kernel msg: ebtables bug: please report to author: Wrong len argument device lo entered promiscuous mode kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] SMP KASAN Dumping ftrace buffer: (ftrace buffer empty) Modules linked in: CPU: 1 PID: 27477 Comm: syz-executor6 Not tainted 4.16.0-rc6+ #286 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:virt_to_head_page include/linux/mm.h:615 [inline] RIP: 0010:qlink_to_cache mm/kasan/quarantine.c:127 [inline] RIP: 0010:qlist_free_all+0x12b/0x160 mm/kasan/quarantine.c:163 RSP: 0018:ffff8801b8da7848 EFLAGS: 00010203 RAX: ff018801b2ae69c0 RBX: 0000000000000282 RCX: ffffea0000000000 RDX: 03fbf20006cab980 RSI: ffff8801c9574480 RDI: 0000000000000282 RBP: ffff8801b8da7880 R08: 0000000000000000 R09: 1ffff100371b4ed9 R10: ffff8801b8da7690 R11: ffff8801d9417b18 R12: 0000000000000000 R13: 0000000000000000 R14: ff018801b2ae69c0 R15: ffffffff87acaba0 FS: 0000000000d97940(0000) GS:ffff8801db300000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000728020 CR3: 00000001aa8c7004 CR4: 00000000001606e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: quarantine_reduce+0x141/0x170 mm/kasan/quarantine.c:259 kasan_kmalloc+0xca/0xe0 mm/kasan/kasan.c:537 kasan_slab_alloc+0x12/0x20 mm/kasan/kasan.c:489 slab_post_alloc_hook mm/slab.h:443 [inline] slab_alloc mm/slab.c:3379 [inline] kmem_cache_alloc+0x11b/0x760 mm/slab.c:3539 kmem_cache_zalloc include/linux/slab.h:691 [inline] mmap_region+0x7ee/0x15a0 mm/mmap.c:1673 do_mmap+0x6c0/0xe00 mm/mmap.c:1483 do_mmap_pgoff include/linux/mm.h:2223 [inline] vm_mmap_pgoff+0x1de/0x280 mm/util.c:355 SYSC_mmap_pgoff mm/mmap.c:1533 [inline] SyS_mmap_pgoff+0x23b/0x5f0 mm/mmap.c:1491 SYSC_mmap arch/x86/kernel/sys_x86_64.c:100 [inline] SyS_mmap+0x16/0x20 arch/x86/kernel/sys_x86_64.c:91 do_syscall_64+0x281/0x940 arch/x86/entry/common.c:287 entry_SYSCALL_64_after_hwframe+0x42/0xb7 IPVS: set_ctl: invalid protocol: 47 127.0.0.1:20003 sh RIP: 0033:0x45490a RSP: 002b:0000000000a3e7f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045490a RDX: 0000000000000003 RSI: 0000000000021000 RDI: 0000000000000000 RBP: ffffffffffffffff R08: ffffffffffffffff R09: 0000000000000000 R10: 0000000000020022 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000021000 R14: 0000000000020022 R15: 0000000000000000 Code: 00 00 00 80 48 01 c2 72 44 48 b9 00 00 00 80 ff 77 00 00 48 01 ca 48 b9 00 00 00 00 00 ea ff ff 48 c1 ea 0c 48 c1 e2 06 48 01 ca <48> 8b 4a 20 48 8d 71 ff 83 e1 01 48 0f 45 d6 4c 8b 6a 30 e9 f4 kernel msg: ebtables bug: please report to author: entries_size too small RIP: virt_to_head_page include/linux/mm.h:615 [inline] RSP: ffff8801b8da7848 RIP: qlink_to_cache mm/kasan/quarantine.c:127 [inline] RSP: ffff8801b8da7848 RIP: qlist_free_all+0x12b/0x160 mm/kasan/quarantine.c:163 RSP: ffff8801b8da7848 ---[ end trace 9eb322e4c6ab7892 ]---