00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x2]}, 0x48) 14:47:05 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000400)={0x13, 0x10, 0xfa00, {0x0}}, 0x18) 14:47:05 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="100000001ef9269bc10d83a4696c65309d846dc3f973aa37b1cb7169f2a093ad44c966382b79b0e9252594f1eb01995ead8e6e71bbba7750e17e39f8538c2a34e159172f512657f94090f709f118bb030bb92d82dfcd236cd198ef0ca2bc83cdf995c9d7be6d8f34"], 0x10) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:05 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1166.995959] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1167.032783] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x3c00000000000000]}, 0x48) 14:47:05 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:05 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x3, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="1000000017000007002e2f66e96c6527"], 0x10) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1167.135287] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:05 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0xa00000000000000]}, 0x2c) 14:47:05 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e6174000000000000000400", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x2000000000000000]}, 0x48) [ 1167.181394] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:06 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="106b6fe182559f07002e2f6618f71a0290000098b0e51b7a8814c901710d5588d5d4"], 0x10) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x8000, 0x0) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x23, &(0x7f00000000c0)={@broadcast, @multicast2, 0x0}, &(0x7f0000000100)=0xc) socketpair(0xb, 0x80004, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bind$xdp(r3, &(0x7f0000000440)={0x2c, 0x3, r4, 0x10, r5}, 0x10) 14:47:06 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x3, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="1000000017000007002e2f66e96c6527"], 0x10) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:47:06 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x3000000]}, 0x2c) [ 1167.354711] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:06 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x71000000]}, 0x48) [ 1167.399040] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:06 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e617400000000000000000000000000000300", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:06 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:06 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x4000000000000000]}, 0x48) 14:47:06 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x3, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="1000000017000007002e2f66e96c6527"], 0x10) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r0, 0xae80, 0x0) 14:47:06 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x12000000]}, 0x2c) [ 1167.554009] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:06 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e6174000000000000000000000200", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1167.600325] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:06 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x73000000]}, 0x48) 14:47:06 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = getpid() r2 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x1, 0x404000) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={0x0, 0x1f}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000240)={r3, 0x4}, &(0x7f0000000280)=0x8) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x2000000000, 0x0, 0x0, 0x0, 0x5, 0x0, 0x10000}, r1, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x10) r4 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r6 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) getsockopt$inet6_udp_int(r6, 0x11, 0x67, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) 14:47:06 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x3, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="1000000017000007002e2f66e96c6527"], 0x10) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r0, 0xae80, 0x0) [ 1167.698848] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:06 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0xd000000]}, 0x2c) 14:47:06 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e617400000000000000000000ff00", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:06 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x1ffffffffd, 0xffffeffffffffffe) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)=0x1, 0x4) r3 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x2, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGRAB(r3, 0x40044590, &(0x7f0000001840)) close(r3) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) write$binfmt_elf64(r2, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x194, 0x4, 0xba57, 0x0, 0x2, 0x3e, 0x1, 0x5, 0x40, 0x1fa, 0x4, 0x3f, 0x38, 0x2, 0x0, 0x6, 0x100000000}, [{0x7, 0x783f, 0x80000000, 0x7f, 0x2, 0x89a8, 0xd12, 0x1}], "0a836dadf85dcef959b936ef6477daaa5e4eac58e09f808f5982ed8a0fab7668eaa41e6cae12bd51a2aa9e9daf027bb8eed599b9ca89a0667180997f244824f98be89fadf0e1eb5850d073dfeb4afdfe1e30ce0bda0e44f7c705b75b73e60b8b3e2fc42b6f1a50213c1fce5798b0269db9aca129d0df4dd1f979fa641c9fea57b79104a0883cb1fdc48248e46215b29a86782f36512968e661f64f881c613d4e65053849cae4c1", [[], [], []]}, 0x41f) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:06 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x9fffffff]}, 0x48) 14:47:06 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x3, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="1000000017000007002e2f66e96c6527"], 0x10) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r0, 0xae80, 0x0) [ 1167.891179] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:06 