------------[ cut here ]------------
kernel BUG at ./include/linux/skbuff.h:2073!
invalid opcode: 0000 [#1] SMP KASAN
Dumping ftrace buffer:
   (ftrace buffer empty)
Modules linked in:
CPU: 0 PID: 2703 Comm: syz-executor1 Not tainted 4.15.0-rc7+ #187
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:__skb_pull include/linux/skbuff.h:2073 [inline]
RIP: 0010:skb_pull_inline include/linux/skbuff.h:2079 [inline]
RIP: 0010:skb_pull+0xe8/0x110 net/core/skbuff.c:1731
RSP: 0018:ffff8801cc25f230 EFLAGS: 00010216
RAX: 0000000000010000 RBX: ffff8801ce60fb40 RCX: ffffffff8432a3f8
RDX: 00000000000001d9 RSI: ffffc90002d10000 RDI: ffff8801ce60fbc4
RBP: ffff8801cc25f248 R08: 1ffff1003984bdaf R09: 0000000000000002
R10: ffff8801cc25f238 R11: 0000000000000000 R12: 0000000000000028
R13: 0000000000000030 R14: dffffc0000000000 R15: ffff8801bc6245ca
FS:  00007f096fb71700(0000) GS:ffff8801db200000(0000) knlGS:0000000000000000
netlink: 2 bytes leftover after parsing attributes in process `syz-executor6'.
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f40a0fd1db8 CR3: 00000001bccd8001 CR4: 00000000001606f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 esp6_gro_receive+0xb4/0xbe0 net/ipv6/esp6_offload.c:63
netlink: 2 bytes leftover after parsing attributes in process `syz-executor6'.
 call_gro_receive include/linux/netdevice.h:2201 [inline]
 ipv6_gro_receive+0x844/0x13e0 net/ipv6/ip6_offload.c:253
 dev_gro_receive+0xd38/0x2110 net/core/dev.c:4935
 napi_gro_frags+0x386/0xaf0 net/core/dev.c:5191
 tun_get_user+0x2760/0x3940 drivers/net/tun.c:1907
 tun_chr_write_iter+0xb9/0x160 drivers/net/tun.c:1952
 call_write_iter include/linux/fs.h:1772 [inline]
 do_iter_readv_writev+0x525/0x7f0 fs/read_write.c:653
 do_iter_write+0x154/0x540 fs/read_write.c:932
 vfs_writev+0x18a/0x340 fs/read_write.c:977
 do_writev+0xfc/0x2a0 fs/read_write.c:1012
 SYSC_writev fs/read_write.c:1085 [inline]
 SyS_writev+0x27/0x30 fs/read_write.c:1082
 entry_SYSCALL_64_fastpath+0x23/0x9a
RIP: 0033:0x452bd1
RSP: 002b:00007f096fb70b80 EFLAGS: 00000293 ORIG_RAX: 0000000000000014
RAX: ffffffffffffffda RBX: 000000000071bea0 RCX: 0000000000452bd1
RDX: 0000000000000002 RSI: 00007f096fb70bd0 RDI: 0000000000000012
RBP: 000000000000004f R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000066 R11: 0000000000000293 R12: 00000000006ee808
R13: 00000000ffffffff R14: 00007f096fb716d4 R15: 0000000000000000
Code: a3 d8 00 00 00 e8 69 7a 3d fd 4c 89 e0 5b 41 5c 41 5d 5d c3 45 31 e4 e8 57 7a 3d fd 4c 89 e0 5b 41 5c 41 5d 5d c3 e8 48 7a 3d fd <0f> 0b e8 a1 5e 75 fd eb 97 e8 9a 5e 75 fd e9 41 ff ff ff e8 b0 
RIP: __skb_pull include/linux/skbuff.h:2073 [inline] RSP: ffff8801cc25f230
RIP: skb_pull_inline include/linux/skbuff.h:2079 [inline] RSP: ffff8801cc25f230
RIP: skb_pull+0xe8/0x110 net/core/skbuff.c:1731 RSP: ffff8801cc25f230
---[ end trace e28ed0cf7344131a ]---