================================================================== BUG: KASAN: slab-out-of-bounds in class_equal+0x40/0x50 kernel/locking/lockdep.c:1527 Read of size 8 at addr ffff88807b76b930 by task syz-executor.1/8993 CPU: 0 PID: 8993 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #41 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: Allocated by task 8787: save_stack+0x23/0x90 mm/kasan/common.c:71 set_track mm/kasan/common.c:79 [inline] __kasan_kmalloc mm/kasan/common.c:489 [inline] __kasan_kmalloc.constprop.0+0xcf/0xe0 mm/kasan/common.c:462 kasan_kmalloc+0x9/0x10 mm/kasan/common.c:503 __do_kmalloc_node mm/slab.c:3620 [inline] __kmalloc_node+0x4e/0x70 mm/slab.c:3627 kmalloc_node include/linux/slab.h:590 [inline] kvmalloc_node+0x68/0x100 mm/util.c:431 kvmalloc include/linux/mm.h:648 [inline] seq_buf_alloc fs/seq_file.c:32 [inline] seq_read+0x817/0x1110 fs/seq_file.c:204 kernfs_fop_read+0xed/0x560 fs/kernfs/file.c:251 __vfs_read+0x8a/0x110 fs/read_write.c:425 vfs_read+0x194/0x3e0 fs/read_write.c:461 ksys_read+0x14f/0x290 fs/read_write.c:587 __do_sys_read fs/read_write.c:597 [inline] __se_sys_read fs/read_write.c:595 [inline] __x64_sys_read+0x73/0xb0 fs/read_write.c:595 do_syscall_64+0xfd/0x680 arch/x86/entry/common.c:301 entry_SYSCALL_64_after_hwframe+0x49/0xbe Freed by task 1379136256: ------------[ cut here ]------------ kernel BUG at mm/slab.c:4178! invalid opcode: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 8993 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #41 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:__check_heap_object+0xa5/0xb3 mm/slab.c:4178 Code: 2b 48 c7 c7 2d 0f 62 88 e8 98 b3 07 00 5d c3 41 8b 91 04 01 00 00 48 29 c7 48 39 d7 77 bd 48 01 d0 48 29 c8 4c 39 c0 72 b2 c3 <0f> 0b 48 c7 c7 2d 0f 62 88 e8 ac b8 07 00 44 89 e1 48 c7 c7 e8 0f RSP: 0018:ffff88807b76b1f0 EFLAGS: 00010046 RAX: 0000000000000001 RBX: 0000000000000001 RCX: 000000000000000c RDX: ffff88807b76a100 RSI: 0000000000000000 RDI: ffff88807b76b2e8 RBP: ffff88807b76b240 R08: 0000000000000001 R09: ffff8880aa400dc0 R10: 0000000000000fcc R11: 0000000000000000 R12: ffff88807b76b2e8 R13: ffffea0001edda80 R14: ffff88807b76b2e9 R15: 0000000000000001 FS: 0000555556fc1940(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffffff8bc24ed0 CR3: 000000009eec2000 CR4: 00000000001406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: Modules linked in: ---[ end trace 82e8554d1ebacf52 ]--- RIP: 0010:__check_heap_object+0xa5/0xb3 mm/slab.c:4178 Code: 2b 48 c7 c7 2d 0f 62 88 e8 98 b3 07 00 5d c3 41 8b 91 04 01 00 00 48 29 c7 48 39 d7 77 bd 48 01 d0 48 29 c8 4c 39 c0 72 b2 c3 <0f> 0b 48 c7 c7 2d 0f 62 88 e8 ac b8 07 00 44 89 e1 48 c7 c7 e8 0f RSP: 0018:ffff88807b76b1f0 EFLAGS: 00010046 RAX: 0000000000000001 RBX: 0000000000000001 RCX: 000000000000000c RDX: ffff88807b76a100 RSI: 0000000000000000 RDI: ffff88807b76b2e8 RBP: ffff88807b76b240 R08: 0000000000000001 R09: ffff8880aa400dc0 R10: 0000000000000fcc R11: 0000000000000000 R12: ffff88807b76b2e8 R13: ffffea0001edda80 R14: ffff88807b76b2e9 R15: 0000000000000001 FS: 0000555556fc1940(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffffff8bc24ed0 CR3: 000000009eec2000 CR4: 00000000001406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400