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="1000000017000007002e2f666c653011966e7cfa1ec93ae1013676f73892af7f8df681860b597b2042405f3f626ac43772725a5fe79656692e76820cceba65188d0ba6c78ccdc52f15865ee640c77dd3d8f4a9098d38d40b5bb9de3f12b2a54ad4c9fa17855595f27dc68ba555c13ed0a90d4d200496e616349da5ea80e454eb1b953ca94905ed684b8f86b1cfcad477d20e6c30b5f36f19a449b978b15fa2e722799b35ea449af92a3c4807f5a3b7d0c60af3b7a371850593eb9f7d35"], 0x10) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:06 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0xf]}, 0x2c) 14:47:06 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x4c]}, 0x48) [ 1167.931628] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:06 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e6174000000000000000000000100", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:06 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x3, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:06 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x5]}, 0x2c) [ 1168.052924] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1168.091330] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:06 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x10000000000000]}, 0x48) 14:47:06 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e6174000000000000000200", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:06 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x200, 0x10000) socket$inet_udp(0x2, 0x2, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000000240)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x1c, 0x0, @in6}}, 0x1f4) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x0, 0x1003}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r2, 0x1}}, 0x10) 14:47:06 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x4000, 0x0) 14:47:06 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x700000000000000]}, 0x2c) 14:47:06 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x3, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x48000000]}, 0x48) [ 1168.284010] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:07 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x200, 0x10000) socket$inet_udp(0x2, 0x2, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000000240)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x1c, 0x0, @in6}}, 0x1f4) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x0, 0x1003}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r2, 0x1}}, 0x10) 14:47:07 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e6174000000000000000000000400", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1168.348218] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x2000000]}, 0x48) 14:47:07 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x200, 0x10000) socket$inet_udp(0x2, 0x2, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000000240)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x1c, 0x0, @in6}}, 0x1f4) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x0, 0x1003}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r2, 0x1}}, 0x10) 14:47:07 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x1400000000000000]}, 0x2c) 14:47:07 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x3, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:07 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x9, 0x200) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0106434, &(0x7f00000000c0)={0x101, 0x0, 0x3, 0x8d6}) ioctl$DRM_IOCTL_AGP_BIND(r3, 0x40086436, &(0x7f0000000100)={r4, 0x5}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:07 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1168.581220] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1168.597920] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x6800]}, 0x48) 14:47:07 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x200, 0x10000) socket$inet_udp(0x2, 0x2, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000000240)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x1c, 0x0, @in6}}, 0x1f4) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x1}}, 0x10) 14:47:07 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x4000000000000]}, 0x2c) 14:47:07 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x3, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1168.734302] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x63]}, 0x48) 14:47:07 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1168.791180] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:07 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:07 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x1000000]}, 0x2c) 14:47:07 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x200, 0x10000) socket$inet_udp(0x2, 0x2, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000000240)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x1}}, 0x10) 14:47:07 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x200, 0x10000) socket$inet_udp(0x2, 0x2, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000000240)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x1}}, 0x10) [ 1168.956418] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:07 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x3, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:07 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x40000]}, 0x2c) 14:47:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x4c00000000000000]}, 0x48) 14:47:07 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x200, 0x10000) socket$inet_udp(0x2, 0x2, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000000240)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x1}}, 0x10) [ 1169.036557] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:07 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="1000000017000007002e2f66696c6530ea4e7b287225659daed891ae428836f1c5fbe184968a66dd7f98031c6b317b8bf959e9c590d6ea2ef42da7494f1489fb6f000000000000"], 