 0000000000000000 raw: 000000020000008a 0000000000000001 00000000f0000000 0000000000000000 page dumped because: kasan: bad access detected page_owner tracks the page as freed page last allocated via order 0, migratetype Movable, gfp_mask 0x140dca(GFP_HIGHUSER_MOVABLE|__GFP_ZERO|__GFP_COMP), pid 6725, tgid 6723 (syz.6.155), ts 164155504115, free_ts 166396649720 set_page_owner include/linux/page_owner.h:32 [inline] post_alloc_hook+0x153/0x170 mm/page_alloc.c:1889 prep_new_page mm/page_alloc.c:1897 [inline] get_page_from_freelist+0x111d/0x3140 mm/page_alloc.c:3962 __alloc_frozen_pages_noprof+0x27c/0x2ba0 mm/page_alloc.c:5250 alloc_pages_mpol+0x1fb/0x550 mm/mempolicy.c:2484 folio_alloc_mpol_noprof+0x36/0x340 mm/mempolicy.c:2503 vma_alloc_folio_noprof+0xed/0x1d0 mm/mempolicy.c:2538 folio_prealloc mm/memory.c:1204 [inline] wp_page_copy mm/memory.c:3780 [inline] do_wp_page+0xf28/0x4f00 mm/memory.c:4241 handle_pte_fault mm/memory.c:6333 [inline] __handle_mm_fault+0x1ac8/0x2b60 mm/memory.c:6455 handle_mm_fault+0x36d/0xa20 mm/memory.c:6624 do_user_addr_fault+0x74c/0x12f0 arch/x86/mm/fault.c:1385 handle_page_fault arch/x86/mm/fault.c:1474 [inline] exc_page_fault+0x6f/0xd0 arch/x86/mm/fault.c:1527 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:618 page last free pid 6725 tgid 6723 stack trace: reset_page_owner include/linux/page_owner.h:25 [inline] __free_pages_prepare mm/page_alloc.c:1433 [inline] free_unref_folios+0xaea/0x1790 mm/page_alloc.c:3040 folios_put_refs+0x53c/0x840 mm/swap.c:1002 free_pages_and_swap_cache+0x242/0x480 mm/swap_state.c:423 __tlb_batch_free_encoded_pages+0xe9/0x280 mm/mmu_gather.c:138 tlb_batch_pages_flush mm/mmu_gather.c:151 [inline] tlb_flush_mmu_free mm/mmu_gather.c:398 [inline] tlb_flush_mmu+0xe9/0x590 mm/mmu_gather.c:405 zap_pte_range mm/memory.c:1968 [inline] zap_pmd_range mm/memory.c:2021 [inline] zap_pud_range mm/memory.c:2049 [inline] zap_p4d_range mm/memory.c:2070 [inline] unmap_page_range+0x2333/0x4840 mm/memory.c:2091 unmap_single_vma+0x153/0x240 mm/memory.c:2133 unmap_vmas+0x295/0x590 mm/memory.c:2171 exit_mmap+0x1ef/0xa30 mm/mmap.c:1302 __mmput+0x12a/0x410 kernel/fork.c:1174 mmput+0x67/0x80 kernel/fork.c:1197 exit_mm kernel/exit.c:581 [inline] do_exit+0x819/0x2b60 kernel/exit.c:964 do_group_exit+0xd5/0x2a0 kernel/exit.c:1118 get_signal+0x1ec7/0x21e0 kernel/signal.c:3034 arch_do_signal_or_restart+0x91/0x7a0 arch/x86/kernel/signal.c:337 __exit_to_user_mode_loop kernel/entry/common.c:64 [inline] exit_to_user_mode_loop+0x86/0x4a0 kernel/entry/common.c:98 Memory state around the buggy address: ffff88805367bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff88805367bf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffff88805367c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ^ ffff88805367c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff88805367c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ================================================================== ================================================================== BUG: KASAN: use-after-free in ea_valuelen fs/hpfs/hpfs_fn.h:147 [inline] BUG: KASAN: use-after-free in next_ea fs/hpfs/hpfs_fn.h:152 [inline] BUG: KASAN: use-after-free in hpfs_get_ea+0xae2/0xc20 fs/hpfs/ea.c:138 Read of size 1 at addr ffff88805367c003 by task syz.5.165/6773 CPU: 0 UID: 0 PID: 6773 Comm: syz.5.165 Tainted: G B syzkaller #0 PREEMPT(full) Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x100/0x190 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:378 [inline] print_report+0x156/0x4c9 mm/kasan/report.c:482 kasan_report+0xdf/0x1e0 mm/kasan/report.c:595 ea_valuelen fs/hpfs/hpfs_fn.h:147 [inline] next_ea fs/hpfs/hpfs_fn.h:152 [inline] hpfs_get_ea+0xae2/0xc20 fs/hpfs/ea.c:138 hpfs_read_inode+0x706/0x11c0 fs/hpfs/inode.c:63 hpfs_fill_super+0x1202/0x1f20 fs/hpfs/super.c:651 get_tree_bdev_flags+0x38c/0x620 fs/super.c:1694 vfs_get_tree+0x92/0x320 fs/super.c:1754 fc_mount fs/namespace.c:1193 [inline] do_new_mount_fc fs/namespace.c:3763 [inline] do_new_mount fs/namespace.c:3839 [inline] path_mount+0x7d0/0x23d0 fs/namespace.c:4159 do_mount fs/namespace.c:4172 [inline] __do_sys_mount fs/namespace.c:4361 [inline] __se_sys_mount fs/namespace.c:4338 [inline] __x64_sys_mount+0x293/0x310 fs/namespace.c:4338 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x106/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fcdeaf9da0a Code: 48 c7 c2 e8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fcdebec7e58 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007fcdebec7ee0 RCX: 00007fcdeaf9da0a RDX: 000020000000a000 RSI: 0000200000009ec0 RDI: 00007fcdebec7ea0 RBP: 000020000000a000 R08: 00007fcdebec7ee0 R09: 0000000003a00041 R10: 0000000003a00041 R11: 0000000000000246 R12: 0000200000009ec0 R13: 00007fcdebec7ea0 R14: 0000000000009e22 R15: 0000200000000340 The buggy address belongs to the physical page: page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x20000008a pfn:0x5367c flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff) page_type: f0(buddy) raw: 00fff00000000000 ffffea0001492e88 ffffea0001d9bb88 0000000000000000 raw: 000000020000008a 0000000000000001 00000000f0000000 0000000000000000 page dumped because: kasan: bad access detected page_owner tracks the page as freed page last allocated via order 0, migratetype Movable, gfp_mask 0x140dca(GFP_HIGHUSER_MOVABLE|__GFP_ZERO|__GFP_COMP), pid 6725, tgid 6723 (syz.6.155), ts 164155504115, free_ts 166396649720 set_page_owner include/linux/page_owner.h:32 [inline] post_alloc_hook+0x153/0x170 mm/page_alloc.c:1889 prep_new_page mm/page_alloc.c:1897 [inline] get_page_from_freelist+0x111d/0x3140 mm/page_alloc.c:3962 __alloc_frozen_pages_noprof+0x27c/0x2ba0 mm/page_alloc.c:5250 alloc_pages_mpol+0x1fb/0x550 mm/mempolicy.c:2484 folio_alloc_mpol_noprof+0x36/0x340 mm/mempolicy.c:2503 vma_alloc_folio_noprof+0xed/0x1d0 mm/mempolicy.c:2538 folio_prealloc mm/memory.c:1204 [inline] wp_page_copy mm/memory.c:3780 [inline] do_wp_page+0xf28/0x4f00 mm/memory.c:4241 handle_pte_fault mm/memory.c:6333 [inline] __handle_mm_fault+0x1ac8/0x2b60 mm/memory.c:6455 handle_mm_fault+0x36d/0xa20 mm/memory.c:6624 do_user_addr_fault+0x74c/0x12f0 arch/x86/mm/fault.c:1385 handle_page_fault arch/x86/mm/fault.c:1474 [inline] exc_page_fault+0x6f/0xd0 