hpfs: filesystem error: warning: spare dnodes used, try chkdsk
hpfs: Proceeding, but your filesystem could be corrupted if you delete files or directories
hpfs: You really don't want any checks? You are crazy...
hpfs: hpfs_map_sector(): read error
hpfs: code page support is disabled
==================================================================
BUG: KASAN: use-after-free in strcmp+0xa7/0xb0 lib/string.c:283
Read of size 1 at addr ffff88805367c000 by task syz.5.165/6773
CPU: 0 UID: 0 PID: 6773 Comm: syz.5.165 Not tainted syzkaller #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x100/0x190 lib/dump_stack.c:120
print_address_description mm/kasan/report.c:378 [inline]
print_report+0x156/0x4c9 mm/kasan/report.c:482
kasan_report+0xdf/0x1e0 mm/kasan/report.c:595
strcmp+0xa7/0xb0 lib/string.c:283
hpfs_get_ea+0x1fa/0xc20 fs/hpfs/ea.c:139
hpfs_read_inode+0x706/0x11c0 fs/hpfs/inode.c:63
hpfs_fill_super+0x1202/0x1f20 fs/hpfs/super.c:651
get_tree_bdev_flags+0x38c/0x620 fs/super.c:1694
vfs_get_tree+0x92/0x320 fs/super.c:1754
fc_mount fs/namespace.c:1193 [inline]
do_new_mount_fc fs/namespace.c:3763 [inline]
do_new_mount fs/namespace.c:3839 [inline]
path_mount+0x7d0/0x23d0 fs/namespace.c:4159
do_mount fs/namespace.c:4172 [inline]
__do_sys_mount fs/namespace.c:4361 [inline]
__se_sys_mount fs/namespace.c:4338 [inline]
__x64_sys_mount+0x293/0x310 fs/namespace.c:4338
do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
do_syscall_64+0x106/0xf80 arch/x86/entry/syscall_64.c:94
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fcdeaf9da0a
Code: 48 c7 c2 e8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fcdebec7e58 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
RAX: ffffffffffffffda RBX: 00007fcdebec7ee0 RCX: 00007fcdeaf9da0a
RDX: 000020000000a000 RSI: 0000200000009ec0 RDI: 00007fcdebec7ea0
RBP: 000020000000a000 R08: 00007fcdebec7ee0 R09: 0000000003a00041
R10: 0000000003a00041 R11: 0000000000000246 R12: 0000200000009ec0
R13: 00007fcdebec7ea0 R14: 0000000000009e22 R15: 0000200000000340
The buggy address belongs to the physical page:
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x20000008a pfn:0x5367c
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
page_type: f0(buddy)
raw: 00fff00000000000 ffffea0001d3b088 ffffea0001d3bfc8 0000000000000000
raw: 000000020000008a 0000000000000000 00000000f0000000 0000000000000000
page dumped because: kasan: bad access detected
page_owner tracks the page as freed
page last allocated via order 0, migratetype Movable, gfp_mask 0x140dca(GFP_HIGHUSER_MOVABLE|__GFP_ZERO|__GFP_COMP), pid 6725, tgid 6723 (syz.6.155), ts 164155504115, free_ts 166396649720
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x153/0x170 mm/page_alloc.c:1889
prep_new_page mm/page_alloc.c:1897 [inline]
get_page_from_freelist+0x111d/0x3140 mm/page_alloc.c:3962
__alloc_frozen_pages_noprof+0x27c/0x2ba0 mm/page_alloc.c:5250
alloc_pages_mpol+0x1fb/0x550 mm/mempolicy.c:2484
folio_alloc_mpol_noprof+0x36/0x340 mm/mempolicy.c:2503
vma_alloc_folio_noprof+0xed/0x1d0 mm/mempolicy.c:2538
folio_prealloc mm/memory.c:1204 [inline]
wp_page_copy mm/memory.c:3780 [inline]
do_wp_page+0xf28/0x4f00 mm/memory.c:4241
handle_pte_fault mm/memory.c:6333 [inline]
__handle_mm_fault+0x1ac8/0x2b60 mm/memory.c:6455
handle_mm_fault+0x36d/0xa20 mm/memory.c:6624
do_user_addr_fault+0x74c/0x12f0 arch/x86/mm/fault.c:1385
handle_page_fault arch/x86/mm/fault.c:1474 [inline]
exc_page_fault+0x6f/0xd0 arch/x86/mm/fault.c:1527
asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:618
page last free pid 6725 tgid 6723 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
__free_pages_prepare mm/page_alloc.c:1433 [inline]
free_unref_folios+0xaea/0x1790 mm/page_alloc.c:3040
folios_put_refs+0x53c/0x840 mm/swap.c:1002
free_pages_and_swap_cache+0x242/0x480 mm/swap_state.c:423
__tlb_batch_free_encoded_pages+0xe9/0x280 mm/mmu_gather.c:138
tlb_batch_pages_flush mm/mmu_gather.c:151 [inline]
tlb_flush_mmu_free mm/mmu_gather.c:398 [inline]
tlb_flush_mmu+0xe9/0x590 mm/mmu_gather.c:405
zap_pte_range mm/memory.c:1968 [inline]
zap_pmd_range mm/memory.c:2021 [inline]
zap_pud_range mm/memory.c:2049 [inline]
zap_p4d_range mm/memory.c:2070 [inline]
unmap_page_range+0x2333/0x4840 mm/memory.c:2091
unmap_single_vma+0x153/0x240 mm/memory.c:2133
unmap_vmas+0x295/0x590 mm/memory.c:2171
exit_mmap+0x1ef/0xa30 mm/mmap.c:1302
__mmput+0x12a/0x410 kernel/fork.c:1174
mmput+0x67/0x80 kernel/fork.c:1197
exit_mm kernel/exit.c:581 [inline]
do_exit+0x819/0x2b60 kernel/exit.c:964
do_group_exit+0xd5/0x2a0 kernel/exit.c:1118
get_signal+0x1ec7/0x21e0 kernel/signal.c:3034
arch_do_signal_or_restart+0x91/0x7a0 arch/x86/kernel/signal.c:337
__exit_to_user_mode_loop kernel/entry/common.c:64 [inline]
exit_to_user_mode_loop+0x86/0x4a0 kernel/entry/common.c:98
Memory state around the buggy address:
ffff88805367bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
ffff88805367bf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
>ffff88805367c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
^
ffff88805367c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
ffff88805367c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
==================================================================
==================================================================
BUG: KASAN: use-after-free in strcmp+0xa7/0xb0 lib/string.c:283
Read of size 1 at addr ffff88805367c005 by task syz.5.165/6773
CPU: 1 UID: 0 PID: 6773 Comm: syz.5.165 Tainted: G B syzkaller #0 PREEMPT(full)
Tainted: [B]=BAD_PAGE
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x100/0x190 lib/dump_stack.c:120
print_address_description mm/kasan/report.c:378 [inline]
print_report+0x156/0x4c9 mm/kasan/report.c:482
kasan_report+0xdf/0x1e0 mm/kasan/report.c:595
strcmp+0xa7/0xb0 lib/string.c:283
hpfs_get_ea+0x1fa/0xc20 fs/hpfs/ea.c:139
hpfs_read_inode+0x706/0x11c0 fs/hpfs/inode.c:63
hpfs_fill_super+0x1202/0x1f20 fs/hpfs/super.c:651
get_tree_bdev_flags+0x38c/0x620 fs/super.c:1694
vfs_get_tree+0x92/0x320 fs/super.c:1754
fc_mount fs/namespace.c:1193 [inline]
do_new_mount_fc fs/namespace.c:3763 [inline]
do_new_mount fs/namespace.c:3839 [inline]
path_mount+0x7d0/0x23d0 fs/namespace.c:4159
do_mount fs/namespace.c:4172 [inline]
__do_sys_mount fs/namespace.c:4361 [inline]
__se_sys_mount fs/namespace.c:4338 [inline]
__x64_sys_mount+0x293/0x310 fs/namespace.c:4338
do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
do_syscall_64+0x106/0xf80 arch/x86/entry/syscall_64.c:94
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fcdeaf9da0a
Code: 48 c7 c2 e8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fcdebec7e58 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
RAX: ffffffffffffffda RBX: 00007fcdebec7ee0 RCX: 00007fcdeaf9da0a
RDX: 000020000000a000 RSI: 0000200000009ec0 RDI: 00007fcdebec7ea0
RBP: 000020000000a000 R08: 00007fcdebec7ee0 R09: 0000000003a00041
R10: 0000000003a00041 R11: 0000000000000246 R12: 0000200000009ec0
R13: 00007fcdebec7ea0 R14: 0000000000009e22 R15: 0000200000000340
The buggy address belongs to the physical page:
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x20000008a pfn:0x5367c
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
page_type: f0(buddy)
raw: 00fff00000000000 ffffea00014dd388 ffffea0001d9bb88 0000000000000000
raw: 000000020000008a 0000000000000001 00000000f0000000 0000000000000000
page dumped because: kasan: bad access detected
page_owner tracks the page as freed
page last allocated via order 0, migratetype Movable, gfp_mask 0x140dca(GFP_HIGHUSER_MOVABLE|__GFP_ZERO|__GFP_COMP), pid 6725, tgid 6723 (syz.6.155), ts 164155504115, free_ts 166396649720
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x153/0x170 mm/page_alloc.c:1889
prep_new_page mm/page_alloc.c:1897 [inline]
get_page_from_freelist+0x111d/0x3140 mm/page_alloc.c:3962
__alloc_frozen_pages_noprof+0x27c/0x2ba0 mm/page_alloc.c:5250
alloc_pages_mpol+0x1fb/0x550 mm/mempolicy.c:2484
