kernel msg: ebtables bug: please report to author: Wrong len argument Unknown ioctl 21531 netlink: 16 bytes leftover after parsing attributes in process `syz-executor5'. kernel tried to execute NX-protected page - exploit attempt? (uid: 0) BUG: unable to handle kernel paging request at ffff880211947030 PGD 3b21067 P4D 3b21067 PUD 3b24067 PMD 80000002118000e3 Oops: 0011 [#1] SMP PTI CPU: 0 PID: 13890 Comm: kworker/u4:6 Not tainted 4.18.0-rc8+ #32 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: krdsd rds_connect_worker RIP: 0010:0xffff880211947030 Code: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 18 70 94 11 02 88 ff ff 18 70 94 11 02 88 ff ff 00 00 00 00 00 00 00 00 <30> 70 94 11 02 88 ff ff 30 70 94 11 02 88 ff ff 00 00 00 00 00 00 RSP: 0018:ffff880202b1fb48 EFLAGS: 00010293 RAX: 0000000000000000 RBX: ffffffff83657128 RCX: ffff880202b1fb98 RDX: 0000000000000000 RSI: ffff880212b0d5c0 RDI: ffffffff83657128 RBP: ffff880202b1fb88 R08: 00000000020000e0 R09: 0000000000000000 R10: ffff8802129c7340 R11: ffff880211947030 R12: ffff880212b0d5c0 R13: ffff880211947000 R14: ffff880211947088 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff88021fc00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffff880211947030 CR3: 00000001f1776000 CR4: 00000000001406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 Call Trace: __fib_lookup+0x6a/0xb0 net/ipv4/fib_rules.c:93 fib_lookup include/net/ip_fib.h:322 [inline] ip_route_output_key_hash_rcu+0x17e/0xc00 net/ipv4/route.c:2434 ip_route_output_key_hash+0x70/0x80 net/ipv4/route.c:2327 __ip_route_output_key include/net/route.h:124 [inline] ip_route_connect include/net/route.h:303 [inline] tcp_v4_connect+0x1a1/0x5a0 net/ipv4/tcp_ipv4.c:232 __inet_stream_connect+0xb1/0x440 net/ipv4/af_inet.c:655 inet_stream_connect+0x3b/0x60 net/ipv4/af_inet.c:719 rds_tcp_conn_path_connect+0x133/0x1b0 net/rds/tcp_connect.c:135 rds_connect_worker+0x77/0xc0 net/rds/threads.c:175 process_one_work+0x28e/0x580 kernel/workqueue.c:2153 worker_thread+0x317/0x690 kernel/workqueue.c:2296 kthread+0x127/0x140 kernel/kthread.c:247 ret_from_fork+0x35/0x40 arch/x86/entry/entry_64.S:415 Modules linked in: Dumping ftrace buffer: (ftrace buffer empty) CR2: ffff880211947030 ---[ end trace 3e9311dc3dfa3162 ]--- RIP: 0010:0xffff880211947030 Code: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 18 70 94 11 02 88 ff ff 18 70 94 11 02 88 ff ff 00 00 00 00 00 00 00 00 <30> 70 94 11 02 88 ff ff 30 70 94 11 02 88 ff ff 00 00 00 00 00 00 RSP: 0018:ffff880202b1fb48 EFLAGS: 00010293 RAX: 0000000000000000 RBX: ffffffff83657128 RCX: ffff880202b1fb98 RDX: 0000000000000000 RSI: ffff880212b0d5c0 RDI: ffffffff83657128 RBP: ffff880202b1fb88 R08: 00000000020000e0 R09: 0000000000000000 R10: ffff8802129c7340 R11: ffff880211947030 R12: ffff880212b0d5c0 R13: ffff880211947000 R14: ffff880211947088 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff88021fc00000(0000) knlGS:0000000000000000 sctp: [Deprecated]: syz-executor1 (pid 23032) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffff880211947030 CR3: 00000001f1776000 CR4: 00000000001406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600