arch/x86/mm/fault.c:1527 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:618 page last free pid 6725 tgid 6723 stack trace: reset_page_owner include/linux/page_owner.h:25 [inline] __free_pages_prepare mm/page_alloc.c:1433 [inline] free_unref_folios+0xaea/0x1790 mm/page_alloc.c:3040 folios_put_refs+0x53c/0x840 mm/swap.c:1002 free_pages_and_swap_cache+0x242/0x480 mm/swap_state.c:423 __tlb_batch_free_encoded_pages+0xe9/0x280 mm/mmu_gather.c:138 tlb_batch_pages_flush mm/mmu_gather.c:151 [inline] tlb_flush_mmu_free mm/mmu_gather.c:398 [inline] tlb_flush_mmu+0xe9/0x590 mm/mmu_gather.c:405 zap_pte_range mm/memory.c:1968 [inline] zap_pmd_range mm/memory.c:2021 [inline] zap_pud_range mm/memory.c:2049 [inline] zap_p4d_range mm/memory.c:2070 [inline] unmap_page_range+0x2333/0x4840 mm/memory.c:2091 unmap_single_vma+0x153/0x240 mm/memory.c:2133 unmap_vmas+0x295/0x590 mm/memory.c:2171 exit_mmap+0x1ef/0xa30 mm/mmap.c:1302 __mmput+0x12a/0x410 kernel/fork.c:1174 mmput+0x67/0x80 kernel/fork.c:1197 exit_mm kernel/exit.c:581 [inline] do_exit+0x819/0x2b60 kernel/exit.c:964 do_group_exit+0xd5/0x2a0 kernel/exit.c:1118 get_signal+0x1ec7/0x21e0 kernel/signal.c:3034 arch_do_signal_or_restart+0x91/0x7a0 arch/x86/kernel/signal.c:337 __exit_to_user_mode_loop kernel/entry/common.c:64 [inline] exit_to_user_mode_loop+0x86/0x4a0 kernel/entry/common.c:98 Memory state around the buggy address: ffff88805367bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff88805367bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff >ffff88805367c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ^ ffff88805367c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff88805367c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ================================================================== ================================================================== BUG: KASAN: use-after-free in ea_valuelen fs/hpfs/hpfs_fn.h:147 [inline] BUG: KASAN: use-after-free in next_ea fs/hpfs/hpfs_fn.h:152 [inline] BUG: KASAN: use-after-free in hpfs_get_ea+0xafa/0xc20 fs/hpfs/ea.c:138 Read of size 1 at addr ffff88805367c004 by task syz.5.165/6773 CPU: 0 UID: 0 PID: 6773 Comm: syz.5.165 Tainted: G B syzkaller #0 PREEMPT(full) Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x100/0x190 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:378 [inline] print_report+0x156/0x4c9 mm/kasan/report.c:482 kasan_report+0xdf/0x1e0 mm/kasan/report.c:595 ea_valuelen fs/hpfs/hpfs_fn.h:147 [inline] next_ea fs/hpfs/hpfs_fn.h:152 [inline] hpfs_get_ea+0xafa/0xc20 fs/hpfs/ea.c:138 hpfs_read_inode+0x706/0x11c0 fs/hpfs/inode.c:63 hpfs_fill_super+0x1202/0x1f20 fs/hpfs/super.c:651 get_tree_bdev_flags+0x38c/0x620 fs/super.c:1694 vfs_get_tree+0x92/0x320 fs/super.c:1754 fc_mount fs/namespace.c:1193 [inline] do_new_mount_fc fs/namespace.c:3763 [inline] do_new_mount fs/namespace.c:3839 [inline] path_mount+0x7d0/0x23d0 fs/namespace.c:4159 do_mount fs/namespace.c:4172 [inline] __do_sys_mount fs/namespace.c:4361 [inline] __se_sys_mount fs/namespace.c:4338 [inline] __x64_sys_mount+0x293/0x310 fs/namespace.c:4338 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x106/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fcdeaf9da0a Code: 48 c7 c2 e8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fcdebec7e58 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007fcdebec7ee0 RCX: 00007fcdeaf9da0a RDX: 000020000000a000 RSI: 0000200000009ec0 RDI: 00007fcdebec7ea0 RBP: 000020000000a000 R08: 00007fcdebec7ee0 R09: 0000000003a00041 R10: 0000000003a00041 R11: 0000000000000246 R12: 0000200000009ec0 R13: 00007fcdebec7ea0 R14: 0000000000009e22 R15: 0000200000000340 The buggy address belongs to the physical page: page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x20000008a pfn:0x5367c flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff) page_type: f0(buddy) raw: 00fff00000000000 ffffea0001492e88 ffffea0001d9bb88 0000000000000000 raw: 000000020000008a 0000000000000001 00000000f0000000 0000000000000000 page dumped because: kasan: bad access detected page_owner tracks the page as freed page last allocated via order 0, migratetype Movable, gfp_mask 0x140dca(GFP_HIGHUSER_MOVABLE|__GFP_ZERO|__GFP_COMP), pid 6725, tgid 6723 (syz.6.155), ts 164155504115, free_ts 166396649720 set_page_owner include/linux/page_owner.h:32 [inline] post_alloc_hook+0x153/0x170 mm/page_alloc.c:1889 prep_new_page mm/page_alloc.c:1897 [inline] get_page_from_freelist+0x111d/0x3140 mm/page_alloc.c:3962 __alloc_frozen_pages_noprof+0x27c/0x2ba0 mm/page_alloc.c:5250 alloc_pages_mpol+0x1fb/0x550 mm/mempolicy.c:2484 folio_alloc_mpol_noprof+0x36/0x340 mm/mempolicy.c:2503 vma_alloc_folio_noprof+0xed/0x1d0 mm/mempolicy.c:2538 folio_prealloc mm/memory.c:1204 [inline] wp_page_copy mm/memory.c:3780 [inline] do_wp_page+0xf28/0x4f00 mm/memory.c:4241 handle_pte_fault mm/memory.c:6333 [inline] __handle_mm_fault+0x1ac8/0x2b60 mm/memory.c:6455 handle_mm_fault+0x36d/0xa20 mm/memory.c:6624 do_user_addr_fault+0x74c/0x12f0 arch/x86/mm/fault.c:1385 handle_page_fault arch/x86/mm/fault.c:1474 [inline] exc_page_fault+0x6f/0xd0 arch/x86/mm/fault.c:1527 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:618 page last free pid 6725 tgid 6723 stack trace: reset_page_owner include/linux/page_owner.h:25 [inline] __free_pages_prepare mm/page_alloc.c:1433 [inline] free_unref_folios+0xaea/0x1790 mm/page_alloc.c:3040 folios_put_refs+0x53c/0x840 mm/swap.c:1002 free_pages_and_swap_cache+0x242/0x480 mm/swap_state.c:423 __tlb_batch_free_encoded_pages+0xe9/0x280 mm/mmu_gather.c:138 tlb_batch_pages_flush mm/mmu_gather.c:151 [inline] tlb_flush_mmu_free mm/mmu_gather.c:398 [inline] tlb_flush_mmu+0xe9/0x590 mm/mmu_gather.c:405 zap_pte_range mm/memory.c:1968 [inline] zap_pmd_range mm/memory.c:2021 [inline] zap_pud_range mm/memory.c:2049 [inline] zap_p4d_range mm/memory.c:2070 [inline] unmap_page_range+0x2333/0x4840 mm/memory.c:2091 unmap_single_vma+0x153/0x240 mm/memory.c:2133 unmap_vmas+0x295/0x590 mm/memory.c:2171 exit_mmap+0x1ef/0xa30 mm/mmap.c:1302 __mmput+0x12a/0x410 kernel/fork.c:1174 mmput+0x67/0x80 kernel/fork.c:1197 exit_mm kernel/exit.c:581 [inline] do_exit+0x819/0x2b60 kernel/exit.c:964 do_group_exit+0xd5/0x2a0 kernel/exit.c:1118 get_signal+0x1ec7/0x21e0 kernel/signal.c:3034 arch_do_signal_or_restart+0x91/0x7a0 