folio_alloc_mpol_noprof+0x36/0x340 mm/mempolicy.c:2503
vma_alloc_folio_noprof+0xed/0x1d0 mm/mempolicy.c:2538
folio_prealloc mm/memory.c:1204 [inline]
wp_page_copy mm/memory.c:3780 [inline]
do_wp_page+0xf28/0x4f00 mm/memory.c:4241
handle_pte_fault mm/memory.c:6333 [inline]
__handle_mm_fault+0x1ac8/0x2b60 mm/memory.c:6455
handle_mm_fault+0x36d/0xa20 mm/memory.c:6624
do_user_addr_fault+0x74c/0x12f0 arch/x86/mm/fault.c:1385
handle_page_fault arch/x86/mm/fault.c:1474 [inline]
exc_page_fault+0x6f/0xd0 arch/x86/mm/fault.c:1527
asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:618
page last free pid 6725 tgid 6723 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
__free_pages_prepare mm/page_alloc.c:1433 [inline]
free_unref_folios+0xaea/0x1790 mm/page_alloc.c:3040
folios_put_refs+0x53c/0x840 mm/swap.c:1002
free_pages_and_swap_cache+0x242/0x480 mm/swap_state.c:423
__tlb_batch_free_encoded_pages+0xe9/0x280 mm/mmu_gather.c:138
tlb_batch_pages_flush mm/mmu_gather.c:151 [inline]
tlb_flush_mmu_free mm/mmu_gather.c:398 [inline]
tlb_flush_mmu+0xe9/0x590 mm/mmu_gather.c:405
zap_pte_range mm/memory.c:1968 [inline]
zap_pmd_range mm/memory.c:2021 [inline]
zap_pud_range mm/memory.c:2049 [inline]
zap_p4d_range mm/memory.c:2070 [inline]
unmap_page_range+0x2333/0x4840 mm/memory.c:2091
unmap_single_vma+0x153/0x240 mm/memory.c:2133
unmap_vmas+0x295/0x590 mm/memory.c:2171
exit_mmap+0x1ef/0xa30 mm/mmap.c:1302
__mmput+0x12a/0x410 kernel/fork.c:1174
mmput+0x67/0x80 kernel/fork.c:1197
exit_mm kernel/exit.c:581 [inline]
do_exit+0x819/0x2b60 kernel/exit.c:964
do_group_exit+0xd5/0x2a0 kernel/exit.c:1118
get_signal+0x1ec7/0x21e0 kernel/signal.c:3034
arch_do_signal_or_restart+0x91/0x7a0 arch/x86/kernel/signal.c:337
__exit_to_user_mode_loop kernel/entry/common.c:64 [inline]
exit_to_user_mode_loop+0x86/0x4a0 kernel/entry/common.c:98
Memory state around the buggy address:
ffff88805367bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
ffff88805367bf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
>ffff88805367c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
^
ffff88805367c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
ffff88805367c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
==================================================================
==================================================================
BUG: KASAN: use-after-free in next_ea fs/hpfs/hpfs_fn.h:152 [inline]
BUG: KASAN: use-after-free in hpfs_get_ea+0xb0d/0xc20 fs/hpfs/ea.c:138
Read of size 1 at addr ffff88805367c002 by task syz.5.165/6773
CPU: 0 UID: 0 PID: 6773 Comm: syz.5.165 Tainted: G B syzkaller #0 PREEMPT(full)
Tainted: [B]=BAD_PAGE
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x100/0x190 lib/dump_stack.c:120
print_address_description mm/kasan/report.c:378 [inline]
print_report+0x156/0x4c9 mm/kasan/report.c:482
kasan_report+0xdf/0x1e0 mm/kasan/report.c:595
next_ea fs/hpfs/hpfs_fn.h:152 [inline]
hpfs_get_ea+0xb0d/0xc20 fs/hpfs/ea.c:138
hpfs_read_inode+0x706/0x11c0 fs/hpfs/inode.c:63
hpfs_fill_super+0x1202/0x1f20 fs/hpfs/super.c:651
get_tree_bdev_flags+0x38c/0x620 fs/super.c:1694
vfs_get_tree+0x92/0x320 fs/super.c:1754
fc_mount fs/namespace.c:1193 [inline]
do_new_mount_fc fs/namespace.c:3763 [inline]
do_new_mount fs/namespace.c:3839 [inline]
path_mount+0x7d0/0x23d0 fs/namespace.c:4159
do_mount fs/namespace.c:4172 [inline]
__do_sys_mount fs/namespace.c:4361 [inline]
__se_sys_mount fs/namespace.c:4338 [inline]
__x64_sys_mount+0x293/0x310 fs/namespace.c:4338
do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
do_syscall_64+0x106/0xf80 arch/x86/entry/syscall_64.c:94
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fcdeaf9da0a
Code: 48 c7 c2 e8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fcdebec7e58 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
RAX: ffffffffffffffda RBX: 00007fcdebec7ee0 RCX: 00007fcdeaf9da0a
RDX: 000020000000a000 RSI: 0000200000009ec0 RDI: 00007fcdebec7ea0
RBP: 000020000000a000 R08: 00007fcdebec7ee0 R09: 0000000003a00041
R10: 0000000003a00041 R11: 0000000000000246 R12: 0000200000009ec0
R13: 00007fcdebec7ea0 R14: 0000000000009e22 R15: 0000200000000340
The buggy address belongs to the physical page:
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x20000008a pfn:0x5367c
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
page_type: f0(buddy)
raw: 00fff00000000000 ffffea00014dd388 ffffea0001d9bb88 0000000000000000
raw: 000000020000008a 0000000000000001 00000000f0000000 0000000000000000
page dumped because: kasan: bad access detected
page_owner tracks the page as freed
page last allocated via order 0, migratetype Movable, gfp_mask 0x140dca(GFP_HIGHUSER_MOVABLE|__GFP_ZERO|__GFP_COMP), pid 6725, tgid 6723 (syz.6.155), ts 164155504115, free_ts 166396649720
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x153/0x170 mm/page_alloc.c:1889
prep_new_page mm/page_alloc.c:1897 [inline]
get_page_from_freelist+0x111d/0x3140 mm/page_alloc.c:3962
__alloc_frozen_pages_noprof+0x27c/0x2ba0 mm/page_alloc.c:5250
alloc_pages_mpol+0x1fb/0x550 mm/mempolicy.c:2484
folio_alloc_mpol_noprof+0x36/0x340 mm/mempolicy.c:2503
vma_alloc_folio_noprof+0xed/0x1d0 mm/mempolicy.c:2538
folio_prealloc mm/memory.c:1204 [inline]
wp_page_copy mm/memory.c:3780 [inline]
do_wp_page+0xf28/0x4f00 mm/memory.c:4241
handle_pte_fault mm/memory.c:6333 [inline]
__handle_mm_fault+0x1ac8/0x2b60 mm/memory.c:6455
handle_mm_fault+0x36d/0xa20 mm/memory.c:6624
do_user_addr_fault+0x74c/0x12f0 arch/x86/mm/fault.c:1385
handle_page_fault arch/x86/mm/fault.c:1474 [inline]
exc_page_fault+0x6f/0xd0 arch/x86/mm/fault.c:1527
asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:618
page last free pid 6725 tgid 6723 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
__free_pages_prepare mm/page_alloc.c:1433 [inline]
free_unref_folios+0xaea/0x1790 mm/page_alloc.c:3040
folios_put_refs+0x53c/0x840 mm/swap.c:1002
free_pages_and_swap_cache+0x242/0x480 mm/swap_state.c:423
__tlb_batch_free_encoded_pages+0xe9/0x280 mm/mmu_gather.c:138
tlb_batch_pages_flush mm/mmu_gather.c:151 [inline]
tlb_flush_mmu_free mm/mmu_gather.c:398 [inline]
tlb_flush_mmu+0xe9/0x590 mm/mmu_gather.c:405
zap_pte_range mm/memory.c:1968 [inline]
zap_pmd_range mm/memory.c:2021 [inline]
zap_pud_range mm/memory.c:2049 [inline]
zap_p4d_range mm/memory.c:2070 [inline]
unmap_page_range+0x2333/0x4840 mm/memory.c:2091
unmap_single_vma+0x153/0x240 mm/memory.c:2133
unmap_vmas+0x295/0x590 mm/memory.c:2171
exit_mmap+0x1ef/0xa30 mm/mmap.c:1302
__mmput+0x12a/0x410 kernel/fork.c:1174
mmput+0x67/0x80 kernel/fork.c:1197
exit_mm kernel/exit.c:581 [inline]
do_exit+0x819/0x2b60 kernel/exit.c:964
do_group_exit+0xd5/0x2a0 kernel/exit.c:1118
get_signal+0x1ec7/0x21e0 kernel/signal.c:3034
arch_do_signal_or_restart+0x91/0x7a0 arch/x86/kernel/signal.c:337
__exit_to_user_mode_loop kernel/entry/common.c:64 [inline]
exit_to_user_mode_loop+0x86/0x4a0 kernel/entry/common.c:98
Memory state around the buggy address:
ffff88805367bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
ffff88805367bf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
>ffff88805367c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
^
ffff88805367c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
ffff88805367c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
==================================================================
==================================================================
BUG: KASAN: use-after-free in ea_valuelen fs/hpfs/hpfs_fn.h:147 [inline]
BUG: KASAN: use-after-free in next_ea fs/hpfs/hpfs_fn.h:152 [inline]
BUG: KASAN: use-after-free in hpfs_get_ea+0xae2/0xc20 fs/hpfs/ea.c:138
Read of size 1 at addr ffff88805367c003 by task syz.5.165/6773
CPU: 0 UID: 0 PID: 6773 Comm: syz.5.165 Tainted: G B syzkaller #0 PREEMPT(full)
Tainted: [B]=BAD_PAGE
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x100/0x190 lib/dump_stack.c:120
print_address_description mm/kasan/report.c:378 [inline]
