================================================================== BUG: KASAN: use-after-free in udf_unlink+0x689/0x780 fs/udf/namei.c:561 Read of size 4 at addr ffff888090e4fab0 by task syz-executor/6431 CPU: 0 UID: 0 PID: 6431 Comm: syz-executor Not tainted 6.13.0-rc6-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:378 [inline] print_report+0x169/0x550 mm/kasan/report.c:489 kasan_report+0x143/0x180 mm/kasan/report.c:602 udf_unlink+0x689/0x780 fs/udf/namei.c:561 vfs_unlink+0x365/0x650 fs/namei.c:4523 do_unlinkat+0x4ae/0x830 fs/namei.c:4587 __do_sys_unlink fs/namei.c:4635 [inline] __se_sys_unlink fs/namei.c:4633 [inline] __x64_sys_unlink+0x47/0x50 fs/namei.c:4633 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0x82/0x160 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x76/0x7e RIP: 0033:0x7fd54e5852d7 Code: 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 57 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffc7c2cbf48 EFLAGS: 00000206 ORIG_RAX: 0000000000000057 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fd54e5852d7 RDX: 00007ffc7c2cbf70 RSI: 00007ffc7c2cc000 RDI: 00007ffc7c2cc000 RBP: 00007ffc7c2cc000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000100 R11: 0000000000000206 R12: 00007ffc7c2cd0f0 R13: 00007fd54e6018f4 R14: 00007ffc7c2cf2a0 R15: 0000000000000001 The buggy address belongs to the physical page: page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x90e4f flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff) raw: 00fff00000000000 ffffea00024393c8 ffffea00024393c8 0000000000000000 raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 page dumped because: kasan: bad access detected page_owner info is not present (never set?) Memory state around the buggy address: ffff888090e4f980: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff888090e4fa00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff >ffff888090e4fa80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ^ ffff888090e4fb00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff888090e4fb80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ==================================================================