arch/x86/kernel/signal.c:337 __exit_to_user_mode_loop kernel/entry/common.c:64 [inline] exit_to_user_mode_loop+0x86/0x4a0 kernel/entry/common.c:98 Memory state around the buggy address: ffff88805367bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff88805367bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff >ffff88805367c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ^ ffff88805367c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff88805367c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ================================================================== ================================================================== BUG: KASAN: use-after-free in strcmp+0xa7/0xb0 lib/string.c:283 Read of size 1 at addr ffff88805367c00a by task syz.5.165/6773 CPU: 1 UID: 0 PID: 6773 Comm: syz.5.165 Tainted: G B syzkaller #0 PREEMPT(full) Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x100/0x190 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:378 [inline] print_report+0x156/0x4c9 mm/kasan/report.c:482 kasan_report+0xdf/0x1e0 mm/kasan/report.c:595 strcmp+0xa7/0xb0 lib/string.c:283 hpfs_get_ea+0x1fa/0xc20 fs/hpfs/ea.c:139 hpfs_read_inode+0x706/0x11c0 fs/hpfs/inode.c:63 hpfs_fill_super+0x1202/0x1f20 fs/hpfs/super.c:651 get_tree_bdev_flags+0x38c/0x620 fs/super.c:1694 vfs_get_tree+0x92/0x320 fs/super.c:1754 fc_mount fs/namespace.c:1193 [inline] do_new_mount_fc fs/namespace.c:3763 [inline] do_new_mount fs/namespace.c:3839 [inline] path_mount+0x7d0/0x23d0 fs/namespace.c:4159 do_mount fs/namespace.c:4172 [inline] __do_sys_mount fs/namespace.c:4361 [inline] __se_sys_mount fs/namespace.c:4338 [inline] __x64_sys_mount+0x293/0x310 fs/namespace.c:4338 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x106/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fcdeaf9da0a Code: 48 c7 c2 e8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fcdebec7e58 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007fcdebec7ee0 RCX: 00007fcdeaf9da0a RDX: 000020000000a000 RSI: 0000200000009ec0 RDI: 00007fcdebec7ea0 RBP: 000020000000a000 R08: 00007fcdebec7ee0 R09: 0000000003a00041 R10: 0000000003a00041 R11: 0000000000000246 R12: 0000200000009ec0 R13: 00007fcdebec7ea0 R14: 0000000000009e22 R15: 0000200000000340 The buggy address belongs to the physical page: page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x20000008a pfn:0x5367c flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff) page_type: f0(buddy) raw: 00fff00000000000 ffffea0001492e88 ffffea0001d9bb88 0000000000000000 raw: 000000020000008a 0000000000000001 00000000f0000000 0000000000000000 page dumped because: kasan: bad access detected page_owner tracks the page as freed page last allocated via order 0, migratetype Movable, gfp_mask 0x140dca(GFP_HIGHUSER_MOVABLE|__GFP_ZERO|__GFP_COMP), pid 6725, tgid 6723 (syz.6.155), ts 164155504115, free_ts 166396649720 set_page_owner include/linux/page_owner.h:32 [inline] post_alloc_hook+0x153/0x170 mm/page_alloc.c:1889 prep_new_page mm/page_alloc.c:1897 [inline] get_page_from_freelist+0x111d/0x3140 mm/page_alloc.c:3962 __alloc_frozen_pages_noprof+0x27c/0x2ba0 mm/page_alloc.c:5250 alloc_pages_mpol+0x1fb/0x550 mm/mempolicy.c:2484 folio_alloc_mpol_noprof+0x36/0x340 mm/mempolicy.c:2503 vma_alloc_folio_noprof+0xed/0x1d0 mm/mempolicy.c:2538 folio_prealloc mm/memory.c:1204 [inline] wp_page_copy mm/memory.c:3780 [inline] do_wp_page+0xf28/0x4f00 mm/memory.c:4241 handle_pte_fault mm/memory.c:6333 [inline] __handle_mm_fault+0x1ac8/0x2b60 mm/memory.c:6455 handle_mm_fault+0x36d/0xa20 mm/memory.c:6624 do_user_addr_fault+0x74c/0x12f0 arch/x86/mm/fault.c:1385 handle_page_fault arch/x86/mm/fault.c:1474 [inline] exc_page_fault+0x6f/0xd0 arch/x86/mm/fault.c:1527 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:618 page last free pid 6725 tgid 6723 stack trace: reset_page_owner include/linux/page_owner.h:25 [inline] __free_pages_prepare mm/page_alloc.c:1433 [inline] free_unref_folios+0xaea/0x1790 mm/page_alloc.c:3040 folios_put_refs+0x53c/0x840 mm/swap.c:1002 free_pages_and_swap_cache+0x242/0x480 mm/swap_state.c:423 __tlb_batch_free_encoded_pages+0xe9/0x280 mm/mmu_gather.c:138 tlb_batch_pages_flush mm/mmu_gather.c:151 [inline] tlb_flush_mmu_free mm/mmu_gather.c:398 [inline] tlb_flush_mmu+0xe9/0x590 mm/mmu_gather.c:405 zap_pte_range mm/memory.c:1968 [inline] zap_pmd_range mm/memory.c:2021 [inline] zap_pud_range mm/memory.c:2049 [inline] zap_p4d_range mm/memory.c:2070 [inline] unmap_page_range+0x2333/0x4840 mm/memory.c:2091 unmap_single_vma+0x153/0x240 mm/memory.c:2133 unmap_vmas+0x295/0x590 mm/memory.c:2171 exit_mmap+0x1ef/0xa30 mm/mmap.c:1302 __mmput+0x12a/0x410 kernel/fork.c:1174 mmput+0x67/0x80 kernel/fork.c:1197 exit_mm kernel/exit.c:581 [inline] do_exit+0x819/0x2b60 kernel/exit.c:964 do_group_exit+0xd5/0x2a0 kernel/exit.c:1118 get_signal+0x1ec7/0x21e0 kernel/signal.c:3034 arch_do_signal_or_restart+0x91/0x7a0 arch/x86/kernel/signal.c:337 __exit_to_user_mode_loop kernel/entry/common.c:64 [inline] exit_to_user_mode_loop+0x86/0x4a0 kernel/entry/common.c:98 Memory state around the buggy address: ffff88805367bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff88805367bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff >ffff88805367c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ^ ffff88805367c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff88805367c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ================================================================== ================================================================== BUG: KASAN: use-after-free in next_ea fs/hpfs/hpfs_fn.h:152 [inline] BUG: KASAN: use-after-free in hpfs_get_ea+0xb0d/0xc20 fs/hpfs/ea.c:138 Read of size 1 at addr ffff88805367c007 by task syz.5.165/6773 CPU: 0 UID: 0 PID: 6773 Comm: syz.5.165 Tainted: G B syzkaller #0 PREEMPT(full) Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x100/0x190 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:378 [inline] print_report+0x156/0x4c9 mm/kasan/report.c:482 kasan_report+0xdf/0x1e0 mm/kasan/report.c:595 next_ea fs/hpfs/hpfs_fn.h:152 [inline] hpfs_get_ea+0xb0d/0xc20 fs/hpfs/ea.c:138 hpfs_read_inode+0x706/0x11c0 fs/hpfs/inode.c:63 hpfs_fill_super+0x1202/0x1f20 fs/hpfs/super.c:651 get_tree_bdev_flags+0x38c/0x620 fs/super.c:1694 