0x10) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_emit_ethernet(0x5e, &(0x7f0000000080)={@empty, @remote, [{[{0x9100, 0x6, 0x80, 0x3}], {0x8100, 0xfffffffffffffff9, 0x8, 0x2}}], {@canfd={0xd, {{0x2, 0x6, 0xad7f, 0x80000000}, 0x2c, 0x1, 0x0, 0x0, "65b765c7d8ca8f6f63ae3269d08d6bd41e55f947ecdc873245ff68062eed497caffee83637e3b95a81719ea6ce0cbda472a8eb2f49e3f601edffe1c42ef43660"}}}}, &(0x7f0000000000)={0x0, 0x1, [0x5d6, 0x85, 0x65b, 0x3bd]}) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x24000, 0x0) ioctl$GIO_SCRNMAP(r3, 0x4b40, &(0x7f00000003c0)=""/4096) 14:47:07 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:07 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r1, 0xae80, 0x0) 14:47:07 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x200, 0x10000) socket$inet_udp(0x2, 0x2, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000000240)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x1}}, 0x10) 14:47:07 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x1300]}, 0x2c) 14:47:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0xa000000]}, 0x48) 14:47:08 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r1, 0xae80, 0x0) 14:47:08 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e617400000000000000000600", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1169.296662] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1169.336755] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:08 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x200, 0x10000) socket$inet_udp(0x2, 0x2, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000000240)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x1}}, 0x10) 14:47:08 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x5000000]}, 0x48) 14:47:08 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x9]}, 0x2c) 14:47:08 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="1000000017000007002e2f666c653011966e7cfa1ec93ae1013676f73892af7f8df681860b597b2042405f3f626ac43772725a5fe79656692e76820cceba65188d0ba6c78ccdc52f15865ee640c77dd3d8f4a9098d38d40b5bb9de3f12b2a54ad4c9fa17855595f27dc68ba555c13ed0a90d4d200496e616349da5ea80e454eb1b953ca94905ed684b8f86b1cfcad477d20e6c30b5f36f19a449b978b15fa2e722799b35ea449af92a3c4807f5a3b7d0c60af3b7a371850593eb9f7d35"], 0x10) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:08 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x6]}, 0x48) 14:47:08 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x4400]}, 0x48) 14:47:08 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r1, 0xae80, 0x0) 14:47:08 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x10]}, 0x48) 14:47:08 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x200, 0x10000) socket$inet_udp(0x2, 0x2, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000000240)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x1}}, 0x10) 14:47:08 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x200, 0x10000) socket$inet_udp(0x2, 0x2, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000000240)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x1}}, 0x10) 14:47:08 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x113}}, 0x20) set_mempolicy(0x4003, &(0x7f0000000140)=0x3, 0x100) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000280)={0x14, 0x1c4, 0xfa00, {r1, 0x1c, 0x0, @in={0x2, 0x4e24, @multicast1}}}, 0x19c) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000200)={0xf, 0x8, 0xfa00, {r1, 0xf}}, 0x10) 14:47:08 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0xa]}, 0x2c) 14:47:08 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x6c]}, 0x48) 14:47:08 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e6174000000000000000500", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:08 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x3, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:08 executing program 3: syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x200, 0x10000) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x1}}, 0x10) 14:47:08 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x113}}, 0x20) set_mempolicy(0x4003, &(0x7f0000000140)=0x3, 0x100) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000280)={0x14, 0x1c4, 0xfa00, {r1, 0x1c, 0x0, @in={0x2, 0x4e24, @multicast1}}}, 0x19c) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000200)={0xf, 0x8, 0xfa00, {r1, 0xf}}, 0x10) 14:47:08 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0xffffff85]}, 0x48) 14:47:08 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x3, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:08 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x3f000000]}, 0x2c) 14:47:09 executing program 3: syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x200, 0x10000) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x1}}, 0x10) 14:47:09 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x6300000000000000]}, 0x48) [ 1170.308248] IPVS: ftp: loaded support on port[0] = 21 14:47:09 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$inet(0x2, 0x2, 0x5) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000300)=ANY=[@ANYBLOB="0000010000002f9928e67609c1e181790e12a6100ee74aa5c92ceeb9167f4ed0661f179fef7d539c272de219516b75eac5858ab3620a8d8b09554e2fd954415cae51f4d07c12c4b6c1f80bb655f538d3959573b8ab63d67309de982566ddf8f3cdeba07d0c24a4ea1bfae654e00d13cc8b85fe1a418acdc33652937f77dbd681ed4e409310f6808af643670691a21c147c6eece495faaaecc5921fea8c12"], &(0x7f00000002c0)=0x1) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000040)={0x2, 0x200, 0x1}, &(0x7f0000000180)=0x10) socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f0000a77ff8)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r4, 0x10f, 0x85, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000409004bddd9de91be10eeaf000ee9a90f798058439ed554fa07424ada75af1f02ac06edbcd7a071fb35331ce39c5a00000000") ioctl$TIOCGSID(r5, 