------------[ cut here ]------------ kernel BUG at net/ipv4/ip_output.c:777! invalid opcode: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 17575 Comm: syz-executor4 Not tainted 4.20.0+ #109 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:ip_do_fragment+0x2419/0x2a90 net/ipv4/ip_output.c:777 Code: 8b 8d 70 fe ff ff e9 82 e8 ff ff 4c 89 ef e8 0e 5c 30 fb e9 64 e9 ff ff 4c 89 f7 e8 01 5c 30 fb e9 dc e5 ff ff e8 27 ca ec fa <0f> 0b 4c 89 e7 e8 ed 5b 30 fb e9 a0 e8 ff ff 4c 89 f7 89 8d 70 fe RSP: 0018:ffff8880647de500 EFLAGS: 00010246 RAX: 0000000000040000 RBX: ffff888088208140 RCX: ffffc9000de39000 RDX: 0000000000040000 RSI: ffffffff8694dbc9 RDI: 0000000000000005 sctp: [Deprecated]: syz-executor3 (pid 17607) Use of int in maxseg socket option. Use struct sctp_assoc_value instead RBP: ffff8880647de6d8 R08: ffff8880671b0300 R09: ffffed100cbfdc22 R10: ffffed100cbfdc24 R11: ffff888065fee123 R12: ffff8880882081f4 R13: 00000000fffffff2 R14: ffff888088208200 R15: dffffc0000000000 FS: 00007fa11dc54700(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000625208 CR3: 00000000a12f0000 CR4: 00000000001406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: ip_fragment.constprop.53+0x179/0x240 net/ipv4/ip_output.c:550 ip_finish_output+0x6ae/0xf90 net/ipv4/ip_output.c:315 NF_HOOK_COND include/linux/netfilter.h:278 [inline] ip_output+0x217/0x8d0 net/ipv4/ip_output.c:405 dst_output include/net/dst.h:444 [inline] ip_local_out+0xc5/0x1b0 net/ipv4/ip_output.c:124 iptunnel_xmit+0x599/0x990 net/ipv4/ip_tunnel_core.c:91 ip_tunnel_xmit+0x15a4/0x3be4 net/ipv4/ip_tunnel.c:787 __gre_xmit+0x5e9/0x980 net/ipv4/ip_gre.c:453 ipgre_xmit+0x3e1/0xba0 net/ipv4/ip_gre.c:707 __netdev_start_xmit include/linux/netdevice.h:4382 [inline] netdev_start_xmit include/linux/netdevice.h:4391 [inline] xmit_one net/core/dev.c:3278 [inline] dev_hard_start_xmit+0x286/0xc80 net/core/dev.c:3294 __dev_queue_xmit+0x2f62/0x3ac0 net/core/dev.c:3864 dev_queue_xmit+0x17/0x20 net/core/dev.c:3897 __bpf_tx_skb net/core/filter.c:2014 [inline] __bpf_redirect_common net/core/filter.c:2052 [inline] __bpf_redirect+0x5ca/0xb40 net/core/filter.c:2059 ____bpf_clone_redirect net/core/filter.c:2092 [inline] bpf_clone_redirect+0x2e4/0x480 net/core/filter.c:2064 bpf_prog_bebbfe2050753572+0x427/0x1000 Modules linked in: ---[ end trace 3c4afe9fce0b2688 ]--- RIP: 0010:ip_do_fragment+0x2419/0x2a90 net/ipv4/ip_output.c:777 Code: 8b 8d 70 fe ff ff e9 82 e8 ff ff 4c 89 ef e8 0e 5c 30 fb e9 64 e9 ff ff 4c 89 f7 e8 01 5c 30 fb e9 dc e5 ff ff e8 27 ca ec fa <0f> 0b 4c 89 e7 e8 ed 5b 30 fb e9 a0 e8 ff ff 4c 89 f7 89 8d 70 fe RSP: 0018:ffff8880647de500 EFLAGS: 00010246 RAX: 0000000000040000 RBX: ffff888088208140 RCX: ffffc9000de39000 RDX: 0000000000040000 RSI: ffffffff8694dbc9 RDI: 0000000000000005 RBP: ffff8880647de6d8 R08: ffff8880671b0300 R09: ffffed100cbfdc22 R10: ffffed100cbfdc24 R11: ffff888065fee123 R12: ffff8880882081f4 R13: 00000000fffffff2 R14: ffff888088208200 R15: dffffc0000000000 FS: 00007fa11dc54700(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000625208 CR3: 00000000a12f0000 CR4: 00000000001406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400