print_report+0x156/0x4c9 mm/kasan/report.c:482
kasan_report+0xdf/0x1e0 mm/kasan/report.c:595
ea_valuelen fs/hpfs/hpfs_fn.h:147 [inline]
next_ea fs/hpfs/hpfs_fn.h:152 [inline]
hpfs_get_ea+0xae2/0xc20 fs/hpfs/ea.c:138
hpfs_read_inode+0x706/0x11c0 fs/hpfs/inode.c:63
hpfs_fill_super+0x1202/0x1f20 fs/hpfs/super.c:651
get_tree_bdev_flags+0x38c/0x620 fs/super.c:1694
vfs_get_tree+0x92/0x320 fs/super.c:1754
fc_mount fs/namespace.c:1193 [inline]
do_new_mount_fc fs/namespace.c:3763 [inline]
do_new_mount fs/namespace.c:3839 [inline]
path_mount+0x7d0/0x23d0 fs/namespace.c:4159
do_mount fs/namespace.c:4172 [inline]
__do_sys_mount fs/namespace.c:4361 [inline]
__se_sys_mount fs/namespace.c:4338 [inline]
__x64_sys_mount+0x293/0x310 fs/namespace.c:4338
do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
do_syscall_64+0x106/0xf80 arch/x86/entry/syscall_64.c:94
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fcdeaf9da0a
Code: 48 c7 c2 e8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fcdebec7e58 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
RAX: ffffffffffffffda RBX: 00007fcdebec7ee0 RCX: 00007fcdeaf9da0a
RDX: 000020000000a000 RSI: 0000200000009ec0 RDI: 00007fcdebec7ea0
RBP: 000020000000a000 R08: 00007fcdebec7ee0 R09: 0000000003a00041
R10: 0000000003a00041 R11: 0000000000000246 R12: 0000200000009ec0
R13: 00007fcdebec7ea0 R14: 0000000000009e22 R15: 0000200000000340
The buggy address belongs to the physical page:
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x20000008a pfn:0x5367c
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
page_type: f0(buddy)
raw: 00fff00000000000 ffffea0001492e88 ffffea0001d9bb88 0000000000000000
raw: 000000020000008a 0000000000000001 00000000f0000000 0000000000000000
page dumped because: kasan: bad access detected
page_owner tracks the page as freed
page last allocated via order 0, migratetype Movable, gfp_mask 0x140dca(GFP_HIGHUSER_MOVABLE|__GFP_ZERO|__GFP_COMP), pid 6725, tgid 6723 (syz.6.155), ts 164155504115, free_ts 166396649720
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x153/0x170 mm/page_alloc.c:1889
prep_new_page mm/page_alloc.c:1897 [inline]
get_page_from_freelist+0x111d/0x3140 mm/page_alloc.c:3962
__alloc_frozen_pages_noprof+0x27c/0x2ba0 mm/page_alloc.c:5250
alloc_pages_mpol+0x1fb/0x550 mm/mempolicy.c:2484
folio_alloc_mpol_noprof+0x36/0x340 mm/mempolicy.c:2503
vma_alloc_folio_noprof+0xed/0x1d0 mm/mempolicy.c:2538
folio_prealloc mm/memory.c:1204 [inline]
wp_page_copy mm/memory.c:3780 [inline]
do_wp_page+0xf28/0x4f00 mm/memory.c:4241
handle_pte_fault mm/memory.c:6333 [inline]
__handle_mm_fault+0x1ac8/0x2b60 mm/memory.c:6455
handle_mm_fault+0x36d/0xa20 mm/memory.c:6624
do_user_addr_fault+0x74c/0x12f0 arch/x86/mm/fault.c:1385
handle_page_fault arch/x86/mm/fault.c:1474 [inline]
exc_page_fault+0x6f/0xd0 arch/x86/mm/fault.c:1527
asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:618
page last free pid 6725 tgid 6723 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
__free_pages_prepare mm/page_alloc.c:1433 [inline]
free_unref_folios+0xaea/0x1790 mm/page_alloc.c:3040
folios_put_refs+0x53c/0x840 mm/swap.c:1002
free_pages_and_swap_cache+0x242/0x480 mm/swap_state.c:423
__tlb_batch_free_encoded_pages+0xe9/0x280 mm/mmu_gather.c:138
tlb_batch_pages_flush mm/mmu_gather.c:151 [inline]
tlb_flush_mmu_free mm/mmu_gather.c:398 [inline]
tlb_flush_mmu+0xe9/0x590 mm/mmu_gather.c:405
zap_pte_range mm/memory.c:1968 [inline]
zap_pmd_range mm/memory.c:2021 [inline]
zap_pud_range mm/memory.c:2049 [inline]
zap_p4d_range mm/memory.c:2070 [inline]
unmap_page_range+0x2333/0x4840 mm/memory.c:2091
unmap_single_vma+0x153/0x240 mm/memory.c:2133
unmap_vmas+0x295/0x590 mm/memory.c:2171
exit_mmap+0x1ef/0xa30 mm/mmap.c:1302
__mmput+0x12a/0x410 kernel/fork.c:1174
mmput+0x67/0x80 kernel/fork.c:1197
exit_mm kernel/exit.c:581 [inline]
do_exit+0x819/0x2b60 kernel/exit.c:964
do_group_exit+0xd5/0x2a0 kernel/exit.c:1118
get_signal+0x1ec7/0x21e0 kernel/signal.c:3034
arch_do_signal_or_restart+0x91/0x7a0 arch/x86/kernel/signal.c:337
__exit_to_user_mode_loop kernel/entry/common.c:64 [inline]
exit_to_user_mode_loop+0x86/0x4a0 kernel/entry/common.c:98
Memory state around the buggy address:
ffff88805367bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
ffff88805367bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
>ffff88805367c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
^
ffff88805367c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
ffff88805367c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
==================================================================
==================================================================
BUG: KASAN: use-after-free in ea_valuelen fs/hpfs/hpfs_fn.h:147 [inline]
BUG: KASAN: use-after-free in next_ea fs/hpfs/hpfs_fn.h:152 [inline]
BUG: KASAN: use-after-free in hpfs_get_ea+0xafa/0xc20 fs/hpfs/ea.c:138
Read of size 1 at addr ffff88805367c004 by task syz.5.165/6773
CPU: 0 UID: 0 PID: 6773 Comm: syz.5.165 Tainted: G B syzkaller #0 PREEMPT(full)
Tainted: [B]=BAD_PAGE
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x100/0x190 lib/dump_stack.c:120
print_address_description mm/kasan/report.c:378 [inline]
print_report+0x156/0x4c9 mm/kasan/report.c:482
kasan_report+0xdf/0x1e0 mm/kasan/report.c:595
ea_valuelen fs/hpfs/hpfs_fn.h:147 [inline]
next_ea fs/hpfs/hpfs_fn.h:152 [inline]
hpfs_get_ea+0xafa/0xc20 fs/hpfs/ea.c:138
hpfs_read_inode+0x706/0x11c0 fs/hpfs/inode.c:63
hpfs_fill_super+0x1202/0x1f20 fs/hpfs/super.c:651
get_tree_bdev_flags+0x38c/0x620 fs/super.c:1694
vfs_get_tree+0x92/0x320 fs/super.c:1754
fc_mount fs/namespace.c:1193 [inline]
do_new_mount_fc fs/namespace.c:3763 [inline]
do_new_mount fs/namespace.c:3839 [inline]
path_mount+0x7d0/0x23d0 fs/namespace.c:4159
do_mount fs/namespace.c:4172 [inline]
__do_sys_mount fs/namespace.c:4361 [inline]
__se_sys_mount fs/namespace.c:4338 [inline]
__x64_sys_mount+0x293/0x310 fs/namespace.c:4338
do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
do_syscall_64+0x106/0xf80 arch/x86/entry/syscall_64.c:94
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fcdeaf9da0a
Code: 48 c7 c2 e8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fcdebec7e58 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
RAX: ffffffffffffffda RBX: 00007fcdebec7ee0 RCX: 00007fcdeaf9da0a
RDX: 000020000000a000 RSI: 0000200000009ec0 RDI: 00007fcdebec7ea0
RBP: 000020000000a000 R08: 00007fcdebec7ee0 R09: 0000000003a00041
R10: 0000000003a00041 R11: 0000000000000246 R12: 0000200000009ec0
R13: 00007fcdebec7ea0 R14: 0000000000009e22 R15: 0000200000000340
The buggy address belongs to the physical page:
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x20000008a pfn:0x5367c
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
page_type: f0(buddy)
raw: 00fff00000000000 ffffea0001492e88 ffffea0001d9bb88 0000000000000000
raw: 000000020000008a 0000000000000001 00000000f0000000 0000000000000000
page dumped because: kasan: bad access detected
page_owner tracks the page as freed
page last allocated via order 0, migratetype Movable, gfp_mask 0x140dca(GFP_HIGHUSER_MOVABLE|__GFP_ZERO|__GFP_COMP), pid 6725, tgid 6723 (syz.6.155), ts 164155504115, free_ts 166396649720
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x153/0x170 mm/page_alloc.c:1889
prep_new_page mm/page_alloc.c:1897 [inline]
get_page_from_freelist+0x111d/0x3140 mm/page_alloc.c:3962
__alloc_frozen_pages_noprof+0x27c/0x2ba0 mm/page_alloc.c:5250
alloc_pages_mpol+0x1fb/0x550 mm/mempolicy.c:2484
folio_alloc_mpol_noprof+0x36/0x340 mm/mempolicy.c:2503
vma_alloc_folio_noprof+0xed/0x1d0 mm/mempolicy.c:2538
folio_prealloc mm/memory.c:1204 [inline]
wp_page_copy mm/memory.c:3780 [inline]
do_wp_page+0xf28/0x4f00 mm/memory.c:4241
handle_pte_fault mm/memory.c:6333 [inline]
__handle_mm_fault+0x1ac8/0x2b60 mm/memory.c:6455
handle_mm_fault+0x36d/0xa20 mm/memory.c:6624
do_user_addr_fault+0x74c/0x12f0 arch/x86/mm/fault.c:1385