0x5429, &(0x7f0000000080)) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000240)='dctcp\x00', 0x6) clock_gettime(0x0, &(0x7f0000000140)) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r3, 0xc2c45513, &(0x7f00000005c0)={{0x0, 0x1, 0x7, 0x2}, 0x0, [0x0, 0x1, 0x4, 0x6, 0x8, 0x0, 0x0, 0x3, 0x5, 0x5, 0x0, 0x9, 0x4, 0x8, 0x7, 0x6, 0x1ff, 0x8000, 0xfffffffffffffffa, 0x81, 0x8, 0x100000000, 0x4, 0x1, 0x1f, 0xffff, 0x9, 0x8, 0x21c9, 0x7fff, 0x9, 0x0, 0x5, 0x7ff, 0x1f, 0x7fff, 0x4, 0x80, 0x7fff, 0x8000, 0x50, 0x6, 0x8001, 0x8, 0xfff, 0x400, 0x8, 0x1ec40000000, 0x4, 0x560a, 0x1d39, 0x2, 0x0, 0x81, 0x1, 0x10000, 0xf42, 0x3, 0x0, 0x100000000, 0x24bb, 0x5, 0x8000, 0x40, 0x8, 0xfffffffffffffffc, 0x7, 0xfffffffffffffd71, 0x9, 0xb5, 0x3, 0xfffffffffffffff7, 0x76, 0x8, 0x4, 0x3ff, 0x0, 0x5, 0x1, 0x7f, 0xff, 0x4, 0x9, 0x2, 0x4, 0x8, 0x5, 0x9, 0x3, 0x7f, 0x3ff, 0x5, 0x9, 0x5, 0x7, 0x80, 0x96b8, 0x81, 0x5, 0x1f, 0x6, 0x9, 0x0, 0x5, 0x0, 0x3, 0x7fb3, 0xf99, 0x3, 0x1, 0x100, 0x0, 0x0, 0xffff, 0x2, 0x1, 0x7ff, 0xffff, 0x9, 0x1, 0x3, 0x7, 0xfffffffffffffffb, 0x800, 0x1ff, 0x100000000, 0xffffffffffffff00, 0x1f]}) sendto$inet(r1, &(0x7f0000000140), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x4e23, @rand_addr}, 0x10) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000180)=ANY=[], 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000500)="c3401c344654090000001ba48c8e319aa4eedc3d6bd8ebd65c856a27d61154adc2b2a9763ae0001c0d32e11f38e9dd18c58f6bd779650fc30f93653bdaecf323c9f6502ceab47e58114347b289546465a5eb278de12b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d08d4154004997e317b79", 0x82, 0x0, &(0x7f0000000100)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000000c0)='yeah\x00', 0xa7) shutdown(r1, 0x1) r6 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r7 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r7, 0x29, 0xd3, &(0x7f00000001c0)={{0xa, 0x4e20, 0x9, @mcast2, 0x5}, {0xa, 0x4e21, 0x401, @mcast1, 0x27ee}, 0x90d000000, [0x0, 0x4, 0x4, 0x6, 0x1, 0xfffffffffffff000, 0x4, 0x7fff]}, 0x5c) r8 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r6, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r8, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r8, 0xae80, 0x0) ioctl$KVM_RUN(r8, 0xae80, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r7, 0x10e, 0xa, &(0x7f0000000000)=0x7, 0x4) [ 1170.714927] device bridge_slave_1 left promiscuous mode [ 1170.720470] bridge0: port 2(bridge_slave_1) entered disabled state [ 1170.775105] device bridge_slave_0 left promiscuous mode [ 1170.780556] bridge0: port 1(bridge_slave_0) entered disabled state [ 1170.876065] team0 (unregistering): Port device team_slave_1 removed [ 1170.886477] team0 (unregistering): Port device team_slave_0 removed [ 1170.896365] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1170.918912] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1170.972409] bond0 (unregistering): Released all slaves [ 1171.405251] bridge0: port 1(bridge_slave_0) entered blocking state [ 1171.411911] bridge0: port 1(bridge_slave_0) entered disabled state [ 1171.419736] device bridge_slave_0 entered promiscuous mode [ 1171.463156] bridge0: port 2(bridge_slave_1) entered blocking state [ 1171.469601] bridge0: port 2(bridge_slave_1) entered disabled state [ 1171.477102] device bridge_slave_1 entered promiscuous mode [ 1171.517265] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1171.558335] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1171.682448] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1171.727630] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1171.948501] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1171.955894] team0: Port device team_slave_0 added [ 1171.995889] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1172.003257] team0: Port device team_slave_1 added [ 1172.043475] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1172.088814] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1172.095740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1172.104955] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1172.127731] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1172.135268] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1172.143163] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1172.173929] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1172.181201] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1172.190158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1172.507762] bridge0: port 2(bridge_slave_1) entered blocking state [ 1172.514113] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1172.520765] bridge0: port 1(bridge_slave_0) entered blocking state [ 1172.527182] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1172.535394] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1173.084616] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1173.403408] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1173.487487] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1173.572135] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1173.578334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1173.585763] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1173.674962] 8021q: adding VLAN 0 to HW filter on device team0 14:47:12 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x4]}, 0x48) 14:47:12 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x3, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:12 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e617400000000000000000000000000000100", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:12 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0xb00]}, 0x2c) 14:47:12 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x1}}, 0x10) 14:47:12 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)=@known='trusted.overlay.metacopy\x00', &(0x7f0000000200)=""/4096, 