vfs_get_tree+0x92/0x320 fs/super.c:1754 fc_mount fs/namespace.c:1193 [inline] do_new_mount_fc fs/namespace.c:3763 [inline] do_new_mount fs/namespace.c:3839 [inline] path_mount+0x7d0/0x23d0 fs/namespace.c:4159 do_mount fs/namespace.c:4172 [inline] __do_sys_mount fs/namespace.c:4361 [inline] __se_sys_mount fs/namespace.c:4338 [inline] __x64_sys_mount+0x293/0x310 fs/namespace.c:4338 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x106/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fcdeaf9da0a Code: 48 c7 c2 e8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fcdebec7e58 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007fcdebec7ee0 RCX: 00007fcdeaf9da0a RDX: 000020000000a000 RSI: 0000200000009ec0 RDI: 00007fcdebec7ea0 RBP: 000020000000a000 R08: 00007fcdebec7ee0 R09: 0000000003a00041 R10: 0000000003a00041 R11: 0000000000000246 R12: 0000200000009ec0 R13: 00007fcdebec7ea0 R14: 0000000000009e22 R15: 0000200000000340 The buggy address belongs to the physical page: page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x20000008a pfn:0x5367c flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff) page_type: f0(buddy) raw: 00fff00000000000 ffffea0001492e88 ffffea0001d9bb88 0000000000000000 raw: 000000020000008a 0000000000000001 00000000f0000000 0000000000000000 page dumped because: kasan: bad access detected page_owner tracks the page as freed page last allocated via order 0, migratetype Movable, gfp_mask 0x140dca(GFP_HIGHUSER_MOVABLE|__GFP_ZERO|__GFP_COMP), pid 6725, tgid 6723 (syz.6.155), ts 164155504115, free_ts 166396649720 set_page_owner include/linux/page_owner.h:32 [inline] post_alloc_hook+0x153/0x170 mm/page_alloc.c:1889 prep_new_page mm/page_alloc.c:1897 [inline] get_page_from_freelist+0x111d/0x3140 mm/page_alloc.c:3962 __alloc_frozen_pages_noprof+0x27c/0x2ba0 mm/page_alloc.c:5250 alloc_pages_mpol+0x1fb/0x550 mm/mempolicy.c:2484 folio_alloc_mpol_noprof+0x36/0x340 mm/mempolicy.c:2503 vma_alloc_folio_noprof+0xed/0x1d0 mm/mempolicy.c:2538 folio_prealloc mm/memory.c:1204 [inline] wp_page_copy mm/memory.c:3780 [inline] do_wp_page+0xf28/0x4f00 mm/memory.c:4241 handle_pte_fault mm/memory.c:6333 [inline] __handle_mm_fault+0x1ac8/0x2b60 mm/memory.c:6455 handle_mm_fault+0x36d/0xa20 mm/memory.c:6624 do_user_addr_fault+0x74c/0x12f0 arch/x86/mm/fault.c:1385 handle_page_fault arch/x86/mm/fault.c:1474 [inline] exc_page_fault+0x6f/0xd0 arch/x86/mm/fault.c:1527 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:618 page last free pid 6725 tgid 6723 stack trace: reset_page_owner include/linux/page_owner.h:25 [inline] __free_pages_prepare mm/page_alloc.c:1433 [inline] free_unref_folios+0xaea/0x1790 mm/page_alloc.c:3040 folios_put_refs+0x53c/0x840 mm/swap.c:1002 free_pages_and_swap_cache+0x242/0x480 mm/swap_state.c:423 __tlb_batch_free_encoded_pages+0xe9/0x280 mm/mmu_gather.c:138 tlb_batch_pages_flush mm/mmu_gather.c:151 [inline] tlb_flush_mmu_free mm/mmu_gather.c:398 [inline] tlb_flush_mmu+0xe9/0x590 mm/mmu_gather.c:405 zap_pte_range mm/memory.c:1968 [inline] zap_pmd_range mm/memory.c:2021 [inline] zap_pud_range mm/memory.c:2049 [inline] zap_p4d_range mm/memory.c:2070 [inline] unmap_page_range+0x2333/0x4840 mm/memory.c:2091 unmap_single_vma+0x153/0x240 mm/memory.c:2133 unmap_vmas+0x295/0x590 mm/memory.c:2171 exit_mmap+0x1ef/0xa30 mm/mmap.c:1302 __mmput+0x12a/0x410 kernel/fork.c:1174 mmput+0x67/0x80 kernel/fork.c:1197 exit_mm kernel/exit.c:581 [inline] do_exit+0x819/0x2b60 kernel/exit.c:964 do_group_exit+0xd5/0x2a0 kernel/exit.c:1118 get_signal+0x1ec7/0x21e0 kernel/signal.c:3034 arch_do_signal_or_restart+0x91/0x7a0 arch/x86/kernel/signal.c:337 __exit_to_user_mode_loop kernel/entry/common.c:64 [inline] exit_to_user_mode_loop+0x86/0x4a0 kernel/entry/common.c:98 Memory state around the buggy address: ffff88805367bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff88805367bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff >ffff88805367c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ^ ffff88805367c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff88805367c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ================================================================== ================================================================== BUG: KASAN: use-after-free in ea_valuelen fs/hpfs/hpfs_fn.h:147 [inline] BUG: KASAN: use-after-free in next_ea fs/hpfs/hpfs_fn.h:152 [inline] BUG: KASAN: use-after-free in hpfs_get_ea+0xae2/0xc20 fs/hpfs/ea.c:138 Read of size 1 at addr ffff88805367c008 by task syz.5.165/6773 CPU: 0 UID: 0 PID: 6773 Comm: syz.5.165 Tainted: G B syzkaller #0 PREEMPT(full) Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x100/0x190 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:378 [inline] print_report+0x156/0x4c9 mm/kasan/report.c:482 kasan_report+0xdf/0x1e0 mm/kasan/report.c:595 ea_valuelen fs/hpfs/hpfs_fn.h:147 [inline] next_ea fs/hpfs/hpfs_fn.h:152 [inline] hpfs_get_ea+0xae2/0xc20 fs/hpfs/ea.c:138 hpfs_read_inode+0x706/0x11c0 fs/hpfs/inode.c:63 hpfs_fill_super+0x1202/0x1f20 fs/hpfs/super.c:651 get_tree_bdev_flags+0x38c/0x620 fs/super.c:1694 vfs_get_tree+0x92/0x320 fs/super.c:1754 fc_mount fs/namespace.c:1193 [inline] do_new_mount_fc fs/namespace.c:3763 [inline] do_new_mount fs/namespace.c:3839 [inline] path_mount+0x7d0/0x23d0 fs/namespace.c:4159 do_mount fs/namespace.c:4172 [inline] __do_sys_mount fs/namespace.c:4361 [inline] __se_sys_mount fs/namespace.c:4338 [inline] __x64_sys_mount+0x293/0x310 fs/namespace.c:4338 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x106/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fcdeaf9da0a Code: 48 c7 c2 e8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fcdebec7e58 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007fcdebec7ee0 RCX: 00007fcdeaf9da0a RDX: 000020000000a000 RSI: 0000200000009ec0 RDI: 00007fcdebec7ea0 RBP: 000020000000a000 R08: 00007fcdebec7ee0 R09: 0000000003a00041 R10: 0000000003a00041 R11: 0000000000000246 R12: 0000200000009ec0 R13: 00007fcdebec7ea0 R14: 0000000000009e22 R15: 0000200000000340 The buggy address belongs to the physical page: page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x20000008a pfn:0x5367c flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff) page_type: f0(buddy) raw: 00fff00000000000 