================================================================== BUG: KASAN: use-after-free in le32_add_cpu include/linux/byteorder/generic.h:151 [inline] BUG: KASAN: use-after-free in udf_add_fid_counter fs/udf/namei.c:-1 [inline] BUG: KASAN: use-after-free in udf_unlink+0x5c8/0x6c0 fs/udf/namei.c:561 Read of size 4 at addr ffff888080515200 by task syz-executor/6342 CPU: 0 UID: 0 PID: 6342 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 Call Trace: dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:378 [inline] print_report+0xca/0x240 mm/kasan/report.c:482 kasan_report+0x118/0x150 mm/kasan/report.c:595 le32_add_cpu include/linux/byteorder/generic.h:151 [inline] udf_add_fid_counter fs/udf/namei.c:-1 [inline] udf_unlink+0x5c8/0x6c0 fs/udf/namei.c:561 vfs_unlink+0x394/0x650 fs/namei.c:4586 do_unlinkat+0x345/0x560 fs/namei.c:4650 __do_sys_unlink fs/namei.c:4696 [inline] __se_sys_unlink fs/namei.c:4694 [inline] __x64_sys_unlink+0x47/0x50 fs/namei.c:4694 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x8a/0x300 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x76/0x7e RIP: 0033:0x7fbc95f8e197 Code: 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 57 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffe598e1318 EFLAGS: 00000206 ORIG_RAX: 0000000000000057 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fbc95f8e197 RDX: 00007ffe598e1340 RSI: 00007ffe598e13d0 RDI: 00007ffe598e13d0 RBP: 00007ffe598e13d0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000100 R11: 0000000000000206 R12: 00007ffe598e24c0 R13: 00007fbc96011c05 R14: 0000000000020257 R15: 00007ffe598e4680 The buggy address belongs to the physical page: page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x80515 flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff) raw: 00fff00000000000 ffffea0002014548 ffffea0002014548 0000000000000000 raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 page dumped because: kasan: bad access detected page_owner info is not present (never set?) Memory state around the buggy address: ffff888080515100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff888080515180: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff >ffff888080515200: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ^ ffff888080515280: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff888080515300: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ==================================================================