handle_page_fault arch/x86/mm/fault.c:1474 [inline]
exc_page_fault+0x6f/0xd0 arch/x86/mm/fault.c:1527
asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:618
page last free pid 6725 tgid 6723 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
__free_pages_prepare mm/page_alloc.c:1433 [inline]
free_unref_folios+0xaea/0x1790 mm/page_alloc.c:3040
folios_put_refs+0x53c/0x840 mm/swap.c:1002
free_pages_and_swap_cache+0x242/0x480 mm/swap_state.c:423
__tlb_batch_free_encoded_pages+0xe9/0x280 mm/mmu_gather.c:138
tlb_batch_pages_flush mm/mmu_gather.c:151 [inline]
tlb_flush_mmu_free mm/mmu_gather.c:398 [inline]
tlb_flush_mmu+0xe9/0x590 mm/mmu_gather.c:405
zap_pte_range mm/memory.c:1968 [inline]
zap_pmd_range mm/memory.c:2021 [inline]
zap_pud_range mm/memory.c:2049 [inline]
zap_p4d_range mm/memory.c:2070 [inline]
unmap_page_range+0x2333/0x4840 mm/memory.c:2091
unmap_single_vma+0x153/0x240 mm/memory.c:2133
unmap_vmas+0x295/0x590 mm/memory.c:2171
exit_mmap+0x1ef/0xa30 mm/mmap.c:1302
__mmput+0x12a/0x410 kernel/fork.c:1174
mmput+0x67/0x80 kernel/fork.c:1197
exit_mm kernel/exit.c:581 [inline]
do_exit+0x819/0x2b60 kernel/exit.c:964
do_group_exit+0xd5/0x2a0 kernel/exit.c:1118
get_signal+0x1ec7/0x21e0 kernel/signal.c:3034
arch_do_signal_or_restart+0x91/0x7a0 arch/x86/kernel/signal.c:337
__exit_to_user_mode_loop kernel/entry/common.c:64 [inline]
exit_to_user_mode_loop+0x86/0x4a0 kernel/entry/common.c:98
Memory state around the buggy address:
ffff88805367bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
ffff88805367bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
>ffff88805367c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
^
ffff88805367c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
ffff88805367c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
==================================================================
==================================================================
BUG: KASAN: use-after-free in strcmp+0xa7/0xb0 lib/string.c:283
Read of size 1 at addr ffff88805367c00a by task syz.5.165/6773
CPU: 1 UID: 0 PID: 6773 Comm: syz.5.165 Tainted: G B syzkaller #0 PREEMPT(full)
Tainted: [B]=BAD_PAGE
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x100/0x190 lib/dump_stack.c:120
print_address_description mm/kasan/report.c:378 [inline]
print_report+0x156/0x4c9 mm/kasan/report.c:482
kasan_report+0xdf/0x1e0 mm/kasan/report.c:595
strcmp+0xa7/0xb0 lib/string.c:283
hpfs_get_ea+0x1fa/0xc20 fs/hpfs/ea.c:139
hpfs_read_inode+0x706/0x11c0 fs/hpfs/inode.c:63
hpfs_fill_super+0x1202/0x1f20 fs/hpfs/super.c:651
get_tree_bdev_flags+0x38c/0x620 fs/super.c:1694
vfs_get_tree+0x92/0x320 fs/super.c:1754
fc_mount fs/namespace.c:1193 [inline]
do_new_mount_fc fs/namespace.c:3763 [inline]
do_new_mount fs/namespace.c:3839 [inline]
path_mount+0x7d0/0x23d0 fs/namespace.c:4159
do_mount fs/namespace.c:4172 [inline]
__do_sys_mount fs/namespace.c:4361 [inline]
__se_sys_mount fs/namespace.c:4338 [inline]
__x64_sys_mount+0x293/0x310 fs/namespace.c:4338
do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
do_syscall_64+0x106/0xf80 arch/x86/entry/syscall_64.c:94
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fcdeaf9da0a
Code: 48 c7 c2 e8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fcdebec7e58 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
RAX: ffffffffffffffda RBX: 00007fcdebec7ee0 RCX: 00007fcdeaf9da0a
RDX: 000020000000a000 RSI: 0000200000009ec0 RDI: 00007fcdebec7ea0
RBP: 000020000000a000 R08: 00007fcdebec7ee0 R09: 0000000003a00041
R10: 0000000003a00041 R11: 0000000000000246 R12: 0000200000009ec0
R13: 00007fcdebec7ea0 R14: 0000000000009e22 R15: 0000200000000340
The buggy address belongs to the physical page:
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x20000008a pfn:0x5367c
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
page_type: f0(buddy)
raw: 00fff00000000000 ffffea0001492e88 ffffea0001d9bb88 0000000000000000
raw: 000000020000008a 0000000000000001 00000000f0000000 0000000000000000
page dumped because: kasan: bad access detected
page_owner tracks the page as freed
page last allocated via order 0, migratetype Movable, gfp_mask 0x140dca(GFP_HIGHUSER_MOVABLE|__GFP_ZERO|__GFP_COMP), pid 6725, tgid 6723 (syz.6.155), ts 164155504115, free_ts 166396649720
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x153/0x170 mm/page_alloc.c:1889
prep_new_page mm/page_alloc.c:1897 [inline]
get_page_from_freelist+0x111d/0x3140 mm/page_alloc.c:3962
__alloc_frozen_pages_noprof+0x27c/0x2ba0 mm/page_alloc.c:5250
alloc_pages_mpol+0x1fb/0x550 mm/mempolicy.c:2484
folio_alloc_mpol_noprof+0x36/0x340 mm/mempolicy.c:2503
vma_alloc_folio_noprof+0xed/0x1d0 mm/mempolicy.c:2538
folio_prealloc mm/memory.c:1204 [inline]
wp_page_copy mm/memory.c:3780 [inline]
do_wp_page+0xf28/0x4f00 mm/memory.c:4241
handle_pte_fault mm/memory.c:6333 [inline]
__handle_mm_fault+0x1ac8/0x2b60 mm/memory.c:6455
handle_mm_fault+0x36d/0xa20 mm/memory.c:6624
do_user_addr_fault+0x74c/0x12f0 arch/x86/mm/fault.c:1385
handle_page_fault arch/x86/mm/fault.c:1474 [inline]
exc_page_fault+0x6f/0xd0 arch/x86/mm/fault.c:1527
asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:618
page last free pid 6725 tgid 6723 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
__free_pages_prepare mm/page_alloc.c:1433 [inline]
free_unref_folios+0xaea/0x1790 mm/page_alloc.c:3040
folios_put_refs+0x53c/0x840 mm/swap.c:1002
free_pages_and_swap_cache+0x242/0x480 mm/swap_state.c:423
__tlb_batch_free_encoded_pages+0xe9/0x280 mm/mmu_gather.c:138
tlb_batch_pages_flush mm/mmu_gather.c:151 [inline]
tlb_flush_mmu_free mm/mmu_gather.c:398 [inline]
tlb_flush_mmu+0xe9/0x590 mm/mmu_gather.c:405
zap_pte_range mm/memory.c:1968 [inline]
zap_pmd_range mm/memory.c:2021 [inline]
zap_pud_range mm/memory.c:2049 [inline]
zap_p4d_range mm/memory.c:2070 [inline]
unmap_page_range+0x2333/0x4840 mm/memory.c:2091
unmap_single_vma+0x153/0x240 mm/memory.c:2133
unmap_vmas+0x295/0x590 mm/memory.c:2171
exit_mmap+0x1ef/0xa30 mm/mmap.c:1302
__mmput+0x12a/0x410 kernel/fork.c:1174
mmput+0x67/0x80 kernel/fork.c:1197
exit_mm kernel/exit.c:581 [inline]
do_exit+0x819/0x2b60 kernel/exit.c:964
do_group_exit+0xd5/0x2a0 kernel/exit.c:1118
get_signal+0x1ec7/0x21e0 kernel/signal.c:3034
arch_do_signal_or_restart+0x91/0x7a0 arch/x86/kernel/signal.c:337
__exit_to_user_mode_loop kernel/entry/common.c:64 [inline]
exit_to_user_mode_loop+0x86/0x4a0 kernel/entry/common.c:98
Memory state around the buggy address:
ffff88805367bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
ffff88805367bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
>ffff88805367c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
^
ffff88805367c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
ffff88805367c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
==================================================================
==================================================================
BUG: KASAN: use-after-free in next_ea fs/hpfs/hpfs_fn.h:152 [inline]
BUG: KASAN: use-after-free in hpfs_get_ea+0xb0d/0xc20 fs/hpfs/ea.c:138
Read of size 1 at addr ffff88805367c007 by task syz.5.165/6773
CPU: 0 UID: 0 PID: 6773 Comm: syz.5.165 Tainted: G B syzkaller #0 PREEMPT(full)
Tainted: [B]=BAD_PAGE
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x100/0x190 lib/dump_stack.c:120
print_address_description mm/kasan/report.c:378 [inline]
print_report+0x156/0x4c9 mm/kasan/report.c:482
kasan_report+0xdf/0x1e0 mm/kasan/report.c:595
next_ea fs/hpfs/hpfs_fn.h:152 [inline]
hpfs_get_ea+0xb0d/0xc20 fs/hpfs/ea.c:138
hpfs_read_inode+0x706/0x11c0 fs/hpfs/inode.c:63
hpfs_fill_super+0x1202/0x1f20 fs/hpfs/super.c:651
get_tree_bdev_flags+0x38c/0x620 fs/super.c:1694
vfs_get_tree+0x92/0x320 fs/super.c:1754
fc_mount fs/namespace.c:1193 [inline]
do_new_mount_fc fs/namespace.c:3763 [inline]
do_new_mount fs/namespace.c:3839 [inline]
path_mount+0x7d0/0x23d0 fs/namespace.c:4159
do_mount fs/namespace.c:4172 [inline]