0x1000) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r2, 0x1c, 0x0, @in6}}, 0x90) readlink(&(0x7f00000013c0)='./file1\x00', &(0x7f0000001400)=""/154, 0x9a) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000001280)={0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f00000012c0)={'ah\x00'}, &(0x7f0000001300)=0x1e) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000001240)) r4 = fcntl$dupfd(r1, 0x406, r0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f00000014c0)={0x0, 0x80000001}, &(0x7f0000001500)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000001540)={r5, 0xcd, 0x20}, &(0x7f0000001580)=0xc) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r4, 0x84, 0x21, &(0x7f0000001340), &(0x7f0000001380)=0x4) [ 1174.203094] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1174.212157] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:12 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x5]}, 0x48) [ 1174.285740] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1174.295503] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:13 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x4c000000]}, 0x48) 14:47:13 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x1}}, 0x10) 14:47:13 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x1100000000000000]}, 0x2c) 14:47:13 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:13 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e617400000000000000000000000000000400", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:13 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)=@known='trusted.overlay.metacopy\x00', &(0x7f0000000200)=""/4096, 0x1000) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r2, 0x1c, 0x0, @in6}}, 0x90) readlink(&(0x7f00000013c0)='./file1\x00', &(0x7f0000001400)=""/154, 0x9a) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000001280)={0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f00000012c0)={'ah\x00'}, &(0x7f0000001300)=0x1e) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000001240)) r4 = fcntl$dupfd(r1, 0x406, r0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f00000014c0)={0x0, 0x80000001}, &(0x7f0000001500)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000001540)={r5, 0xcd, 0x20}, &(0x7f0000001580)=0xc) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r4, 0x84, 0x21, &(0x7f0000001340), &(0x7f0000001380)=0x4) 14:47:13 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x7100]}, 0x48) 14:47:13 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x600000000000000]}, 0x2c) 14:47:13 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x1}}, 0x10) 14:47:13 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:13 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x7a00000000000000]}, 0x48) [ 1174.600378] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1174.630559] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:13 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)=@known='trusted.overlay.metacopy\x00', &(0x7f0000000200)=""/4096, 0x1000) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r2, 0x1c, 0x0, @in6}}, 0x90) readlink(&(0x7f00000013c0)='./file1\x00', &(0x7f0000001400)=""/154, 0x9a) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000001280)={0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f00000012c0)={'ah\x00'}, &(0x7f0000001300)=0x1e) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000001240)) r4 = fcntl$dupfd(r1, 0x406, r0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f00000014c0)={0x0, 0x80000001}, &(0x7f0000001500)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000001540)={r5, 0xcd, 0x20}, &(0x7f0000001580)=0xc) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r4, 0x84, 0x21, &(0x7f0000001340), &(0x7f0000001380)=0x4) 14:47:13 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:13 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x1}}, 0x10) 14:47:13 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:13 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x7000000]}, 0x48) 14:47:13 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x13000000]}, 0x2c) 14:47:13 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x1}}, 0x10) [ 1174.843740] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:13 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x6c00]}, 0x48) 14:47:13 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1174.897187] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:13 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)=@known='trusted.overlay.metacopy\x00', &(0x7f0000000200)=""/4096, 0x1000) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r2, 0x1c, 0x0, @in6}}, 0x90) readlink(&(0x7f00000013c0)='./file1\x00', &(0x7f0000001400)=""/154, 0x9a) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000001280)={0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f00000012c0)={'ah\x00'}, &(0x7f0000001300)=0x1e) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000001240)) r4 = fcntl$dupfd(r1, 0x406, r0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f00000014c0)={0x0, 0x80000001}, &(0x7f0000001500)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000001540)={r5, 0xcd, 0x20}, &(0x7f0000001580)=0xc) 14:47:13 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x1}}, 0x10) 14:47:13 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0xf00]}, 0x2c) 14:47:13 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:13 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x7a00]}, 0x48) 14:47:13 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x1}}, 0x10) 14:47:13 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:13 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e61740000000000000000ff00", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:13 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x7]}, 0x2c) [ 1175.131561] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1175.154142] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:13 