------------[ cut here ]------------ kernel BUG at net/ipv4/ip_output.c:777! invalid opcode: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 22702 Comm: syz-executor2 Not tainted 4.20.0+ #192 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:ip_do_fragment+0x2419/0x2a90 net/ipv4/ip_output.c:777 Code: 8b 8d 70 fe ff ff e9 82 e8 ff ff 4c 89 ef e8 0e 2c 2e fb e9 64 e9 ff ff 4c 89 f7 e8 01 2c 2e fb e9 dc e5 ff ff e8 27 9a ea fa <0f> 0b 4c 89 e7 e8 ed 2b 2e fb e9 a0 e8 ff ff 4c 89 f7 89 8d 70 fe RSP: 0018:ffff88806750e3a0 EFLAGS: 00010246 RAX: 0000000000040000 RBX: ffff88809fc4f280 RCX: ffffc90009e19000 RDX: 0000000000040000 RSI: ffffffff86970bc9 RDI: 0000000000000005 RBP: ffff88806750e578 R08: ffff88806ece4480 R09: ffffed10127aeee4 R10: ffffed10127aeee6 R11: ffff888093d77733 R12: ffff88809fc4f334 R13: 00000000fffffff2 R14: ffff88809fc4f340 R15: dffffc0000000000 FS: 00007f2b0be90700(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f278aad7330 CR3: 0000000090081000 CR4: 00000000001406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: ip_fragment.constprop.53+0x179/0x240 net/ipv4/ip_output.c:550 ip_finish_output+0x6ae/0xf90 net/ipv4/ip_output.c:315 NF_HOOK_COND include/linux/netfilter.h:278 [inline] ip_mc_output+0x2be/0x15b0 net/ipv4/ip_output.c:390 dst_output include/net/dst.h:444 [inline] ip_local_out+0xc5/0x1b0 net/ipv4/ip_output.c:124 iptunnel_xmit+0x599/0x990 net/ipv4/ip_tunnel_core.c:91 ip_tunnel_xmit+0x15a4/0x3be4 net/ipv4/ip_tunnel.c:787 __gre_xmit+0x5e9/0x980 net/ipv4/ip_gre.c:453 ipgre_xmit+0x3e1/0xba0 net/ipv4/ip_gre.c:707 __netdev_start_xmit include/linux/netdevice.h:4382 [inline] netdev_start_xmit include/linux/netdevice.h:4391 [inline] xmit_one net/core/dev.c:3278 [inline] dev_hard_start_xmit+0x286/0xc80 net/core/dev.c:3294 __dev_queue_xmit+0x2f62/0x3ac0 net/core/dev.c:3864 dev_queue_xmit+0x17/0x20 net/core/dev.c:3897 __bpf_tx_skb net/core/filter.c:2014 [inline] __bpf_redirect_common net/core/filter.c:2052 [inline] __bpf_redirect+0x5ca/0xb40 net/core/filter.c:2059 ____bpf_clone_redirect net/core/filter.c:2092 [inline] bpf_clone_redirect+0x2e4/0x480 net/core/filter.c:2064 bpf_prog_bebbfe2050753572+0x6cc/0x1000 Modules linked in: ---[ end trace d53e1cf32e52bd81 ]--- RIP: 0010:ip_do_fragment+0x2419/0x2a90 net/ipv4/ip_output.c:777 Code: 8b 8d 70 fe ff ff e9 82 e8 ff ff 4c 89 ef e8 0e 2c 2e fb e9 64 e9 ff ff 4c 89 f7 e8 01 2c 2e fb e9 dc e5 ff ff e8 27 9a ea fa <0f> 0b 4c 89 e7 e8 ed 2b 2e fb e9 a0 e8 ff ff 4c 89 f7 89 8d 70 fe RSP: 0018:ffff88806750e3a0 EFLAGS: 00010246 RAX: 0000000000040000 RBX: ffff88809fc4f280 RCX: ffffc90009e19000 RDX: 0000000000040000 RSI: ffffffff86970bc9 RDI: 0000000000000005 RBP: ffff88806750e578 R08: ffff88806ece4480 R09: ffffed10127aeee4 R10: ffffed10127aeee6 R11: ffff888093d77733 R12: ffff88809fc4f334 R13: 00000000fffffff2 R14: ffff88809fc4f340 R15: dffffc0000000000 FS: 00007f2b0be90700(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000 audit: type=1804 audit(1546193441.914:146): pid=22714 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor5" name="/root/syzkaller-testdir594596810/syzkaller.w97I5i/474/memory.events" dev="sda1" ino=16785 res=1 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f278aad7330 CR3: 0000000090081000 CR4: 00000000001406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 kobject: 'loop1' (00000000ff82f92e): kobject_uevent_env