__do_sys_mount fs/namespace.c:4361 [inline]
__se_sys_mount fs/namespace.c:4338 [inline]
__x64_sys_mount+0x293/0x310 fs/namespace.c:4338
do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
do_syscall_64+0x106/0xf80 arch/x86/entry/syscall_64.c:94
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fcdeaf9da0a
Code: 48 c7 c2 e8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fcdebec7e58 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
RAX: ffffffffffffffda RBX: 00007fcdebec7ee0 RCX: 00007fcdeaf9da0a
RDX: 000020000000a000 RSI: 0000200000009ec0 RDI: 00007fcdebec7ea0
RBP: 000020000000a000 R08: 00007fcdebec7ee0 R09: 0000000003a00041
R10: 0000000003a00041 R11: 0000000000000246 R12: 0000200000009ec0
R13: 00007fcdebec7ea0 R14: 0000000000009e22 R15: 0000200000000340
The buggy address belongs to the physical page:
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x20000008a pfn:0x5367c
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
page_type: f0(buddy)
raw: 00fff00000000000 ffffea0001492e88 ffffea0001d9bb88 0000000000000000
raw: 000000020000008a 0000000000000001 00000000f0000000 0000000000000000
page dumped because: kasan: bad access detected
page_owner tracks the page as freed
page last allocated via order 0, migratetype Movable, gfp_mask 0x140dca(GFP_HIGHUSER_MOVABLE|__GFP_ZERO|__GFP_COMP), pid 6725, tgid 6723 (syz.6.155), ts 164155504115, free_ts 166396649720
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x153/0x170 mm/page_alloc.c:1889
prep_new_page mm/page_alloc.c:1897 [inline]
get_page_from_freelist+0x111d/0x3140 mm/page_alloc.c:3962
__alloc_frozen_pages_noprof+0x27c/0x2ba0 mm/page_alloc.c:5250
alloc_pages_mpol+0x1fb/0x550 mm/mempolicy.c:2484
folio_alloc_mpol_noprof+0x36/0x340 mm/mempolicy.c:2503
vma_alloc_folio_noprof+0xed/0x1d0 mm/mempolicy.c:2538
folio_prealloc mm/memory.c:1204 [inline]
wp_page_copy mm/memory.c:3780 [inline]
do_wp_page+0xf28/0x4f00 mm/memory.c:4241
handle_pte_fault mm/memory.c:6333 [inline]
__handle_mm_fault+0x1ac8/0x2b60 mm/memory.c:6455
handle_mm_fault+0x36d/0xa20 mm/memory.c:6624
do_user_addr_fault+0x74c/0x12f0 arch/x86/mm/fault.c:1385
handle_page_fault arch/x86/mm/fault.c:1474 [inline]
exc_page_fault+0x6f/0xd0 arch/x86/mm/fault.c:1527
asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:618
page last free pid 6725 tgid 6723 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
__free_pages_prepare mm/page_alloc.c:1433 [inline]
free_unref_folios+0xaea/0x1790 mm/page_alloc.c:3040
folios_put_refs+0x53c/0x840 mm/swap.c:1002
free_pages_and_swap_cache+0x242/0x480 mm/swap_state.c:423
__tlb_batch_free_encoded_pages+0xe9/0x280 mm/mmu_gather.c:138
tlb_batch_pages_flush mm/mmu_gather.c:151 [inline]
tlb_flush_mmu_free mm/mmu_gather.c:398 [inline]
tlb_flush_mmu+0xe9/0x590 mm/mmu_gather.c:405
zap_pte_range mm/memory.c:1968 [inline]
zap_pmd_range mm/memory.c:2021 [inline]
zap_pud_range mm/memory.c:2049 [inline]
zap_p4d_range mm/memory.c:2070 [inline]
unmap_page_range+0x2333/0x4840 mm/memory.c:2091
unmap_single_vma+0x153/0x240 mm/memory.c:2133
unmap_vmas+0x295/0x590 mm/memory.c:2171
exit_mmap+0x1ef/0xa30 mm/mmap.c:1302
__mmput+0x12a/0x410 kernel/fork.c:1174
mmput+0x67/0x80 kernel/fork.c:1197
exit_mm kernel/exit.c:581 [inline]
do_exit+0x819/0x2b60 kernel/exit.c:964
do_group_exit+0xd5/0x2a0 kernel/exit.c:1118
get_signal+0x1ec7/0x21e0 kernel/signal.c:3034
arch_do_signal_or_restart+0x91/0x7a0 arch/x86/kernel/signal.c:337
__exit_to_user_mode_loop kernel/entry/common.c:64 [inline]
exit_to_user_mode_loop+0x86/0x4a0 kernel/entry/common.c:98
Memory state around the buggy address:
ffff88805367bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
ffff88805367bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
>ffff88805367c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
^
ffff88805367c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
ffff88805367c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
==================================================================
==================================================================
BUG: KASAN: use-after-free in ea_valuelen fs/hpfs/hpfs_fn.h:147 [inline]
BUG: KASAN: use-after-free in next_ea fs/hpfs/hpfs_fn.h:152 [inline]
BUG: KASAN: use-after-free in hpfs_get_ea+0xae2/0xc20 fs/hpfs/ea.c:138
Read of size 1 at addr ffff88805367c008 by task syz.5.165/6773
CPU: 0 UID: 0 PID: 6773 Comm: syz.5.165 Tainted: G B syzkaller #0 PREEMPT(full)
Tainted: [B]=BAD_PAGE
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x100/0x190 lib/dump_stack.c:120
print_address_description mm/kasan/report.c:378 [inline]
print_report+0x156/0x4c9 mm/kasan/report.c:482
kasan_report+0xdf/0x1e0 mm/kasan/report.c:595
ea_valuelen fs/hpfs/hpfs_fn.h:147 [inline]
next_ea fs/hpfs/hpfs_fn.h:152 [inline]
hpfs_get_ea+0xae2/0xc20 fs/hpfs/ea.c:138
hpfs_read_inode+0x706/0x11c0 fs/hpfs/inode.c:63
hpfs_fill_super+0x1202/0x1f20 fs/hpfs/super.c:651
get_tree_bdev_flags+0x38c/0x620 fs/super.c:1694
vfs_get_tree+0x92/0x320 fs/super.c:1754
fc_mount fs/namespace.c:1193 [inline]
do_new_mount_fc fs/namespace.c:3763 [inline]
do_new_mount fs/namespace.c:3839 [inline]
path_mount+0x7d0/0x23d0 fs/namespace.c:4159
do_mount fs/namespace.c:4172 [inline]
__do_sys_mount fs/namespace.c:4361 [inline]
__se_sys_mount fs/namespace.c:4338 [inline]
__x64_sys_mount+0x293/0x310 fs/namespace.c:4338
do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
do_syscall_64+0x106/0xf80 arch/x86/entry/syscall_64.c:94
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fcdeaf9da0a
Code: 48 c7 c2 e8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fcdebec7e58 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
RAX: ffffffffffffffda RBX: 00007fcdebec7ee0 RCX: 00007fcdeaf9da0a
RDX: 000020000000a000 RSI: 0000200000009ec0 RDI: 00007fcdebec7ea0
RBP: 000020000000a000 R08: 00007fcdebec7ee0 R09: 0000000003a00041
R10: 0000000003a00041 R11: 0000000000000246 R12: 0000200000009ec0
R13: 00007fcdebec7ea0 R14: 0000000000009e22 R15: 0000200000000340
The buggy address belongs to the physical page:
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x20000008a pfn:0x5367c
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
page_type: f0(buddy)
raw: 00fff00000000000 ffffea0001492e88 ffffea0001d9bb88 0000000000000000
raw: 000000020000008a 0000000000000001 00000000f0000000 0000000000000000
page dumped because: kasan: bad access detected
page_owner tracks the page as freed
page last allocated via order 0, migratetype Movable, gfp_mask 0x140dca(GFP_HIGHUSER_MOVABLE|__GFP_ZERO|__GFP_COMP), pid 6725, tgid 6723 (syz.6.155), ts 164155504115, free_ts 166396649720
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x153/0x170 mm/page_alloc.c:1889
prep_new_page mm/page_alloc.c:1897 [inline]
get_page_from_freelist+0x111d/0x3140 mm/page_alloc.c:3962
__alloc_frozen_pages_noprof+0x27c/0x2ba0 mm/page_alloc.c:5250
alloc_pages_mpol+0x1fb/0x550 mm/mempolicy.c:2484
folio_alloc_mpol_noprof+0x36/0x340 mm/mempolicy.c:2503
vma_alloc_folio_noprof+0xed/0x1d0 mm/mempolicy.c:2538
folio_prealloc mm/memory.c:1204 [inline]
wp_page_copy mm/memory.c:3780 [inline]
do_wp_page+0xf28/0x4f00 mm/memory.c:4241
handle_pte_fault mm/memory.c:6333 [inline]
__handle_mm_fault+0x1ac8/0x2b60 mm/memory.c:6455
handle_mm_fault+0x36d/0xa20 mm/memory.c:6624
do_user_addr_fault+0x74c/0x12f0 arch/x86/mm/fault.c:1385
handle_page_fault arch/x86/mm/fault.c:1474 [inline]
exc_page_fault+0x6f/0xd0 arch/x86/mm/fault.c:1527
asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:618
page last free pid 6725 tgid 6723 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
__free_pages_prepare mm/page_alloc.c:1433 [inline]
free_unref_folios+0xaea/0x1790 mm/page_alloc.c:3040
folios_put_refs+0x53c/0x840 mm/swap.c:1002
free_pages_and_swap_cache+0x242/0x480 mm/swap_state.c:423
__tlb_batch_free_encoded_pages+0xe9/0x280 mm/mmu_gather.c:138
tlb_batch_pages_flush mm/mmu_gather.c:151 [inline]
tlb_flush_mmu_free mm/mmu_gather.c:398 [inline]
tlb_flush_mmu+0xe9/0x590 mm/mmu_gather.c:405