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x700]}, 0x48) 14:47:13 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x1}}, 0x10) 14:47:13 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)=@known='trusted.overlay.metacopy\x00', &(0x7f0000000200)=""/4096, 0x1000) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r2, 0x1c, 0x0, @in6}}, 0x90) readlink(&(0x7f00000013c0)='./file1\x00', &(0x7f0000001400)=""/154, 0x9a) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000001280)={0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f00000012c0)={'ah\x00'}, &(0x7f0000001300)=0x1e) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000001240)) r4 = fcntl$dupfd(r1, 0x406, r0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f00000014c0)={0x0, 0x80000001}, &(0x7f0000001500)=0x8) [ 1175.316927] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:14 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:14 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0xffffff9c]}, 0x48) 14:47:14 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:14 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0xe00000000000000]}, 0x2c) [ 1175.369172] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:14 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x1}}, 0x10) 14:47:14 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x4400000000000000]}, 0x48) 14:47:14 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)=@known='trusted.overlay.metacopy\x00', &(0x7f0000000200)=""/4096, 0x1000) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r2, 0x1c, 0x0, @in6}}, 0x90) readlink(&(0x7f00000013c0)='./file1\x00', &(0x7f0000001400)=""/154, 0x9a) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000001280)={0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f00000012c0)={'ah\x00'}, &(0x7f0000001300)=0x1e) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000001240)) fcntl$dupfd(r1, 0x406, r0) 14:47:14 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x11000000]}, 0x2c) 14:47:14 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:14 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x1}}, 0x10) [ 1175.600102] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:14 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0xff00000000000000]}, 0x48) 14:47:14 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e6174000000000000000300", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:14 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)=@known='trusted.overlay.metacopy\x00', &(0x7f0000000200)=""/4096, 0x1000) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6}}, 0x90) readlink(&(0x7f00000013c0)='./file1\x00', &(0x7f0000001400)=""/154, 0x9a) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000001280)={0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(r2, 0x29, 0x44, &(0x7f00000012c0)={'ah\x00'}, &(0x7f0000001300)=0x1e) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000001240)) 14:47:14 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x1400]}, 0x2c) 14:47:14 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x1}}, 0x10) 14:47:14 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x44000000]}, 0x48) [ 1175.752881] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:14 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:14 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x1}}, 0x10) 14:47:14 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x200000000000000]}, 0x2c) [ 1175.883851] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:14 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x7400000000000000]}, 0x48) 14:47:14 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:14 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x1}}, 0x10) 14:47:14 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:14 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)=@known='trusted.overlay.metacopy\x00', &(0x7f0000000200)=""/4096, 0x1000) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6}}, 0x90) readlink(&(0x7f00000013c0)='./file1\x00', &(0x7f0000001400)=""/154, 0x9a) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000001280)={0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(r2, 0x29, 0x44, &(0x7f00000012c0)={'ah\x00'}, &(0x7f0000001300)=0x1e) [ 1176.025633] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1176.050608] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:14 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e61740000000000000000000000000000ff00", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:14 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x85ffffff00000000]}, 0x48) 14:47:14 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x1}}, 0x10) 14:47:14 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x100000000000000]}, 0x2c) 14:47:14 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)=@known='trusted.overlay.metacopy\x00', &(0x7f0000000200)=""/4096, 0x1000) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6}}, 0x90) readlink(&(0x7f00000013c0)='./file1\x00', &(0x7f0000001400)=""/154, 0x9a) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000001280)) 14:47:14 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:14 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e617400000000000000000000007fffffff00", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1176.214535] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1176.250425] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:14 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x18100000]}, 0x48) 14:47:15 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x1}}, 0x10) 14:47:15 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x400000000000000]}, 0x2c) [ 1176.341053] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:15 