================================================================== BUG: KASAN: slab-out-of-bounds in class_equal+0x40/0x50 kernel/locking/lockdep.c:1527 Read of size 8 at addr ffff888086786d80 by task syz-executor.5/9320 CPU: 0 PID: 9320 Comm: syz-executor.5 Not tainted 5.2.0-rc6+ #34 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: Allocated by task 0: (stack is not available) Freed by task 0: (stack is not available) The buggy address belongs to the object at ffff888086786840 which belongs to the cache UDP of size 1536 The buggy address is located 1344 bytes inside of 1536-byte region [ffff888086786840, ffff888086786e40) The buggy address belongs to the page: page:ffffea000219e180 refcount:1 mapcount:0 mapping:ffff88821b2cddc0 index:0xffff8880867861c0 compound_mapcount: 0 flags: 0x1fffc0000010200(slab|head) raw: 01fffc0000010200 ffffea00025dd288 ffffea0002983208 ffff88821b2cddc0 raw: ffff8880867861c0 ffff8880867861c0 0000000100000002 0000000000000000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff888086786c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ffff888086786d00: fc fc f1 f1 f1 f1 00 f2 f2 f2 00 f2 f2 f2 fc fc >ffff888086786d80: fc fc 00 00 00 f3 f3 f3 f3 f3 fc fc fc fc fc fc ^ ffff888086786e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ffff888086786e80: fc fc 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ==================================================================