zap_pte_range mm/memory.c:1968 [inline]
zap_pmd_range mm/memory.c:2021 [inline]
zap_pud_range mm/memory.c:2049 [inline]
zap_p4d_range mm/memory.c:2070 [inline]
unmap_page_range+0x2333/0x4840 mm/memory.c:2091
unmap_single_vma+0x153/0x240 mm/memory.c:2133
unmap_vmas+0x295/0x590 mm/memory.c:2171
exit_mmap+0x1ef/0xa30 mm/mmap.c:1302
__mmput+0x12a/0x410 kernel/fork.c:1174
mmput+0x67/0x80 kernel/fork.c:1197
exit_mm kernel/exit.c:581 [inline]
do_exit+0x819/0x2b60 kernel/exit.c:964
do_group_exit+0xd5/0x2a0 kernel/exit.c:1118
get_signal+0x1ec7/0x21e0 kernel/signal.c:3034
arch_do_signal_or_restart+0x91/0x7a0 arch/x86/kernel/signal.c:337
__exit_to_user_mode_loop kernel/entry/common.c:64 [inline]
exit_to_user_mode_loop+0x86/0x4a0 kernel/entry/common.c:98
Memory state around the buggy address:
ffff88805367bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
ffff88805367bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
>ffff88805367c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
^
ffff88805367c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
ffff88805367c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
==================================================================
==================================================================
BUG: KASAN: use-after-free in ea_valuelen fs/hpfs/hpfs_fn.h:147 [inline]
BUG: KASAN: use-after-free in next_ea fs/hpfs/hpfs_fn.h:152 [inline]
BUG: KASAN: use-after-free in hpfs_get_ea+0xafa/0xc20 fs/hpfs/ea.c:138
Read of size 1 at addr ffff88805367c009 by task syz.5.165/6773
CPU: 1 UID: 0 PID: 6773 Comm: syz.5.165 Tainted: G B syzkaller #0 PREEMPT(full)
Tainted: [B]=BAD_PAGE
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x100/0x190 lib/dump_stack.c:120
print_address_description mm/kasan/report.c:378 [inline]
print_report+0x156/0x4c9 mm/kasan/report.c:482
kasan_report+0xdf/0x1e0 mm/kasan/report.c:595
ea_valuelen fs/hpfs/hpfs_fn.h:147 [inline]
next_ea fs/hpfs/hpfs_fn.h:152 [inline]
hpfs_get_ea+0xafa/0xc20 fs/hpfs/ea.c:138
hpfs_read_inode+0x706/0x11c0 fs/hpfs/inode.c:63
hpfs_fill_super+0x1202/0x1f20 fs/hpfs/super.c:651
get_tree_bdev_flags+0x38c/0x620 fs/super.c:1694
vfs_get_tree+0x92/0x320 fs/super.c:1754
fc_mount fs/namespace.c:1193 [inline]
do_new_mount_fc fs/namespace.c:3763 [inline]
do_new_mount fs/namespace.c:3839 [inline]
path_mount+0x7d0/0x23d0 fs/namespace.c:4159
do_mount fs/namespace.c:4172 [inline]
__do_sys_mount fs/namespace.c:4361 [inline]
__se_sys_mount fs/namespace.c:4338 [inline]
__x64_sys_mount+0x293/0x310 fs/namespace.c:4338
do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
do_syscall_64+0x106/0xf80 arch/x86/entry/syscall_64.c:94
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fcdeaf9da0a
Code: 48 c7 c2 e8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fcdebec7e58 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
RAX: ffffffffffffffda RBX: 00007fcdebec7ee0 RCX: 00007fcdeaf9da0a
RDX: 000020000000a000 RSI: 0000200000009ec0 RDI: 00007fcdebec7ea0
RBP: 000020000000a000 R08: 00007fcdebec7ee0 R09: 0000000003a00041
R10: 0000000003a00041 R11: 0000000000000246 R12: 0000200000009ec0
R13: 00007fcdebec7ea0 R14: 0000000000009e22 R15: 0000200000000340
The buggy address belongs to the physical page:
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x20000008a pfn:0x5367c
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
page_type: f0(buddy)
raw: 00fff00000000000 ffffea0001492e88 ffffea0001d9bb88 0000000000000000
raw: 000000020000008a 0000000000000001 00000000f0000000 0000000000000000
page dumped because: kasan: bad access detected
page_owner tracks the page as freed
page last allocated via order 0, migratetype Movable, gfp_mask 0x140dca(GFP_HIGHUSER_MOVABLE|__GFP_ZERO|__GFP_COMP), pid 6725, tgid 6723 (syz.6.155), ts 164155504115, free_ts 166396649720
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x153/0x170 mm/page_alloc.c:1889
prep_new_page mm/page_alloc.c:1897 [inline]
get_page_from_freelist+0x111d/0x3140 mm/page_alloc.c:3962
__alloc_frozen_pages_noprof+0x27c/0x2ba0 mm/page_alloc.c:5250
alloc_pages_mpol+0x1fb/0x550 mm/mempolicy.c:2484
folio_alloc_mpol_noprof+0x36/0x340 mm/mempolicy.c:2503
vma_alloc_folio_noprof+0xed/0x1d0 mm/mempolicy.c:2538
folio_prealloc mm/memory.c:1204 [inline]
wp_page_copy mm/memory.c:3780 [inline]
do_wp_page+0xf28/0x4f00 mm/memory.c:4241
handle_pte_fault mm/memory.c:6333 [inline]
__handle_mm_fault+0x1ac8/0x2b60 mm/memory.c:6455
handle_mm_fault+0x36d/0xa20 mm/memory.c:6624
do_user_addr_fault+0x74c/0x12f0 arch/x86/mm/fault.c:1385
handle_page_fault arch/x86/mm/fault.c:1474 [inline]
exc_page_fault+0x6f/0xd0 arch/x86/mm/fault.c:1527
asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:618
page last free pid 6725 tgid 6723 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
__free_pages_prepare mm/page_alloc.c:1433 [inline]
free_unref_folios+0xaea/0x1790 mm/page_alloc.c:3040
folios_put_refs+0x53c/0x840 mm/swap.c:1002
free_pages_and_swap_cache+0x242/0x480 mm/swap_state.c:423
__tlb_batch_free_encoded_pages+0xe9/0x280 mm/mmu_gather.c:138
tlb_batch_pages_flush mm/mmu_gather.c:151 [inline]
tlb_flush_mmu_free mm/mmu_gather.c:398 [inline]
tlb_flush_mmu+0xe9/0x590 mm/mmu_gather.c:405
zap_pte_range mm/memory.c:1968 [inline]
zap_pmd_range mm/memory.c:2021 [inline]
zap_pud_range mm/memory.c:2049 [inline]
zap_p4d_range mm/memory.c:2070 [inline]
unmap_page_range+0x2333/0x4840 mm/memory.c:2091
unmap_single_vma+0x153/0x240 mm/memory.c:2133
unmap_vmas+0x295/0x590 mm/memory.c:2171
exit_mmap+0x1ef/0xa30 mm/mmap.c:1302
__mmput+0x12a/0x410 kernel/fork.c:1174
mmput+0x67/0x80 kernel/fork.c:1197
exit_mm kernel/exit.c:581 [inline]
do_exit+0x819/0x2b60 kernel/exit.c:964
do_group_exit+0xd5/0x2a0 kernel/exit.c:1118
get_signal+0x1ec7/0x21e0 kernel/signal.c:3034
arch_do_signal_or_restart+0x91/0x7a0 arch/x86/kernel/signal.c:337
__exit_to_user_mode_loop kernel/entry/common.c:64 [inline]
exit_to_user_mode_loop+0x86/0x4a0 kernel/entry/common.c:98
Memory state around the buggy address:
ffff88805367bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
ffff88805367bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
>ffff88805367c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
^
ffff88805367c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
ffff88805367c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
==================================================================
==================================================================
BUG: KASAN: use-after-free in strcmp+0xa7/0xb0 lib/string.c:283
Read of size 1 at addr ffff88805367c00f by task syz.5.165/6773
CPU: 0 UID: 0 PID: 6773 Comm: syz.5.165 Tainted: G B syzkaller #0 PREEMPT(full)
Tainted: [B]=BAD_PAGE
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x100/0x190 lib/dump_stack.c:120
print_address_description mm/kasan/report.c:378 [inline]
print_report+0x156/0x4c9 mm/kasan/report.c:482
kasan_report+0xdf/0x1e0 mm/kasan/report.c:595
strcmp+0xa7/0xb0 lib/string.c:283
hpfs_get_ea+0x1fa/0xc20 fs/hpfs/ea.c:139
hpfs_read_inode+0x706/0x11c0 fs/hpfs/inode.c:63
hpfs_fill_super+0x1202/0x1f20 fs/hpfs/super.c:651
get_tree_bdev_flags+0x38c/0x620 fs/super.c:1694
vfs_get_tree+0x92/0x320 fs/super.c:1754
fc_mount fs/namespace.c:1193 [inline]
do_new_mount_fc fs/namespace.c:3763 [inline]
do_new_mount fs/namespace.c:3839 [inline]
path_mount+0x7d0/0x23d0 fs/namespace.c:4159
do_mount fs/namespace.c:4172 [inline]
__do_sys_mount fs/namespace.c:4361 [inline]
__se_sys_mount fs/namespace.c:4338 [inline]
__x64_sys_mount+0x293/0x310 fs/namespace.c:4338
do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
do_syscall_64+0x106/0xf80 arch/x86/entry/syscall_64.c:94
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fcdeaf9da0a
Code: 48 c7 c2 e8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fcdebec7e58 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
RAX: ffffffffffffffda RBX: 00007fcdebec7ee0 RCX: 00007fcdeaf9da0a
RDX: 000020000000a000 RSI: 0000200000009ec0 RDI: 00007fcdebec7ea0
