netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. ------------[ cut here ]------------ kernel BUG at net/ipv4/ip_output.c:777! invalid opcode: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 21638 Comm: syz-executor5 Not tainted 4.20.0+ #110 kobject: 'nr0' (0000000080ba727d): kobject_add_internal: parent: 'net', set: 'devices' Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:ip_do_fragment+0x2419/0x2a90 net/ipv4/ip_output.c:777 Code: 8b 8d 70 fe ff ff e9 82 e8 ff ff 4c 89 ef e8 0e 2c 2e fb e9 64 e9 ff ff 4c 89 f7 e8 01 2c 2e fb e9 dc e5 ff ff e8 27 9a ea fa <0f> 0b 4c 89 e7 e8 ed 2b 2e fb e9 a0 e8 ff ff 4c 89 f7 89 8d 70 fe kobject: 'nr0' (0000000080ba727d): kobject_uevent_env RSP: 0018:ffff8880683863a0 EFLAGS: 00010246 RAX: 0000000000040000 RBX: ffff8880997e6c80 RCX: ffffc9000fe7d000 RDX: 0000000000040000 RSI: ffffffff86970bc9 RDI: 0000000000000005 RBP: ffff888068386578 R08: ffff888063f74640 R09: ffffed10129aee4a R10: ffffed10129aee4c R11: ffff888094d77263 R12: ffff8880997e6d34 R13: 00000000fffffff2 R14: ffff8880997e6d40 R15: dffffc0000000000 FS: 00007f9ac0efb700(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000 kobject: 'loop1' (00000000be5d970f): kobject_uevent_env CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ffec9f80fe8 CR3: 0000000094b6e000 CR4: 00000000001406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 kobject: 'nr0' (0000000080ba727d): fill_kobj_path: path = '/devices/virtual/net/nr0' Call Trace: kobject: 'loop1' (00000000be5d970f): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'queues' (0000000052a0c474): kobject_add_internal: parent: 'nr0', set: '' kobject: 'queues' (0000000052a0c474): kobject_uevent_env ip_fragment.constprop.53+0x179/0x240 net/ipv4/ip_output.c:550 ip_finish_output+0x6ae/0xf90 net/ipv4/ip_output.c:315 kobject: 'queues' (0000000052a0c474): kobject_uevent_env: filter function caused the event to drop! kobject: 'loop1' (00000000be5d970f): kobject_uevent_env kobject: 'rx-0' (00000000a2cd6aa8): kobject_add_internal: parent: 'queues', set: 'queues' NF_HOOK_COND include/linux/netfilter.h:278 [inline] ip_mc_output+0x2be/0x15b0 net/ipv4/ip_output.c:390 kobject: 'loop1' (00000000be5d970f): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'rx-0' (00000000a2cd6aa8): kobject_uevent_env kobject: 'rx-0' (00000000a2cd6aa8): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' kobject: 'tx-0' (0000000046961c0e): kobject_add_internal: parent: 'queues', set: 'queues' dst_output include/net/dst.h:444 [inline] ip_local_out+0xc5/0x1b0 net/ipv4/ip_output.c:124 kobject: 'tx-0' (0000000046961c0e): kobject_uevent_env iptunnel_xmit+0x599/0x990 net/ipv4/ip_tunnel_core.c:91 ip_tunnel_xmit+0x15a4/0x3be4 net/ipv4/ip_tunnel.c:787 kobject: 'tx-0' (0000000046961c0e): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' kobject: 'batman_adv' (00000000be719d0c): kobject_add_internal: parent: 'nr0', set: '' kobject: 'loop0' (00000000568753e7): kobject_uevent_env __gre_xmit+0x5e9/0x980 net/ipv4/ip_gre.c:453 kobject: 'loop0' (00000000568753e7): fill_kobj_path: path = '/devices/virtual/block/loop0' ipgre_xmit+0x3e1/0xba0 net/ipv4/ip_gre.c:707 kobject: 'loop2' (000000004a5d16a0): kobject_uevent_env __netdev_start_xmit include/linux/netdevice.h:4382 [inline] netdev_start_xmit include/linux/netdevice.h:4391 [inline] xmit_one net/core/dev.c:3278 [inline] dev_hard_start_xmit+0x286/0xc80 net/core/dev.c:3294 kobject: 'loop2' (000000004a5d16a0): fill_kobj_path: path = '/devices/virtual/block/loop2' __dev_queue_xmit+0x2f62/0x3ac0 net/core/dev.c:3864 dev_queue_xmit+0x17/0x20 net/core/dev.c:3897 __bpf_tx_skb net/core/filter.c:2014 [inline] __bpf_redirect_common net/core/filter.c:2052 [inline] __bpf_redirect+0x5ca/0xb40 net/core/filter.c:2059 ____bpf_clone_redirect net/core/filter.c:2092 [inline] bpf_clone_redirect+0x2e4/0x480 net/core/filter.c:2064 bpf_prog_bebbfe2050753572+0x89c/0x1000 Modules linked in: ---[ end trace c8a13e1e53cd4433 ]--- RIP: 0010:ip_do_fragment+0x2419/0x2a90 net/ipv4/ip_output.c:777 Code: 8b 8d 70 fe ff ff e9 82 e8 ff ff 4c 89 ef e8 0e 2c 2e fb e9 64 e9 ff ff 4c 89 f7 e8 01 2c 2e fb e9 dc e5 ff ff e8 27 9a ea fa <0f> 0b 4c 89 e7 e8 ed 2b 2e fb e9 a0 e8 ff ff 4c 89 f7 89 8d 70 fe RSP: 0018:ffff8880683863a0 EFLAGS: 00010246 RAX: 0000000000040000 RBX: ffff8880997e6c80 RCX: ffffc9000fe7d000 RDX: 0000000000040000 RSI: ffffffff86970bc9 RDI: 0000000000000005 RBP: ffff888068386578 R08: ffff888063f74640 R09: ffffed10129aee4a R10: ffffed10129aee4c R11: ffff888094d77263 R12: ffff8880997e6d34 R13: 00000000fffffff2 R14: ffff8880997e6d40 R15: dffffc0000000000 FS: 00007f9ac0efb700(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ffec9f80fe8 CR3: 0000000094b6e000 CR4: 00000000001406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400