==================================================================
BUG: KASAN: slab-out-of-bounds in class_equal+0x40/0x50 kernel/locking/lockdep.c:1527
Read of size 8 at addr ffff88807b76b930 by task syz-executor.1/8993

CPU: 0 PID: 8993 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #41
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:

Allocated by task 8787:
 save_stack+0x23/0x90 mm/kasan/common.c:71
 set_track mm/kasan/common.c:79 [inline]
 __kasan_kmalloc mm/kasan/common.c:489 [inline]
 __kasan_kmalloc.constprop.0+0xcf/0xe0 mm/kasan/common.c:462
 kasan_kmalloc+0x9/0x10 mm/kasan/common.c:503
 __do_kmalloc_node mm/slab.c:3620 [inline]
 __kmalloc_node+0x4e/0x70 mm/slab.c:3627
 kmalloc_node include/linux/slab.h:590 [inline]
 kvmalloc_node+0x68/0x100 mm/util.c:431
 kvmalloc include/linux/mm.h:648 [inline]
 seq_buf_alloc fs/seq_file.c:32 [inline]
 seq_read+0x817/0x1110 fs/seq_file.c:204
 kernfs_fop_read+0xed/0x560 fs/kernfs/file.c:251
 __vfs_read+0x8a/0x110 fs/read_write.c:425
 vfs_read+0x194/0x3e0 fs/read_write.c:461
 ksys_read+0x14f/0x290 fs/read_write.c:587
 __do_sys_read fs/read_write.c:597 [inline]
 __se_sys_read fs/read_write.c:595 [inline]
 __x64_sys_read+0x73/0xb0 fs/read_write.c:595
 do_syscall_64+0xfd/0x680 arch/x86/entry/common.c:301
 entry_SYSCALL_64_after_hwframe+0x49/0xbe

Freed by task 1379136256:
------------[ cut here ]------------
kernel BUG at mm/slab.c:4178!
invalid opcode: 0000 [#1] PREEMPT SMP KASAN
CPU: 0 PID: 8993 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #41
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:__check_heap_object+0xa5/0xb3 mm/slab.c:4178
Code: 2b 48 c7 c7 2d 0f 62 88 e8 98 b3 07 00 5d c3 41 8b 91 04 01 00 00 48 29 c7 48 39 d7 77 bd 48 01 d0 48 29 c8 4c 39 c0 72 b2 c3 <0f> 0b 48 c7 c7 2d 0f 62 88 e8 ac b8 07 00 44 89 e1 48 c7 c7 e8 0f
RSP: 0018:ffff88807b76b1f0 EFLAGS: 00010046
RAX: 0000000000000001 RBX: 0000000000000001 RCX: 000000000000000c
RDX: ffff88807b76a100 RSI: 0000000000000000 RDI: ffff88807b76b2e8
RBP: ffff88807b76b240 R08: 0000000000000001 R09: ffff8880aa400dc0
R10: 0000000000000fcc R11: 0000000000000000 R12: ffff88807b76b2e8
R13: ffffea0001edda80 R14: ffff88807b76b2e9 R15: 0000000000000001
FS:  0000555556fc1940(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffff8bc24ed0 CR3: 000000009eec2000 CR4: 00000000001406f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
Modules linked in:
---[ end trace 82e8554d1ebacf52 ]---
RIP: 0010:__check_heap_object+0xa5/0xb3 mm/slab.c:4178
Code: 2b 48 c7 c7 2d 0f 62 88 e8 98 b3 07 00 5d c3 41 8b 91 04 01 00 00 48 29 c7 48 39 d7 77 bd 48 01 d0 48 29 c8 4c 39 c0 72 b2 c3 <0f> 0b 48 c7 c7 2d 0f 62 88 e8 ac b8 07 00 44 89 e1 48 c7 c7 e8 0f
RSP: 0018:ffff88807b76b1f0 EFLAGS: 00010046
RAX: 0000000000000001 RBX: 0000000000000001 RCX: 000000000000000c
RDX: ffff88807b76a100 RSI: 0000000000000000 RDI: ffff88807b76b2e8
RBP: ffff88807b76b240 R08: 0000000000000001 R09: ffff8880aa400dc0
R10: 0000000000000fcc R11: 0000000000000000 R12: ffff88807b76b2e8
R13: ffffea0001edda80 R14: ffff88807b76b2e9 R15: 0000000000000001
FS:  0000555556fc1940(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffff8bc24ed0 CR3: 000000009eec2000 CR4: 00000000001406f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400