------------[ cut here ]------------ kernel BUG at mm/slab.c:4427! nla_parse: 24 callbacks suppressed netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. invalid opcode: 0000 [#1] PREEMPT SMP KASAN Modules linked in: CPU: 1 PID: 13419 Comm: syz-executor.4 Not tainted 4.14.231-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 task: ffff888045220300 task.stack: ffff8880ac3d8000 RIP: 0010:__check_heap_object+0x59/0x60 mm/slab.c:4427 RSP: 0018:ffff8880ac3dfc10 EFLAGS: 00010293 RAX: 00000000000f0f0f RBX: 00000000000007b4 RCX: 000000000000000c RDX: ffff88813fe80dc0 RSI: 00000000e1e1e1df RDI: ffff888097c664fd RBP: 0000000000000001 R08: 00000000000007b4 R09: ffff888097c66500 R10: ffff88823fff7057 R11: 000000425b429b59 R12: ffff888097c664fd R13: ffffea00025f1980 R14: ffff888097c66cb1 R15: ffffea00025f1980 FS: 00007fb57b055700(0000) GS:ffff8880ba500000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b2f122000 CR3: 00000000b1025000 CR4: 00000000001406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: check_heap_object mm/usercopy.c:216 [inline] __check_object_size mm/usercopy.c:242 [inline] __check_object_size+0x1c2/0x230 mm/usercopy.c:228 check_object_size include/linux/thread_info.h:121 [inline] check_copy_size include/linux/thread_info.h:152 [inline] copy_to_user include/linux/uaccess.h:154 [inline] bpf_test_finish.isra.0+0x89/0x140 net/bpf/test_run.c:59 bpf_prog_test_run_skb+0x52d/0x8c0 net/bpf/test_run.c:144 bpf_prog_test_run kernel/bpf/syscall.c:1264 [inline] SYSC_bpf kernel/bpf/syscall.c:1529 [inline] SyS_bpf+0x547/0x35e0 kernel/bpf/syscall.c:1477 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x466459 RSP: 002b:00007fb57b055188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 RDX: 000000000000001e RSI: 0000000020000440 RDI: 000000000000000a RBP: 00000000004bf9fb R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf60 R13: 00007ffd6722fa3f R14: 00007fb57b055300 R15: 0000000000022000 Code: f0 d3 e8 39 42 24 76 23 0f af 42 14 4c 01 c8 48 29 c7 48 63 42 74 48 39 f8 72 08 48 29 f8 4c 39 c0 73 05 48 8b 42 58 c3 31 c0 c3 <0f> 0b 90 90 90 90 90 c3 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f RIP: __check_heap_object+0x59/0x60 mm/slab.c:4427 RSP: ffff8880ac3dfc10 netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. ---[ end trace 9e90d77b15d479bf ]---