ffffea0001492e88 ffffea0001d9bb88 0000000000000000 raw: 000000020000008a 0000000000000001 00000000f0000000 0000000000000000 page dumped because: kasan: bad access detected page_owner tracks the page as freed page last allocated via order 0, migratetype Movable, gfp_mask 0x140dca(GFP_HIGHUSER_MOVABLE|__GFP_ZERO|__GFP_COMP), pid 6725, tgid 6723 (syz.6.155), ts 164155504115, free_ts 166396649720 set_page_owner include/linux/page_owner.h:32 [inline] post_alloc_hook+0x153/0x170 mm/page_alloc.c:1889 prep_new_page mm/page_alloc.c:1897 [inline] get_page_from_freelist+0x111d/0x3140 mm/page_alloc.c:3962 __alloc_frozen_pages_noprof+0x27c/0x2ba0 mm/page_alloc.c:5250 alloc_pages_mpol+0x1fb/0x550 mm/mempolicy.c:2484 folio_alloc_mpol_noprof+0x36/0x340 mm/mempolicy.c:2503 vma_alloc_folio_noprof+0xed/0x1d0 mm/mempolicy.c:2538 folio_prealloc mm/memory.c:1204 [inline] wp_page_copy mm/memory.c:3780 [inline] do_wp_page+0xf28/0x4f00 mm/memory.c:4241 handle_pte_fault mm/memory.c:6333 [inline] __handle_mm_fault+0x1ac8/0x2b60 mm/memory.c:6455 handle_mm_fault+0x36d/0xa20 mm/memory.c:6624 do_user_addr_fault+0x74c/0x12f0 arch/x86/mm/fault.c:1385 handle_page_fault arch/x86/mm/fault.c:1474 [inline] exc_page_fault+0x6f/0xd0 arch/x86/mm/fault.c:1527 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:618 page last free pid 6725 tgid 6723 stack trace: reset_page_owner include/linux/page_owner.h:25 [inline] __free_pages_prepare mm/page_alloc.c:1433 [inline] free_unref_folios+0xaea/0x1790 mm/page_alloc.c:3040 folios_put_refs+0x53c/0x840 mm/swap.c:1002 free_pages_and_swap_cache+0x242/0x480 mm/swap_state.c:423 __tlb_batch_free_encoded_pages+0xe9/0x280 mm/mmu_gather.c:138 tlb_batch_pages_flush mm/mmu_gather.c:151 [inline] tlb_flush_mmu_free mm/mmu_gather.c:398 [inline] tlb_flush_mmu+0xe9/0x590 mm/mmu_gather.c:405 zap_pte_range mm/memory.c:1968 [inline] zap_pmd_range mm/memory.c:2021 [inline] zap_pud_range mm/memory.c:2049 [inline] zap_p4d_range mm/memory.c:2070 [inline] unmap_page_range+0x2333/0x4840 mm/memory.c:2091 unmap_single_vma+0x153/0x240 mm/memory.c:2133 unmap_vmas+0x295/0x590 mm/memory.c:2171 exit_mmap+0x1ef/0xa30 mm/mmap.c:1302 __mmput+0x12a/0x410 kernel/fork.c:1174 mmput+0x67/0x80 kernel/fork.c:1197 exit_mm kernel/exit.c:581 [inline] do_exit+0x819/0x2b60 kernel/exit.c:964 do_group_exit+0xd5/0x2a0 kernel/exit.c:1118 get_signal+0x1ec7/0x21e0 kernel/signal.c:3034 arch_do_signal_or_restart+0x91/0x7a0 arch/x86/kernel/signal.c:337 __exit_to_user_mode_loop kernel/entry/common.c:64 [inline] exit_to_user_mode_loop+0x86/0x4a0 kernel/entry/common.c:98 Memory state around the buggy address: ffff88805367bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff88805367bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff >ffff88805367c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ^ ffff88805367c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff88805367c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ================================================================== ================================================================== BUG: KASAN: use-after-free in ea_valuelen fs/hpfs/hpfs_fn.h:147 [inline] BUG: KASAN: use-after-free in next_ea fs/hpfs/hpfs_fn.h:152 [inline] BUG: KASAN: use-after-free in hpfs_get_ea+0xafa/0xc20 fs/hpfs/ea.c:138 Read of size 1 at addr ffff88805367c009 by task syz.5.165/6773 CPU: 1 UID: 0 PID: 6773 Comm: syz.5.165 Tainted: G B syzkaller #0 PREEMPT(full) Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x100/0x190 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:378 [inline] print_report+0x156/0x4c9 mm/kasan/report.c:482 kasan_report+0xdf/0x1e0 mm/kasan/report.c:595 ea_valuelen fs/hpfs/hpfs_fn.h:147 [inline] next_ea fs/hpfs/hpfs_fn.h:152 [inline] hpfs_get_ea+0xafa/0xc20 fs/hpfs/ea.c:138 hpfs_read_inode+0x706/0x11c0 fs/hpfs/inode.c:63 hpfs_fill_super+0x1202/0x1f20 fs/hpfs/super.c:651 get_tree_bdev_flags+0x38c/0x620 fs/super.c:1694 vfs_get_tree+0x92/0x320 fs/super.c:1754 fc_mount fs/namespace.c:1193 [inline] do_new_mount_fc fs/namespace.c:3763 [inline] do_new_mount fs/namespace.c:3839 [inline] path_mount+0x7d0/0x23d0 fs/namespace.c:4159 do_mount fs/namespace.c:4172 [inline] __do_sys_mount fs/namespace.c:4361 [inline] __se_sys_mount fs/namespace.c:4338 [inline] __x64_sys_mount+0x293/0x310 fs/namespace.c:4338 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x106/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fcdeaf9da0a Code: 48 c7 c2 e8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fcdebec7e58 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007fcdebec7ee0 RCX: 00007fcdeaf9da0a RDX: 000020000000a000 RSI: 0000200000009ec0 RDI: 00007fcdebec7ea0 RBP: 000020000000a000 R08: 00007fcdebec7ee0 R09: 0000000003a00041 R10: 0000000003a00041 R11: 0000000000000246 R12: 0000200000009ec0 R13: 00007fcdebec7ea0 R14: 0000000000009e22 R15: 0000200000000340 The buggy address belongs to the physical page: page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x20000008a pfn:0x5367c flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff) page_type: f0(buddy) raw: 00fff00000000000 ffffea0001492e88 ffffea0001d9bb88 0000000000000000 raw: 000000020000008a 0000000000000001 00000000f0000000 0000000000000000 page dumped because: kasan: bad access detected page_owner tracks the page as freed page last allocated via order 0, migratetype Movable, gfp_mask 0x140dca(GFP_HIGHUSER_MOVABLE|__GFP_ZERO|__GFP_COMP), pid 6725, tgid 6723 (syz.6.155), ts 164155504115, free_ts 166396649720 set_page_owner include/linux/page_owner.h:32 [inline] post_alloc_hook+0x153/0x170 mm/page_alloc.c:1889 prep_new_page mm/page_alloc.c:1897 [inline] get_page_from_freelist+0x111d/0x3140 mm/page_alloc.c:3962 __alloc_frozen_pages_noprof+0x27c/0x2ba0 mm/page_alloc.c:5250 alloc_pages_mpol+0x1fb/0x550 mm/mempolicy.c:2484 folio_alloc_mpol_noprof+0x36/0x340 mm/mempolicy.c:2503 vma_alloc_folio_noprof+0xed/0x1d0 mm/mempolicy.c:2538 folio_prealloc mm/memory.c:1204 [inline] wp_page_copy mm/memory.c:3780 [inline] do_wp_page+0xf28/0x4f00 mm/memory.c:4241 handle_pte_fault mm/memory.c:6333 [inline] __handle_mm_fault+0x1ac8/0x2b60 mm/memory.c:6455 handle_mm_fault+0x36d/0xa20 mm/memory.c:6624 do_user_addr_fault+0x74c/0x12f0 arch/x86/mm/fault.c:1385 handle_page_fault arch/x86/mm/fault.c:1474 [inline] exc_page_fault+0x6f/0xd0 arch/x86/mm/fault.c:1527 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:618 page last free pid 6725 tgid 6723 stack trace: reset_page_owner include/linux/page_owner.h:25 [inline] __free_pages_prepare mm/page_alloc.c:1433 [inline] free_unref_folios+0xaea/0x1790 mm/page_alloc.c:3040 folios_put_refs+0x53c/0x840 mm/swap.c:1002 free_pages_and_swap_cache+0x242/0x480 mm/swap_state.c:423 __tlb_batch_free_encoded_pages+0xe9/0x280 mm/mmu_gather.c:138 tlb_batch_pages_flush mm/mmu_gather.c:151 [inline] tlb_flush_mmu_free mm/mmu_gather.c:398 [inline] tlb_flush_mmu+0xe9/0x590 mm/mmu_gather.c:405 zap_pte_range mm/memory.c:1968 [inline] zap_pmd_range mm/memory.c:2021 [inline] zap_pud_range mm/memory.c:2049 [inline] zap_p4d_range mm/memory.c:2070 [inline] unmap_page_range+0x2333/0x4840 mm/memory.c:2091 unmap_single_vma+0x153/0x240 mm/memory.c:2133 unmap_vmas+0x295/0x590 mm/memory.c:2171 exit_mmap+0x1ef/0xa30 mm/mmap.c:1302 __mmput+0x12a/0x410 kernel/fork.c:1174 mmput+0x67/0x80 kernel/fork.c:1197 exit_mm kernel/exit.c:581 [inline] do_exit+0x819/0x2b60 kernel/exit.c:964 do_group_exit+0xd5/0x2a0 kernel/exit.c:1118 get_signal+0x1ec7/0x21e0 kernel/signal.c:3034 arch_do_signal_or_restart+0x91/0x7a0 arch/x86/kernel/signal.c:337 __exit_to_user_mode_loop kernel/entry/common.c:64 [inline] exit_to_user_mode_loop+0x86/0x4a0 kernel/entry/common.c:98 Memory state around the buggy address: ffff88805367bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff88805367bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff >ffff88805367c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ^ ffff88805367c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff88805367c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ================================================================== ================================================================== BUG: KASAN: use-after-free in strcmp+0xa7/0xb0 lib/string.c:283 Read of size 1 at addr ffff88805367c00f by task syz.5.165/6773 CPU: 0 UID: 0 PID: 6773 Comm: syz.5.165 Tainted: G B syzkaller #0 PREEMPT(full) Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x100/0x190 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:378 [inline] print_report+0x156/0x4c9 mm/kasan/report.c:482 kasan_report+0xdf/0x1e0 mm/kasan/report.c:595 strcmp+0xa7/0xb0 lib/string.c:283 hpfs_get_ea+0x1fa/0xc20 fs/hpfs/ea.c:139 hpfs_read_inode+0x706/0x11c0 fs/hpfs/inode.c:63 hpfs_fill_super+0x1202/0x1f20 fs/hpfs/super.c:651 get_tree_bdev_flags+0x38c/0x620 fs/super.c:1694 vfs_get_tree+0x92/0x320 fs/super.c:1754 fc_mount fs/namespace.c:1193 [inline] do_new_mount_fc fs/namespace.c:3763 [inline] do_new_mount fs/namespace.c:3839 [inline] path_mount+0x7d0/0x23d0 fs/namespace.c:4159 do_mount fs/namespace.c:4172 [inline] __do_sys_mount fs/namespace.c:4361 [inline] __se_sys_mount fs/namespace.c:4338 [inline] __x64_sys_mount+0x293/0x310 fs/namespace.c:4338 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x106/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fcdeaf9da0a Code: 48 c7 c2 e8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fcdebec7e58 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007fcdebec7ee0 RCX: 00007fcdeaf9da0a RDX: 000020000000a000 RSI: 0000200000009ec0 RDI: 00007fcdebec7ea0 RBP: 000020000000a000 R08: 00007fcdebec7ee0 R09: 0000000003a00041 R10: 0000000003a00041 R11: 0000000000000246 R12: 0000200000009ec0 R13: 00007fcdebec7ea0 R14: 0000000000009e22 R15: 0000200000000340 The buggy address belongs to the physical page: page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x20000008a pfn:0x5367c flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff) page_type: f0(buddy) raw: 00fff00000000000 ffffea0001492e88 ffffea0001d9bb88 0000000000000000 raw: 000000020000008a 0000000000000001 00000000f0000000 0000000000000000 page dumped because: kasan: bad access detected page_owner tracks the page as freed page last allocated via order 0, migratetype Movable, gfp_mask 0x140dca(GFP_HIGHUSER_MOVABLE|__GFP_ZERO|__GFP_COMP), pid 6725, tgid 6723 (syz.6.155), ts 164155504115, free_ts 166396649720 set_page_owner include/linux/page_owner.h:32 [inline] post_alloc_hook+0x153/0x170 mm/page_alloc.c:1889 prep_new_page mm/page_alloc.c:1897 [inline] get_page_from_freelist+0x111d/0x3140 mm/page_alloc.c:3962 __alloc_frozen_pages_noprof+0x27c/0x2ba0 mm/page_alloc.c:5250 alloc_pages_mpol+0x1fb/0x550 mm/mempolicy.c:2484 folio_alloc_mpol_noprof+0x36/0x340 mm/mempolicy.c:2503 vma_alloc_folio_noprof+0xed/0x1d0 mm/mempolicy.c:2538 folio_prealloc mm/memory.c:1204 [inline] wp_page_copy mm/memory.c:3780 [inline] do_wp_page+0xf28/0x4f00 mm/memory.c:4241 handle_pte_fault mm/memory.c:6333 [inline] __handle_mm_fault+0x1ac8/0x2b60 mm/memory.c:6455 handle_mm_fault+0x36d/0xa20 mm/memory.c:6624 do_user_addr_fault+0x74c/0x12f0 arch/x86/mm/fault.c:1385 handle_page_fault arch/x86/mm/fault.c:1474 [inline] exc_page_fault+0x6f/0xd0 arch/x86/mm/fault.c:1527 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:618 page last free pid 6725 tgid 6723 stack trace: reset_page_owner include/linux/page_owner.h:25 [inline] __free_pages_prepare mm/page_alloc.c:1433 [inline] free_unref_folios+0xaea/0x1790 mm/page_alloc.c:3040 folios_put_refs+0x53c/0x840 mm/swap.c:1002 free_pages_and_swap_cache+0x242/0x480 mm/swap_state.c:423 __tlb_batch_free_encoded_pages+0xe9/0x280 mm/mmu_gather.c:138 tlb_batch_pages_flush mm/mmu_gather.c:151 [inline] tlb_flush_mmu_free mm/mmu_gather.c:398 [inline] tlb_flush_mmu+0xe9/0x590 mm/mmu_gather.c:405 zap_pte_range mm/memory.c:1968 [inline] zap_pmd_range mm/memory.c:2021 [inline] zap_pud_range mm/memory.c:2049 [inline] zap_p4d_range mm/memory.c:2070 [inline] unmap_page_range+0x2333/0x4840 mm/memory.c:2091 unmap_single_vma+0x153/0x240 mm/memory.c:2133 unmap_vmas+0x295/0x590 mm/memory.c:2171 exit_mmap+0x1ef/0xa30 mm/mmap.c:1302 __mmput+0x12a/0x410 kernel/fork.c:1174 mmput+0x67/0x80 kernel/fork.c:1197 exit_mm kernel/exit.c:581 [inline] do_exit+0x819/0x2b60 kernel/exit.c:964 do_group_exit+0xd5/0x2a0 kernel/exit.c:1118 get_signal+0x1ec7/0x21e0 kernel/signal.c:3034 arch_do_signal_or_restart+0x91/0x7a0 arch/x86/kernel/signal.c:337 __exit_to_user_mode_loop kernel/entry/common.c:64 [inline] exit_to_user_mode_loop+0x86/0x4a0 kernel/entry/common.c:98 Memory state