================================================================== BUG: KASAN: use-after-free in class_equal+0x40/0x50 kernel/locking/lockdep.c:1527 Read of size 8 at addr ffff8880a9194930 by task syz-executor.2/10035 CPU: 0 PID: 10035 Comm: syz-executor.2 Not tainted 5.2.0-rc3+ #15 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: Allocated by task 0: (stack is not available) Freed by task 0: (stack is not available) The buggy address belongs to the object at ffff8880a9194900 which belongs to the cache cred_jar of size 184 The buggy address is located 48 bytes inside of 184-byte region [ffff8880a9194900, ffff8880a91949b8) The buggy address belongs to the page: page:ffffea0002a46500 refcount:1 mapcount:0 mapping:ffff8880aa587900 index:0xffff8880a9194f00 flags: 0x1fffc0000000200(slab) raw: 01fffc0000000200 ffffea00024383c8 ffffea00028e6948 ffff8880aa587900 raw: ffff8880a9194f00 ffff8880a9194000 000000010000000d 0000000000000000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff8880a9194800: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ffff8880a9194880: fb fb fb fb fb fb fb fc f1 f1 f1 f1 00 f2 f2 f2 >ffff8880a9194900: 00 f2 f2 f2 fb fb fb fb 00 00 00 f3 f3 f3 f3 f3 ^ ffff8880a9194980: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc ffff8880a9194a00: fb fb fb fb fb fb fb 00 00 00 00 00 00 00 00 fb ==================================================================