------------[ cut here ]------------
kernel BUG at mm/slab.c:4427!
nla_parse: 24 callbacks suppressed
netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'.
invalid opcode: 0000 [#1] PREEMPT SMP KASAN
Modules linked in:
CPU: 1 PID: 13419 Comm: syz-executor.4 Not tainted 4.14.231-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
task: ffff888045220300 task.stack: ffff8880ac3d8000
RIP: 0010:__check_heap_object+0x59/0x60 mm/slab.c:4427
RSP: 0018:ffff8880ac3dfc10 EFLAGS: 00010293
RAX: 00000000000f0f0f RBX: 00000000000007b4 RCX: 000000000000000c
RDX: ffff88813fe80dc0 RSI: 00000000e1e1e1df RDI: ffff888097c664fd
RBP: 0000000000000001 R08: 00000000000007b4 R09: ffff888097c66500
R10: ffff88823fff7057 R11: 000000425b429b59 R12: ffff888097c664fd
R13: ffffea00025f1980 R14: ffff888097c66cb1 R15: ffffea00025f1980
FS:  00007fb57b055700(0000) GS:ffff8880ba500000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000001b2f122000 CR3: 00000000b1025000 CR4: 00000000001406e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 check_heap_object mm/usercopy.c:216 [inline]
 __check_object_size mm/usercopy.c:242 [inline]
 __check_object_size+0x1c2/0x230 mm/usercopy.c:228
 check_object_size include/linux/thread_info.h:121 [inline]
 check_copy_size include/linux/thread_info.h:152 [inline]
 copy_to_user include/linux/uaccess.h:154 [inline]
 bpf_test_finish.isra.0+0x89/0x140 net/bpf/test_run.c:59
 bpf_prog_test_run_skb+0x52d/0x8c0 net/bpf/test_run.c:144
 bpf_prog_test_run kernel/bpf/syscall.c:1264 [inline]
 SYSC_bpf kernel/bpf/syscall.c:1529 [inline]
 SyS_bpf+0x547/0x35e0 kernel/bpf/syscall.c:1477
 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292
 entry_SYSCALL_64_after_hwframe+0x46/0xbb
RIP: 0033:0x466459
RSP: 002b:00007fb57b055188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459
RDX: 000000000000001e RSI: 0000000020000440 RDI: 000000000000000a
RBP: 00000000004bf9fb R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf60
R13: 00007ffd6722fa3f R14: 00007fb57b055300 R15: 0000000000022000
Code: f0 d3 e8 39 42 24 76 23 0f af 42 14 4c 01 c8 48 29 c7 48 63 42 74 48 39 f8 72 08 48 29 f8 4c 39 c0 73 05 48 8b 42 58 c3 31 c0 c3 <0f> 0b 90 90 90 90 90 c3 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 
RIP: __check_heap_object+0x59/0x60 mm/slab.c:4427 RSP: ffff8880ac3dfc10
netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'.
---[ end trace 9e90d77b15d479bf ]---