RBP: 000020000000a000 R08: 00007fcdebec7ee0 R09: 0000000003a00041
R10: 0000000003a00041 R11: 0000000000000246 R12: 0000200000009ec0
R13: 00007fcdebec7ea0 R14: 0000000000009e22 R15: 0000200000000340
The buggy address belongs to the physical page:
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x20000008a pfn:0x5367c
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
page_type: f0(buddy)
raw: 00fff00000000000 ffffea0001492e88 ffffea0001d9bb88 0000000000000000
raw: 000000020000008a 0000000000000001 00000000f0000000 0000000000000000
page dumped because: kasan: bad access detected
page_owner tracks the page as freed
page last allocated via order 0, migratetype Movable, gfp_mask 0x140dca(GFP_HIGHUSER_MOVABLE|__GFP_ZERO|__GFP_COMP), pid 6725, tgid 6723 (syz.6.155), ts 164155504115, free_ts 166396649720
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x153/0x170 mm/page_alloc.c:1889
prep_new_page mm/page_alloc.c:1897 [inline]
get_page_from_freelist+0x111d/0x3140 mm/page_alloc.c:3962
__alloc_frozen_pages_noprof+0x27c/0x2ba0 mm/page_alloc.c:5250
alloc_pages_mpol+0x1fb/0x550 mm/mempolicy.c:2484
folio_alloc_mpol_noprof+0x36/0x340 mm/mempolicy.c:2503
vma_alloc_folio_noprof+0xed/0x1d0 mm/mempolicy.c:2538
folio_prealloc mm/memory.c:1204 [inline]
wp_page_copy mm/memory.c:3780 [inline]
do_wp_page+0xf28/0x4f00 mm/memory.c:4241
handle_pte_fault mm/memory.c:6333 [inline]
__handle_mm_fault+0x1ac8/0x2b60 mm/memory.c:6455
handle_mm_fault+0x36d/0xa20 mm/memory.c:6624
do_user_addr_fault+0x74c/0x12f0 arch/x86/mm/fault.c:1385
handle_page_fault arch/x86/mm/fault.c:1474 [inline]
exc_page_fault+0x6f/0xd0 arch/x86/mm/fault.c:1527
asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:618
page last free pid 6725 tgid 6723 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
__free_pages_prepare mm/page_alloc.c:1433 [inline]
free_unref_folios+0xaea/0x1790 mm/page_alloc.c:3040
folios_put_refs+0x53c/0x840 mm/swap.c:1002
free_pages_and_swap_cache+0x242/0x480 mm/swap_state.c:423
__tlb_batch_free_encoded_pages+0xe9/0x280 mm/mmu_gather.c:138
tlb_batch_pages_flush mm/mmu_gather.c:151 [inline]
tlb_flush_mmu_free mm/mmu_gather.c:398 [inline]
tlb_flush_mmu+0xe9/0x590 mm/mmu_gather.c:405
zap_pte_range mm/memory.c:1968 [inline]
zap_pmd_range mm/memory.c:2021 [inline]
zap_pud_range mm/memory.c:2049 [inline]
zap_p4d_range mm/memory.c:2070 [inline]
unmap_page_range+0x2333/0x4840 mm/memory.c:2091
unmap_single_vma+0x153/0x240 mm/memory.c:2133
unmap_vmas+0x295/0x590 mm/memory.c:2171
exit_mmap+0x1ef/0xa30 mm/mmap.c:1302
__mmput+0x12a/0x410 kernel/fork.c:1174
mmput+0x67/0x80 kernel/fork.c:1197
exit_mm kernel/exit.c:581 [inline]
do_exit+0x819/0x2b60 kernel/exit.c:964
do_group_exit+0xd5/0x2a0 kernel/exit.c:1118
get_signal+0x1ec7/0x21e0 kernel/signal.c:3034
arch_do_signal_or_restart+0x91/0x7a0 arch/x86/kernel/signal.c:337
__exit_to_user_mode_loop kernel/entry/common.c:64 [inline]
exit_to_user_mode_loop+0x86/0x4a0 kernel/entry/common.c:98
Memory state around the buggy address:
ffff88805367bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
ffff88805367bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
>ffff88805367c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
^
ffff88805367c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
ffff88805367c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
==================================================================
==================================================================
BUG: KASAN: use-after-free in next_ea fs/hpfs/hpfs_fn.h:152 [inline]
BUG: KASAN: use-after-free in hpfs_get_ea+0xb0d/0xc20 fs/hpfs/ea.c:138
Read of size 1 at addr ffff88805367c00c by task syz.5.165/6773
CPU: 0 UID: 0 PID: 6773 Comm: syz.5.165 Tainted: G B syzkaller #0 PREEMPT(full)
Tainted: [B]=BAD_PAGE
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x100/0x190 lib/dump_stack.c:120
print_address_description mm/kasan/report.c:378 [inline]
print_report+0x156/0x4c9 mm/kasan/report.c:482
kasan_report+0xdf/0x1e0 mm/kasan/report.c:595
next_ea fs/hpfs/hpfs_fn.h:152 [inline]
hpfs_get_ea+0xb0d/0xc20 fs/hpfs/ea.c:138
hpfs_read_inode+0x706/0x11c0 fs/hpfs/inode.c:63
hpfs_fill_super+0x1202/0x1f20 fs/hpfs/super.c:651
get_tree_bdev_flags+0x38c/0x620 fs/super.c:1694
vfs_get_tree+0x92/0x320 fs/super.c:1754
fc_mount fs/namespace.c:1193 [inline]
do_new_mount_fc fs/namespace.c:3763 [inline]
do_new_mount fs/namespace.c:3839 [inline]
path_mount+0x7d0/0x23d0 fs/namespace.c:4159
do_mount fs/namespace.c:4172 [inline]
__do_sys_mount fs/namespace.c:4361 [inline]
__se_sys_mount fs/namespace.c:4338 [inline]
__x64_sys_mount+0x293/0x310 fs/namespace.c:4338
do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
do_syscall_64+0x106/0xf80 arch/x86/entry/syscall_64.c:94
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fcdeaf9da0a
Code: 48 c7 c2 e8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fcdebec7e58 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
RAX: ffffffffffffffda RBX: 00007fcdebec7ee0 RCX: 00007fcdeaf9da0a
RDX: 000020000000a000 RSI: 0000200000009ec0 RDI: 00007fcdebec7ea0
RBP: 000020000000a000 R08: 00007fcdebec7ee0 R09: 0000000003a00041
R10: 0000000003a00041 R11: 0000000000000246 R12: 0000200000009ec0
R13: 00007fcdebec7ea0 R14: 0000000000009e22 R15: 0000200000000340
The buggy address belongs to the physical page:
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x20000008a pfn:0x5367c
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
page_type: f0(buddy)
raw: 00fff00000000000 ffffea0001492e88 ffffea0001d9bb88 0000000000000000
raw: 000000020000008a 0000000000000001 00000000f0000000 0000000000000000
page dumped because: kasan: bad access detected
page_owner tracks the page as freed
page last allocated via order 0, migratetype Movable, gfp_mask 0x140dca(GFP_HIGHUSER_MOVABLE|__GFP_ZERO|__GFP_COMP), pid 6725, tgid 6723 (syz.6.155), ts 164155504115, free_ts 166396649720
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x153/0x170 mm/page_alloc.c:1889
prep_new_page mm/page_alloc.c:1897 [inline]
get_page_from_freelist+0x111d/0x3140 mm/page_alloc.c:3962
__alloc_frozen_pages_noprof+0x27c/0x2ba0 mm/page_alloc.c:5250
alloc_pages_mpol+0x1fb/0x550 mm/mempolicy.c:2484
folio_alloc_mpol_noprof+0x36/0x340 mm/mempolicy.c:2503
vma_alloc_folio_noprof+0xed/0x1d0 mm/mempolicy.c:2538
folio_prealloc mm/memory.c:1204 [inline]
wp_page_copy mm/memory.c:3780 [inline]
do_wp_page+0xf28/0x4f00 mm/memory.c:4241
handle_pte_fault mm/memory.c:6333 [inline]
__handle_mm_fault+0x1ac8/0x2b60 mm/memory.c:6455
handle_mm_fault+0x36d/0xa20 mm/memory.c:6624
do_user_addr_fault+0x74c/0x12f0 arch/x86/mm/fault.c:1385
handle_page_fault arch/x86/mm/fault.c:1474 [inline]
exc_page_fault+0x6f/0xd0 arch/x86/mm/fault.c:1527
asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:618
page last free pid 6725 tgid 6723 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
__free_pages_prepare mm/page_alloc.c:1433 [inline]
free_unref_folios+0xaea/0x1790 mm/page_alloc.c:3040
folios_put_refs+0x53c/0x840 mm/swap.c:1002
free_pages_and_swap_cache+0x242/0x480 mm/swap_state.c:423
__tlb_batch_free_encoded_pages+0xe9/0x280 mm/mmu_gather.c:138
tlb_batch_pages_flush mm/mmu_gather.c:151 [inline]
tlb_flush_mmu_free mm/mmu_gather.c:398 [inline]
tlb_flush_mmu+0xe9/0x590 mm/mmu_gather.c:405
zap_pte_range mm/memory.c:1968 [inline]
zap_pmd_range mm/memory.c:2021 [inline]
zap_pud_range mm/memory.c:2049 [inline]
zap_p4d_range mm/memory.c:2070 [inline]
unmap_page_range+0x2333/0x4840 mm/memory.c:2091
unmap_single_vma+0x153/0x240 mm/memory.c:2133
unmap_vmas+0x295/0x590 mm/memory.c:2171
exit_mmap+0x1ef/0xa30 mm/mmap.c:1302
__mmput+0x12a/0x410 kernel/fork.c:1174
mmput+0x67/0x80 kernel/fork.c:1197
exit_mm kernel/exit.c:581 [inline]
do_exit+0x819/0x2b60 kernel/exit.c:964
do_group_exit+0xd5/0x2a0 kernel/exit.c:1118
get_signal+0x1ec7/0x21e0 kernel/signal.c:3034
arch_do_signal_or_restart+0x91/0x7a0 arch/x86/kernel/signal.c:337