around the buggy address: ffff88805367bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff88805367bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff >ffff88805367c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ^ ffff88805367c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff88805367c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ================================================================== ================================================================== BUG: KASAN: use-after-free in next_ea fs/hpfs/hpfs_fn.h:152 [inline] BUG: KASAN: use-after-free in hpfs_get_ea+0xb0d/0xc20 fs/hpfs/ea.c:138 Read of size 1 at addr ffff88805367c00c by task syz.5.165/6773 CPU: 0 UID: 0 PID: 6773 Comm: syz.5.165 Tainted: G B syzkaller #0 PREEMPT(full) Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x100/0x190 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:378 [inline] print_report+0x156/0x4c9 mm/kasan/report.c:482 kasan_report+0xdf/0x1e0 mm/kasan/report.c:595 next_ea fs/hpfs/hpfs_fn.h:152 [inline] hpfs_get_ea+0xb0d/0xc20 fs/hpfs/ea.c:138 hpfs_read_inode+0x706/0x11c0 fs/hpfs/inode.c:63 hpfs_fill_super+0x1202/0x1f20 fs/hpfs/super.c:651 get_tree_bdev_flags+0x38c/0x620 fs/super.c:1694 vfs_get_tree+0x92/0x320 fs/super.c:1754 fc_mount fs/namespace.c:1193 [inline] do_new_mount_fc fs/namespace.c:3763 [inline] do_new_mount fs/namespace.c:3839 [inline] path_mount+0x7d0/0x23d0 fs/namespace.c:4159 do_mount fs/namespace.c:4172 [inline] __do_sys_mount fs/namespace.c:4361 [inline] __se_sys_mount fs/namespace.c:4338 [inline] __x64_sys_mount+0x293/0x310 fs/namespace.c:4338 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x106/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fcdeaf9da0a Code: 48 c7 c2 e8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fcdebec7e58 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007fcdebec7ee0 RCX: 00007fcdeaf9da0a RDX: 000020000000a000 RSI: 0000200000009ec0 RDI: 00007fcdebec7ea0 RBP: 000020000000a000 R08: 00007fcdebec7ee0 R09: 0000000003a00041 R10: 0000000003a00041 R11: 0000000000000246 R12: 0000200000009ec0 R13: 00007fcdebec7ea0 R14: 0000000000009e22 R15: 0000200000000340 The buggy address belongs to the physical page: page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x20000008a pfn:0x5367c flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff) page_type: f0(buddy) raw: 00fff00000000000 ffffea0001492e88 ffffea0001d9bb88 0000000000000000 raw: 000000020000008a 0000000000000001 00000000f0000000 0000000000000000 page dumped because: kasan: bad access detected page_owner tracks the page as freed page last allocated via order 0, migratetype Movable, gfp_mask 0x140dca(GFP_HIGHUSER_MOVABLE|__GFP_ZERO|__GFP_COMP), pid 6725, tgid 6723 (syz.6.155), ts 164155504115, free_ts 166396649720 set_page_owner include/linux/page_owner.h:32 [inline] post_alloc_hook+0x153/0x170 mm/page_alloc.c:1889 prep_new_page mm/page_alloc.c:1897 [inline] get_page_from_freelist+0x111d/0x3140 mm/page_alloc.c:3962 __alloc_frozen_pages_noprof+0x27c/0x2ba0 mm/page_alloc.c:5250 alloc_pages_mpol+0x1fb/0x550 mm/mempolicy.c:2484 folio_alloc_mpol_noprof+0x36/0x340 mm/mempolicy.c:2503 vma_alloc_folio_noprof+0xed/0x1d0 mm/mempolicy.c:2538 folio_prealloc mm/memory.c:1204 [inline] wp_page_copy mm/memory.c:3780 [inline] do_wp_page+0xf28/0x4f00 mm/memory.c:4241 handle_pte_fault mm/memory.c:6333 [inline] __handle_mm_fault+0x1ac8/0x2b60 mm/memory.c:6455 handle_mm_fault+0x36d/0xa20 mm/memory.c:6624 do_user_addr_fault+0x74c/0x12f0 arch/x86/mm/fault.c:1385 handle_page_fault arch/x86/mm/fault.c:1474 [inline] exc_page_fault+0x6f/0xd0 arch/x86/mm/fault.c:1527 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:618 page last free pid 6725 tgid 6723 stack trace: reset_page_owner include/linux/page_owner.h:25 [inline] __free_pages_prepare mm/page_alloc.c:1433 [inline] free_unref_folios+0xaea/0x1790 mm/page_alloc.c:3040 folios_put_refs+0x53c/0x840 mm/swap.c:1002 free_pages_and_swap_cache+0x242/0x480 mm/swap_state.c:423 __tlb_batch_free_encoded_pages+0xe9/0x280 mm/mmu_gather.c:138 tlb_batch_pages_flush mm/mmu_gather.c:151 [inline] tlb_flush_mmu_free mm/mmu_gather.c:398 [inline] tlb_flush_mmu+0xe9/0x590 mm/mmu_gather.c:405 zap_pte_range mm/memory.c:1968 [inline] zap_pmd_range mm/memory.c:2021 [inline] zap_pud_range mm/memory.c:2049 [inline] zap_p4d_range mm/memory.c:2070 [inline] unmap_page_range+0x2333/0x4840 mm/memory.c:2091 unmap_single_vma+0x153/0x240 mm/memory.c:2133 unmap_vmas+0x295/0x590 mm/memory.c:2171 exit_mmap+0x1ef/0xa30 mm/mmap.c:1302 __mmput+0x12a/0x410 kernel/fork.c:1174 mmput+0x67/0x80 kernel/fork.c:1197 exit_mm kernel/exit.c:581 [inline] do_exit+0x819/0x2b60 kernel/exit.c:964 do_group_exit+0xd5/0x2a0 kernel/exit.c:1118 get_signal+0x1ec7/0x21e0 kernel/signal.c:3034 arch_do_signal_or_restart+0x91/0x7a0 arch/x86/kernel/signal.c:337 __exit_to_user_mode_loop kernel/entry/common.c:64 [inline] exit_to_user_mode_loop+0x86/0x4a0 kernel/entry/common.c:98 Memory state around the buggy address: ffff88805367bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff88805367bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff >ffff88805367c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ^ ffff88805367c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff88805367c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ================================================================== ================================================================== BUG: KASAN: use-after-free in ea_valuelen fs/hpfs/hpfs_fn.h:147 [inline] BUG: KASAN: use-after-free in next_ea fs/hpfs/hpfs_fn.h:152 [inline] BUG: KASAN: use-after-free in hpfs_get_ea+0xae2/0xc20 fs/hpfs/ea.c:138 Read of size 1 at addr ffff88805367c00d by task syz.5.165/6773 CPU: 0 UID: 0 PID: 6773 Comm: syz.5.165 Tainted: G B syzkaller #0 PREEMPT(full) Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x100/0x190 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:378 [inline] print_report+0x156/0x4c9 mm/kasan/report.c:482 kasan_report+0xdf/0x1e0 mm/kasan/report.c:595 ea_valuelen fs/hpfs/hpfs_fn.h:147 [inline] next_ea fs/hpfs/hpfs_fn.h:152 [inline] hpfs_get_ea+0xae2/0xc20 fs/hpfs/ea.c:138 hpfs_read_inode+0x706/0x11c0 fs/hpfs/inode.c:63 hpfs_fill_super+0x1202/0x1f20 fs/hpfs/super.c:651 