================================================================== BUG: KASAN: use-after-free in le32_add_cpu include/linux/byteorder/generic.h:151 [inline] BUG: KASAN: use-after-free in udf_add_fid_counter fs/udf/namei.c:-1 [inline] BUG: KASAN: use-after-free in udf_unlink+0x5c4/0x6b0 fs/udf/namei.c:561 Read of size 4 at addr ffff888096b66080 by task syz-executor/6450 CPU: 1 UID: 0 PID: 6450 Comm: syz-executor Not tainted 6.16.0-rc3-syzkaller-00059-gc4dce0c094a8 #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 Call Trace: dump_stack_lvl+0x185/0x250 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:408 [inline] print_report+0xc2/0x2a0 mm/kasan/report.c:521 kasan_report+0x114/0x150 mm/kasan/report.c:634 le32_add_cpu include/linux/byteorder/generic.h:151 [inline] udf_add_fid_counter fs/udf/namei.c:-1 [inline] udf_unlink+0x5c4/0x6b0 fs/udf/namei.c:561 vfs_unlink+0x390/0x650 fs/namei.c:4595 do_unlinkat+0x34c/0x560 fs/namei.c:4659 __do_sys_unlink fs/namei.c:4705 [inline] __se_sys_unlink fs/namei.c:4703 [inline] __x64_sys_unlink+0x43/0x50 fs/namei.c:4703 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x86/0x2e0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x76/0x7e RIP: 0033:0x7fcfe8f8ded7 Code: 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 57 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffff4bc6098 EFLAGS: 00000206 ORIG_RAX: 0000000000000057 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fcfe8f8ded7 RDX: 00007ffff4bc60c0 RSI: 00007ffff4bc6150 RDI: 00007ffff4bc6150 RBP: 00007ffff4bc6150 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000100 R11: 0000000000000206 R12: 00007ffff4bc7240 R13: 00007fcfe9010925 R14: 00000000000246a0 R15: 00007ffff4bc9400 The buggy address belongs to the physical page: page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x96b66 flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff) raw: 00fff00000000000 ffffea00025ad988 ffffea00025ad988 0000000000000000 raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 page dumped because: kasan: bad access detected page_owner info is not present (never set?) Memory state around the buggy address: ffff888096b65f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff888096b66000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff >ffff888096b66080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ^ ffff888096b66100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff888096b66180: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ==================================================================