================================================================== BUG: KASAN: slab-out-of-bounds in class_equal+0x40/0x50 kernel/locking/lockdep.c:1527 Read of size 8 at addr ffff888086037440 by task syz-executor.1/10102 CPU: 1 PID: 10102 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #34 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: Allocated by task 9813: save_stack+0x23/0x90 mm/kasan/common.c:71 set_track mm/kasan/common.c:79 [inline] __kasan_kmalloc mm/kasan/common.c:489 [inline] __kasan_kmalloc.constprop.0+0xcf/0xe0 mm/kasan/common.c:462 kasan_kmalloc+0x9/0x10 mm/kasan/common.c:503 __do_kmalloc mm/slab.c:3660 [inline] __kmalloc+0x15c/0x740 mm/slab.c:3669 kmalloc_array include/linux/slab.h:670 [inline] batadv_hash_new+0xaf/0x2f0 net/batman-adv/hash.c:56 batadv_tt_global_init net/batman-adv/translation-table.c:1492 [inline] batadv_tt_init+0x26a/0x330 net/batman-adv/translation-table.c:4403 batadv_mesh_init+0x4f5/0x700 net/batman-adv/main.c:208 batadv_softif_init_late+0xc27/0xea0 net/batman-adv/soft-interface.c:861 register_netdevice+0x2fd/0xff0 net/core/dev.c:8663 __rtnl_newlink+0x146b/0x16c0 net/core/rtnetlink.c:3199 rtnl_newlink+0x69/0xa0 net/core/rtnetlink.c:3245 rtnetlink_rcv_msg+0x463/0xb00 net/core/rtnetlink.c:5214 netlink_rcv_skb+0x177/0x450 net/netlink/af_netlink.c:2482 rtnetlink_rcv+0x1d/0x30 net/core/rtnetlink.c:5232 netlink_unicast_kernel net/netlink/af_netlink.c:1307 [inline] netlink_unicast+0x531/0x710 net/netlink/af_netlink.c:1333 netlink_sendmsg+0x8ae/0xd70 net/netlink/af_netlink.c:1922 sock_sendmsg_nosec net/socket.c:646 [inline] sock_sendmsg+0xd7/0x130 net/socket.c:665 __sys_sendto+0x262/0x380 net/socket.c:1958 __do_sys_sendto net/socket.c:1970 [inline] __se_sys_sendto net/socket.c:1966 [inline] __x64_sys_sendto+0xe1/0x1a0 net/socket.c:1966 do_syscall_64+0xfd/0x680 arch/x86/entry/common.c:301 entry_SYSCALL_64_after_hwframe+0x49/0xbe Freed by task 0: (stack is not available) The buggy address belongs to the object at ffff888086020380 which belongs to the cache kmalloc-64k of size 65536 The buggy address is located 28864 bytes to the right of 65536-byte region [ffff888086020380, ffff888086030380) The buggy address belongs to the page: page:ffffea0002180800 refcount:1 mapcount:0 mapping:ffff8880aa402500 index:0x0 compound_mapcount: 0 flags: 0x1fffc0000010200(slab|head) raw: 01fffc0000010200 ffffea0002179008 ffffea0002153808 ffff8880aa402500 raw: 0000000000000000 ffff888086020380 0000000100000001 0000000000000000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff888086037300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ffff888086037380: fc fc fc fc fc fc fc fc fc fc f1 f1 f1 f1 00 f2 >ffff888086037400: f2 f2 00 f2 f2 f2 fc fc fc fc 00 00 00 f3 f3 f3 ^ ffff888086037480: f3 f3 fc fc fc fc fc fc fc fc fc fc fc fc fc fc ffff888086037500: fc fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 ==================================================================