================================================================== BUG: KASAN: use-after-free in le32_add_cpu include/linux/byteorder/generic.h:151 [inline] BUG: KASAN: use-after-free in udf_add_fid_counter fs/udf/namei.c:-1 [inline] BUG: KASAN: use-after-free in udf_unlink+0x5e3/0x6d0 fs/udf/namei.c:565 Read of size 4 at addr ffff8880b10d07d0 by task syz-executor/5883 CPU: 0 PID: 5883 Comm: syz-executor Not tainted syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 Call Trace: dump_stack_lvl+0x16c/0x230 lib/dump_stack.c:106 print_address_description mm/kasan/report.c:364 [inline] print_report+0xac/0x220 mm/kasan/report.c:468 kasan_report+0x117/0x150 mm/kasan/report.c:581 le32_add_cpu include/linux/byteorder/generic.h:151 [inline] udf_add_fid_counter fs/udf/namei.c:-1 [inline] udf_unlink+0x5e3/0x6d0 fs/udf/namei.c:565 vfs_unlink+0x389/0x600 fs/namei.c:4333 do_unlinkat+0x328/0x570 fs/namei.c:4399 __do_sys_unlink fs/namei.c:4447 [inline] __se_sys_unlink fs/namei.c:4445 [inline] __x64_sys_unlink+0x49/0x50 fs/namei.c:4445 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x55/0xb0 arch/x86/entry/common.c:81 entry_SYSCALL_64_after_hwframe+0x68/0xd2 RIP: 0033:0x7f093f78ecf7 Code: 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 57 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fffd1c59538 EFLAGS: 00000206 ORIG_RAX: 0000000000000057 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f093f78ecf7 RDX: 00007fffd1c59560 RSI: 00007fffd1c595f0 RDI: 00007fffd1c595f0 RBP: 00007fffd1c595f0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000100 R11: 0000000000000206 R12: 00007fffd1c5a6e0 R13: 00007f093f813d7d R14: 0000000000018f10 R15: 00007fffd1c5c8a0 The buggy address belongs to the physical page: page:ffffea0002c43400 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xb10d0 flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff) page_type: 0xffffffff() raw: 00fff00000000000 ffffea0002c43408 ffffea0002c43408 0000000000000000 raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 page dumped because: kasan: bad access detected page_owner info is not present (never set?) Memory state around the buggy address: ffff8880b10d0680: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff8880b10d0700: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff >ffff8880b10d0780: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ^ ffff8880b10d0800: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff8880b10d0880: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ==================================================================