device veth3 entered promiscuous mode
IPv6: ADDRCONF(NETDEV_UP): veth3: link is not ready
skbuff: skb_over_panic: text:ffffffff864f4d0d len:232 put:72 head:ffff88809b78ec80 data:ffff88809b78ec80 tail:0xe8 end:0xc0 dev:<NULL>
------------[ cut here ]------------
kernel BUG at net/core/skbuff.c:104!
invalid opcode: 0000 [#1] PREEMPT SMP KASAN
Modules linked in:
CPU: 0 PID: 10488 Comm: syz-executor.2 Not tainted 4.14.295-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/11/2022
task: ffff8880490643c0 task.stack: ffff88804b6d0000
RIP: 0010:skb_panic+0x172/0x174 net/core/skbuff.c:104
RSP: 0018:ffff88804b6d71c8 EFLAGS: 00010282
RAX: 0000000000000086 RBX: ffff88809f9a3a40 RCX: 0000000000000000
RDX: 0000000000040000 RSI: ffffffff81443130 RDI: ffffed10096dae2f
RBP: ffffffff8855b820 R08: 0000000000000086 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: ffffffff864f4d0d
R13: 0000000000000048 R14: ffffffff8855b080 R15: 00000000000000c0
FS:  00007fa104275700(0000) GS:ffff8880ba400000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000001b30a28000 CR3: 0000000099472000 CR4: 00000000003406f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 skb_over_panic net/core/skbuff.c:109 [inline]
 skb_put.cold+0x24/0x24 net/core/skbuff.c:1709
 dump_esp_combs net/key/af_key.c:3017 [inline]
 pfkey_send_acquire+0x161d/0x2360 net/key/af_key.c:3238
 km_query+0xa9/0x1b0 net/xfrm/xfrm_state.c:1984
 xfrm_state_find+0x1847/0x27c0 net/xfrm/xfrm_state.c:1026
 xfrm_tmpl_resolve_one net/xfrm/xfrm_policy.c:1385 [inline]
 xfrm_tmpl_resolve net/xfrm/xfrm_policy.c:1429 [inline]
 xfrm_resolve_and_create_bundle+0x29b/0x2630 net/xfrm/xfrm_policy.c:1724
 xfrm_lookup+0x1ee/0x1790 net/xfrm/xfrm_policy.c:2034
 xfrm_lookup_route+0x33/0x1b0 net/xfrm/xfrm_policy.c:2153
 ip_route_output_flow+0xf9/0x130 net/ipv4/route.c:2630
 udp_sendmsg+0x13b3/0x1c80 net/ipv4/udp.c:1025
 inet_sendmsg+0x11a/0x4e0 net/ipv4/af_inet.c:762
 sock_sendmsg_nosec net/socket.c:646 [inline]
 sock_sendmsg+0xb5/0x100 net/socket.c:656
 ___sys_sendmsg+0x326/0x800 net/socket.c:2062
 __sys_sendmmsg+0x129/0x330 net/socket.c:2152
 SYSC_sendmmsg net/socket.c:2183 [inline]
 SyS_sendmmsg+0x2f/0x50 net/socket.c:2178
 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292
 entry_SYSCALL_64_after_hwframe+0x46/0xbb
RIP: 0033:0x7fa105d235a9
RSP: 002b:00007fa104275168 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
RAX: ffffffffffffffda RBX: 00007fa105e44050 RCX: 00007fa105d235a9
RDX: 0400000000000354 RSI: 0000000020000180 RDI: 0000000000000003
RBP: 00007fa105d7e7b0 R08: 0000000000000000 R09: 0000000000000000
R10: 000002873dedf99c R11: 0000000000000246 R12: 0000000000000000
R13: 00007ffc2a5ddf4f R14: 00007fa104275300 R15: 0000000000022000
Code: 8b 4c 24 10 8b 8b 80 00 00 00 41 56 45 89 e8 4c 89 e2 41 57 48 89 ee 48 c7 c7 c0 b0 55 88 ff 74 24 10 ff 74 24 20 e8 85 64 e4 ff <0f> 0b e8 f9 da 36 fa 4c 8b 64 24 18 e8 4f 7e 60 fa 48 c7 c1 e0 
RIP: skb_panic+0x172/0x174 net/core/skbuff.c:104 RSP: ffff88804b6d71c8
---[ end trace 6b06b3cb00aa87e2 ]---