__exit_to_user_mode_loop kernel/entry/common.c:64 [inline]
exit_to_user_mode_loop+0x86/0x4a0 kernel/entry/common.c:98
Memory state around the buggy address:
ffff88805367bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
ffff88805367bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
>ffff88805367c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
^
ffff88805367c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
ffff88805367c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
==================================================================
==================================================================
BUG: KASAN: use-after-free in ea_valuelen fs/hpfs/hpfs_fn.h:147 [inline]
BUG: KASAN: use-after-free in next_ea fs/hpfs/hpfs_fn.h:152 [inline]
BUG: KASAN: use-after-free in hpfs_get_ea+0xae2/0xc20 fs/hpfs/ea.c:138
Read of size 1 at addr ffff88805367c00d by task syz.5.165/6773
CPU: 0 UID: 0 PID: 6773 Comm: syz.5.165 Tainted: G B syzkaller #0 PREEMPT(full)
Tainted: [B]=BAD_PAGE
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x100/0x190 lib/dump_stack.c:120
print_address_description mm/kasan/report.c:378 [inline]
print_report+0x156/0x4c9 mm/kasan/report.c:482
kasan_report+0xdf/0x1e0 mm/kasan/report.c:595
ea_valuelen fs/hpfs/hpfs_fn.h:147 [inline]
next_ea fs/hpfs/hpfs_fn.h:152 [inline]
hpfs_get_ea+0xae2/0xc20 fs/hpfs/ea.c:138
hpfs_read_inode+0x706/0x11c0 fs/hpfs/inode.c:63
hpfs_fill_super+0x1202/0x1f20 fs/hpfs/super.c:651
get_tree_bdev_flags+0x38c/0x620 fs/super.c:1694
vfs_get_tree+0x92/0x320 fs/super.c:1754
fc_mount fs/namespace.c:1193 [inline]
do_new_mount_fc fs/namespace.c:3763 [inline]
do_new_mount fs/namespace.c:3839 [inline]
path_mount+0x7d0/0x23d0 fs/namespace.c:4159
do_mount fs/namespace.c:4172 [inline]
__do_sys_mount fs/namespace.c:4361 [inline]
__se_sys_mount fs/namespace.c:4338 [inline]
__x64_sys_mount+0x293/0x310 fs/namespace.c:4338
do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
do_syscall_64+0x106/0xf80 arch/x86/entry/syscall_64.c:94
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fcdeaf9da0a
Code: 48 c7 c2 e8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fcdebec7e58 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
RAX: ffffffffffffffda RBX: 00007fcdebec7ee0 RCX: 00007fcdeaf9da0a
RDX: 000020000000a000 RSI: 0000200000009ec0 RDI: 00007fcdebec7ea0
RBP: 000020000000a000 R08: 00007fcdebec7ee0 R09: 0000000003a00041
R10: 0000000003a00041 R11: 0000000000000246 R12: 0000200000009ec0
R13: 00007fcdebec7ea0 R14: 0000000000009e22 R15: 0000200000000340
The buggy address belongs to the physical page:
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x20000008a pfn:0x5367c
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
page_type: f0(buddy)
raw: 00fff00000000000 ffffea0001492e88 ffffea0001d9bb88 0000000000000000
raw: 000000020000008a 0000000000000001 00000000f0000000 0000000000000000
page dumped because: kasan: bad access detected
page_owner tracks the page as freed
page last allocated via order 0, migratetype Movable, gfp_mask 0x140dca(GFP_HIGHUSER_MOVABLE|__GFP_ZERO|__GFP_COMP), pid 6725, tgid 6723 (syz.6.155), ts 164155504115, free_ts 166396649720
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x153/0x170 mm/page_alloc.c:1889
prep_new_page mm/page_alloc.c:1897 [inline]
get_page_from_freelist+0x111d/0x3140 mm/page_alloc.c:3962
__alloc_frozen_pages_noprof+0x27c/0x2ba0 mm/page_alloc.c:5250
alloc_pages_mpol+0x1fb/0x550 mm/mempolicy.c:2484
folio_alloc_mpol_noprof+0x36/0x340 mm/mempolicy.c:2503
vma_alloc_folio_noprof+0xed/0x1d0 mm/mempolicy.c:2538
folio_prealloc mm/memory.c:1204 [inline]
wp_page_copy mm/memory.c:3780 [inline]
do_wp_page+0xf28/0x4f00 mm/memory.c:4241
handle_pte_fault mm/memory.c:6333 [inline]
__handle_mm_fault+0x1ac8/0x2b60 mm/memory.c:6455
handle_mm_fault+0x36d/0xa20 mm/memory.c:6624
do_user_addr_fault+0x74c/0x12f0 arch/x86/mm/fault.c:1385
handle_page_fault arch/x86/mm/fault.c:1474 [inline]
exc_page_fault+0x6f/0xd0 arch/x86/mm/fault.c:1527
asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:618
page last free pid 6725 tgid 6723 stack trace:
reset_page_owner include/linux/page_owner.h:25 [inline]
__free_pages_prepare mm/page_alloc.c:1433 [inline]
free_unref_folios+0xaea/0x1790 mm/page_alloc.c:3040
folios_put_refs+0x53c/0x840 mm/swap.c:1002
free_pages_and_swap_cache+0x242/0x480 mm/swap_state.c:423
__tlb_batch_free_encoded_pages+0xe9/0x280 mm/mmu_gather.c:138
tlb_batch_pages_flush mm/mmu_gather.c:151 [inline]
tlb_flush_mmu_free mm/mmu_gather.c:398 [inline]
tlb_flush_mmu+0xe9/0x590 mm/mmu_gather.c:405
zap_pte_range mm/memory.c:1968 [inline]
zap_pmd_range mm/memory.c:2021 [inline]
zap_pud_range mm/memory.c:2049 [inline]
zap_p4d_range mm/memory.c:2070 [inline]
unmap_page_range+0x2333/0x4840 mm/memory.c:2091
unmap_single_vma+0x153/0x240 mm/memory.c:2133
unmap_vmas+0x295/0x590 mm/memory.c:2171
exit_mmap+0x1ef/0xa30 mm/mmap.c:1302
__mmput+0x12a/0x410 kernel/fork.c:1174
mmput+0x67/0x80 kernel/fork.c:1197
exit_mm kernel/exit.c:581 [inline]
do_exit+0x819/0x2b60 kernel/exit.c:964
do_group_exit+0xd5/0x2a0 kernel/exit.c:1118
get_signal+0x1ec7/0x21e0 kernel/signal.c:3034
arch_do_signal_or_restart+0x91/0x7a0 arch/x86/kernel/signal.c:337
__exit_to_user_mode_loop kernel/entry/common.c:64 [inline]
exit_to_user_mode_loop+0x86/0x4a0 kernel/entry/common.c:98
Memory state around the buggy address:
ffff88805367bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
ffff88805367bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
>ffff88805367c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
^
ffff88805367c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
ffff88805367c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
==================================================================
==================================================================
BUG: KASAN: use-after-free in ea_valuelen fs/hpfs/hpfs_fn.h:147 [inline]
BUG: KASAN: use-after-free in next_ea fs/hpfs/hpfs_fn.h:152 [inline]
BUG: KASAN: use-after-free in hpfs_get_ea+0xafa/0xc20 fs/hpfs/ea.c:138
Read of size 1 at addr ffff88805367c00e by task syz.5.165/6773
CPU: 0 UID: 0 PID: 6773 Comm: syz.5.165 Tainted: G B syzkaller #0 PREEMPT(full)
Tainted: [B]=BAD_PAGE
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x100/0x190 lib/dump_stack.c:120
print_address_description mm/kasan/report.c:378 [inline]
print_report+0x156/0x4c9 mm/kasan/report.c:482
kasan_report+0xdf/0x1e0 mm/kasan/report.c:595
ea_valuelen fs/hpfs/hpfs_fn.h:147 [inline]
next_ea fs/hpfs/hpfs_fn.h:152 [inline]
hpfs_get_ea+0xafa/0xc20 fs/hpfs/ea.c:138
hpfs_read_inode+0x706/0x11c0 fs/hpfs/inode.c:63
hpfs_fill_super+0x1202/0x1f20 fs/hpfs/super.c:651
get_tree_bdev_flags+0x38c/0x620 fs/super.c:1694
vfs_get_tree+0x92/0x320 fs/super.c:1754
fc_mount fs/namespace.c:1193 [inline]
do_new_mount_fc fs/namespace.c:3763 [inline]
do_new_mount fs/namespace.c:3839 [inline]
path_mount+0x7d0/0x23d0 fs/namespace.c:4159
do_mount fs/namespace.c:4172 [inline]
__do_sys_mount fs/namespace.c:4361 [inline]
__se_sys_mount fs/namespace.c:4338 [inline]
__x64_sys_mount+0x293/0x310 fs/namespace.c:4338
do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
do_syscall_64+0x106/0xf80 arch/x86/entry/syscall_64.c:94
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fcdeaf9da0a
Code: 48 c7 c2 e8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fcdebec7e58 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
RAX: ffffffffffffffda RBX: 00007fcdebec7ee0 RCX: 00007fcdeaf9da0a
RDX: 000020000000a000 RSI: 0000200000009ec0 RDI: 00007fcdebec7ea0
RBP: 000020000000a000 R08: 00007fcdebec7ee0 R09: 0000000003a00041
R10: 0000000003a00041 R11: 0000000000000246 R12: 0000200000009ec0
R13: 00007fcdebec7ea0 R14: 0000000000009e22 R15: 0000200000000340
The buggy address belongs to the physical page:
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x20000008a pfn:0x5367c
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
page_type: f0(buddy)