get_tree_bdev_flags+0x38c/0x620 fs/super.c:1694 vfs_get_tree+0x92/0x320 fs/super.c:1754 fc_mount fs/namespace.c:1193 [inline] do_new_mount_fc fs/namespace.c:3763 [inline] do_new_mount fs/namespace.c:3839 [inline] path_mount+0x7d0/0x23d0 fs/namespace.c:4159 do_mount fs/namespace.c:4172 [inline] __do_sys_mount fs/namespace.c:4361 [inline] __se_sys_mount fs/namespace.c:4338 [inline] __x64_sys_mount+0x293/0x310 fs/namespace.c:4338 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x106/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fcdeaf9da0a Code: 48 c7 c2 e8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fcdebec7e58 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007fcdebec7ee0 RCX: 00007fcdeaf9da0a RDX: 000020000000a000 RSI: 0000200000009ec0 RDI: 00007fcdebec7ea0 RBP: 000020000000a000 R08: 00007fcdebec7ee0 R09: 0000000003a00041 R10: 0000000003a00041 R11: 0000000000000246 R12: 0000200000009ec0 R13: 00007fcdebec7ea0 R14: 0000000000009e22 R15: 0000200000000340 The buggy address belongs to the physical page: page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x20000008a pfn:0x5367c flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff) page_type: f0(buddy) raw: 00fff00000000000 ffffea0001492e88 ffffea0001d9bb88 0000000000000000 raw: 000000020000008a 0000000000000001 00000000f0000000 0000000000000000 page dumped because: kasan: bad access detected page_owner tracks the page as freed page last allocated via order 0, migratetype Movable, gfp_mask 0x140dca(GFP_HIGHUSER_MOVABLE|__GFP_ZERO|__GFP_COMP), pid 6725, tgid 6723 (syz.6.155), ts 164155504115, free_ts 166396649720 set_page_owner include/linux/page_owner.h:32 [inline] post_alloc_hook+0x153/0x170 mm/page_alloc.c:1889 prep_new_page mm/page_alloc.c:1897 [inline] get_page_from_freelist+0x111d/0x3140 mm/page_alloc.c:3962 __alloc_frozen_pages_noprof+0x27c/0x2ba0 mm/page_alloc.c:5250 alloc_pages_mpol+0x1fb/0x550 mm/mempolicy.c:2484 folio_alloc_mpol_noprof+0x36/0x340 mm/mempolicy.c:2503 vma_alloc_folio_noprof+0xed/0x1d0 mm/mempolicy.c:2538 folio_prealloc mm/memory.c:1204 [inline] wp_page_copy mm/memory.c:3780 [inline] do_wp_page+0xf28/0x4f00 mm/memory.c:4241 handle_pte_fault mm/memory.c:6333 [inline] __handle_mm_fault+0x1ac8/0x2b60 mm/memory.c:6455 handle_mm_fault+0x36d/0xa20 mm/memory.c:6624 do_user_addr_fault+0x74c/0x12f0 arch/x86/mm/fault.c:1385 handle_page_fault arch/x86/mm/fault.c:1474 [inline] exc_page_fault+0x6f/0xd0 arch/x86/mm/fault.c:1527 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:618 page last free pid 6725 tgid 6723 stack trace: reset_page_owner include/linux/page_owner.h:25 [inline] __free_pages_prepare mm/page_alloc.c:1433 [inline] free_unref_folios+0xaea/0x1790 mm/page_alloc.c:3040 folios_put_refs+0x53c/0x840 mm/swap.c:1002 free_pages_and_swap_cache+0x242/0x480 mm/swap_state.c:423 __tlb_batch_free_encoded_pages+0xe9/0x280 mm/mmu_gather.c:138 tlb_batch_pages_flush mm/mmu_gather.c:151 [inline] tlb_flush_mmu_free mm/mmu_gather.c:398 [inline] tlb_flush_mmu+0xe9/0x590 mm/mmu_gather.c:405 zap_pte_range mm/memory.c:1968 [inline] zap_pmd_range mm/memory.c:2021 [inline] zap_pud_range mm/memory.c:2049 [inline] zap_p4d_range mm/memory.c:2070 [inline] unmap_page_range+0x2333/0x4840 mm/memory.c:2091 unmap_single_vma+0x153/0x240 mm/memory.c:2133 unmap_vmas+0x295/0x590 mm/memory.c:2171 exit_mmap+0x1ef/0xa30 mm/mmap.c:1302 __mmput+0x12a/0x410 kernel/fork.c:1174 mmput+0x67/0x80 kernel/fork.c:1197 exit_mm kernel/exit.c:581 [inline] do_exit+0x819/0x2b60 kernel/exit.c:964 do_group_exit+0xd5/0x2a0 kernel/exit.c:1118 get_signal+0x1ec7/0x21e0 kernel/signal.c:3034 arch_do_signal_or_restart+0x91/0x7a0 arch/x86/kernel/signal.c:337 __exit_to_user_mode_loop kernel/entry/common.c:64 [inline] exit_to_user_mode_loop+0x86/0x4a0 kernel/entry/common.c:98 Memory state around the buggy address: ffff88805367bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff88805367bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff >ffff88805367c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ^ ffff88805367c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff88805367c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ================================================================== ================================================================== BUG: KASAN: use-after-free in ea_valuelen fs/hpfs/hpfs_fn.h:147 [inline] BUG: KASAN: use-after-free in next_ea fs/hpfs/hpfs_fn.h:152 [inline] BUG: KASAN: use-after-free in hpfs_get_ea+0xafa/0xc20 fs/hpfs/ea.c:138 Read of size 1 at addr ffff88805367c00e by task syz.5.165/6773 CPU: 0 UID: 0 PID: 6773 Comm: syz.5.165 Tainted: G B syzkaller #0 PREEMPT(full) Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x100/0x190 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:378 [inline] print_report+0x156/0x4c9 mm/kasan/report.c:482 kasan_report+0xdf/0x1e0 mm/kasan/report.c:595 ea_valuelen fs/hpfs/hpfs_fn.h:147 [inline] next_ea fs/hpfs/hpfs_fn.h:152 [inline] hpfs_get_ea+0xafa/0xc20 fs/hpfs/ea.c:138 hpfs_read_inode+0x706/0x11c0 fs/hpfs/inode.c:63 hpfs_fill_super+0x1202/0x1f20 fs/hpfs/super.c:651 get_tree_bdev_flags+0x38c/0x620 fs/super.c:1694 vfs_get_tree+0x92/0x320 fs/super.c:1754 fc_mount fs/namespace.c:1193 [inline] do_new_mount_fc fs/namespace.c:3763 [inline] do_new_mount fs/namespace.c:3839 [inline] path_mount+0x7d0/0x23d0 fs/namespace.c:4159 do_mount fs/namespace.c:4172 [inline] __do_sys_mount fs/namespace.c:4361 [inline] __se_sys_mount fs/namespace.c:4338 [inline] __x64_sys_mount+0x293/0x310 fs/namespace.c:4338 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x106/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fcdeaf9da0a Code: 48 c7 c2 e8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fcdebec7e58 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007fcdebec7ee0 RCX: 00007fcdeaf9da0a RDX: 000020000000a000 RSI: 0000200000009ec0 RDI: 00007fcdebec7ea0 RBP: 000020000000a000 R08: 00007fcdebec7ee0 R09: 0000000003a00041 R10: 0000000003a00041 R11: 0000000000000246 R12: 0000200000009ec0 R13: 00007fcdebec7ea0 R14: 0000000000009e22 R15: 0000200000000340 The buggy address belongs to the physical page: page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x20000008a pfn:0x5367c flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff) page_type: f0(buddy)