================================================================== BUG: KASAN: use-after-free in class_equal+0x40/0x50 kernel/locking/lockdep.c:1527 Read of size 8 at addr ffff888091e0f1e0 by task syz-executor.4/9960 CPU: 1 PID: 9960 Comm: syz-executor.4 Not tainted 5.2.0-rc3+ #23 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: Allocated by task 0: (stack is not available) Freed by task 2333976928: BUG: unable to handle page fault for address: ffffffff8c046c18 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 8a70067 P4D 8a70067 PUD 8a71063 PMD 0 Thread overran stack, or stack corrupted Oops: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 9960 Comm: syz-executor.4 Not tainted 5.2.0-rc3+ #23 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:stack_depot_fetch+0x10/0x30 lib/stackdepot.c:203 usercopy: Kernel memory overwrite attempt detected to SLAB object 'names_cache' (offset 4272, size 2)! ------------[ cut here ]------------ kernel BUG at mm/usercopy.c:102! invalid opcode: 0000 [#2] PREEMPT SMP KASAN CPU: 1 PID: 9960 Comm: syz-executor.4 Not tainted 5.2.0-rc3+ #23 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:usercopy_abort+0xbd/0xbf mm/usercopy.c:102 Code: c0 e8 a8 d5 bf ff 48 8b 55 c0 49 89 d9 4d 89 f0 ff 75 c8 4c 89 e1 4c 89 ee 48 c7 c7 c0 b5 75 87 ff 75 d0 41 57 e8 b8 e5 a9 ff <0f> 0b e8 7d d5 bf ff e8 a8 6a f8 ff 8b 55 d4 4c 89 e1 49 89 d8 4c RSP: 0018:ffff888091e0d3c8 EFLAGS: 00010082 RAX: 0000000000000069 RBX: ffffffff87760380 RCX: 0000000000000000 RDX: 0000000000000000 RSI: ffffffff815ac976 RDI: ffffed10123c1a6b RBP: ffff888091e0d420 R08: 0000000000000069 R09: ffffed1015d244fa R10: ffffed1015d244f9 R11: ffff8880ae9227cf R12: ffffffff8862088d R13: ffffffff8775b420 R14: ffffffff8775b360 R15: ffffffff8775b320 FS: 0000555556252940(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffffff8c046c18 CR3: 00000000a8cb5000 CR4: 00000000001406e0 Call Trace: Modules linked in: ---[ end trace c9ac094fe82fdb9d ]--- RIP: 0010:stack_depot_fetch+0x10/0x30 lib/stackdepot.c:203 Code: e9 7b fd ff ff 4c 89 ff e8 8d b4 62 fe e9 e6 fd ff ff 90 90 90 90 90 90 90 90 89 f8 c1 ef 11 25 ff ff 1f 00 81 e7 f0 3f 00 00 <48> 03 3c c5 20 6c 04 8b 48 8d 47 18 48 89 06 8b 47 0c c3 0f 1f 00 RSP: 0018:ffff888091e0ef28 EFLAGS: 00010006 RAX: 00000000001fffff RBX: ffff888091e0fb8c RCX: 0000000000000000 RDX: 0000000000000000 RSI: ffff888091e0ef30 RDI: 0000000000003ff0 RBP: ffff888091e0ef48 R08: 000000000000001c R09: ffffed1015d244fa R10: ffffed1015d244f9 R11: ffff8880ae9227cf R12: ffffea0002478380 R13: ffff888091e0f1e0 R14: ffff8880aa400dc0 R15: ffff888091e0fb80 FS: 0000555556252940(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffffff8c046c18 CR3: 00000000a8cb5000 CR4: 00000000001406e0