netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. device veth3 entered promiscuous mode ------------[ cut here ]------------ kernel BUG at include/linux/skbuff.h:2150! invalid opcode: 0000 [#1] PREEMPT SMP KASAN Modules linked in: CPU: 0 PID: 9639 Comm: syz-executor.3 Not tainted 4.14.295-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/11/2022 task: ffff8880b010e580 task.stack: ffff888044b00000 RIP: 0010:__skb_pull include/linux/skbuff.h:2150 [inline] RIP: 0010:skb_pull_inline include/linux/skbuff.h:2156 [inline] RIP: 0010:skb_pull net/core/skbuff.c:1745 [inline] RIP: 0010:skb_pull+0xe1/0x100 net/core/skbuff.c:1743 RSP: 0018:ffff888044b074d0 EFLAGS: 00010212 RAX: 0000000000040000 RBX: ffff8880965ed3c0 RCX: ffffc90007404000 RDX: 0000000000000353 RSI: ffffffff85bef9b1 RDI: ffff8880965ed444 RBP: 0000000000000018 R08: ffffffff85c44f3c R09: 00000000000202b0 R10: ffff8880b010ee08 R11: ffff8880b010e580 R12: 00000000000010de R13: ffff8880965ed498 R14: ffff8880965ed490 R15: ffff8880af111860 FS: 00007f3e2e680700(0000) GS:ffff8880ba400000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f54f29ff650 CR3: 00000000af654000 CR4: 00000000003406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: ipgre_xmit+0x26f/0x780 net/ipv4/ip_gre.c:658 __netdev_start_xmit include/linux/netdevice.h:4054 [inline] netdev_start_xmit include/linux/netdevice.h:4063 [inline] xmit_one net/core/dev.c:3005 [inline] dev_hard_start_xmit+0x188/0x890 net/core/dev.c:3021 __dev_queue_xmit+0x1d7f/0x2480 net/core/dev.c:3521 packet_snd+0x13aa/0x26f0 net/packet/af_packet.c:3032 packet_sendmsg+0x12ed/0x33a0 net/packet/af_packet.c:3061 sock_sendmsg_nosec net/socket.c:646 [inline] sock_sendmsg+0xb5/0x100 net/socket.c:656 ___sys_sendmsg+0x326/0x800 net/socket.c:2062 __sys_sendmmsg+0x129/0x330 net/socket.c:2152 SYSC_sendmmsg net/socket.c:2183 [inline] SyS_sendmmsg+0x2f/0x50 net/socket.c:2178 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x7f3e2fd0d5f9 RSP: 002b:00007f3e2e680168 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 RAX: ffffffffffffffda RBX: 00007f3e2fe2df80 RCX: 00007f3e2fd0d5f9 RDX: 04000000000000e1 RSI: 0000000020000000 RDI: 0000000000000003 RBP: 00007f3e2fd687b0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffd3ec1631f R14: 00007f3e2e680300 R15: 0000000000022000 Code: 00 00 4c 89 a3 d8 00 00 00 e8 2c 4e 96 fb 4c 89 e0 5b 5d 41 5c c3 e8 1f 4e 96 fb 45 31 e4 5b 4c 89 e0 5d 41 5c c3 e8 0f 4e 96 fb <0f> 0b e8 b8 07 c0 fb e9 49 ff ff ff e8 ae 07 c0 fb eb 8e e8 17 RIP: __skb_pull include/linux/skbuff.h:2150 [inline] RSP: ffff888044b074d0 RIP: skb_pull_inline include/linux/skbuff.h:2156 [inline] RSP: ffff888044b074d0 RIP: skb_pull net/core/skbuff.c:1745 [inline] RSP: ffff888044b074d0 RIP: skb_pull+0xe1/0x100 net/core/skbuff.c:1743 RSP: ffff888044b074d0 ---[ end trace 8409daadd47fe9ed ]---