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)=@known='trusted.overlay.metacopy\x00', &(0x7f0000000200)=""/4096, 0x1000) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6}}, 0x90) readlink(&(0x7f00000013c0)='./file1\x00', &(0x7f0000001400)=""/154, 0x9a) 14:47:15 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e617400000000000000000000000000000200", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1176.397504] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:15 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x1}}, 0x10) 14:47:15 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:15 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x2000]}, 0x48) [ 1176.466833] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:15 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x6000000]}, 0x2c) [ 1176.518914] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:15 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:15 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)=@known='trusted.overlay.metacopy\x00', &(0x7f0000000200)=""/4096, 0x1000) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6}}, 0x90) 14:47:15 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x1}}, 0x10) 14:47:15 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:15 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)=@known='trusted.overlay.metacopy\x00', &(0x7f0000000200)=""/4096, 0x1000) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x1c, 0x0, @in6}}, 0x90) 14:47:15 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e617400000000000000000000000000000600", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:15 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x3c]}, 0x48) [ 1176.652855] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1176.678207] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:15 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x700]}, 0x2c) 14:47:15 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x1}}, 0x10) [ 1176.815066] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:15 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r1, 0xae80, 0x0) 14:47:15 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e617400000000000000000000000000000500", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:15 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x55381c0000000000]}, 0x48) 14:47:15 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x600]}, 0x2c) 14:47:15 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)=@known='trusted.overlay.metacopy\x00', &(0x7f0000000200)=""/4096, 0x1000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6}}, 0x90) 14:47:15 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x1}}, 0x10) [ 1176.966856] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1176.992884] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:15 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x1000000000000]}, 0x48) 14:47:15 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r1, 0xae80, 0x0) 14:47:15 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)=@known='trusted.overlay.metacopy\x00', &(0x7f0000000200)=""/4096, 0x1000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6}}, 0x90) 14:47:15 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x300]}, 0x2c) 14:47:15 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:15 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x1}}, 0x10) 14:47:15 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x3f000000]}, 0x48) 14:47:15 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)=@known='trusted.overlay.metacopy\x00', &(0x7f0000000200)=""/4096, 0x1000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6}}, 0x90) 14:47:15 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r1, 0xae80, 0x0) [ 1177.185303] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1177.221268] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:15 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e6174000000000000007fffffff00", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:16 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, 0x0, 0x0) 14:47:16 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x500000000000000]}, 0x2c) 14:47:16 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6}}, 0x90) 14:47:16 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x6c00000000000000]}, 0x48) 14:47:16 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1177.373762] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:16 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:16 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, 0x0, 0x0) [ 1177.439928] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:16 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0xb00000000000000]}, 0x2c) 14:47:16 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r0, 0x1c, 0x0, @in6}}, 0x90) 14:47:16 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x3000000]}, 0x48) 14:47:16 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1177.566849] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:16 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e61740000000000000000000000000000000500", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:16 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, 0x0, 0x0) 14:47:16 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r0, 0x1c, 0x0, @in6}}, 0x90) 14:47:16 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x700000000000000]}, 0x48) 14:47:16 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0xc000000]}, 0x2c) 14:47:16 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1177.729357] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:16 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:16 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8}, 0x10) 14:47:16 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x1000000]}, 0x48) 14:47:16 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r0, 0x1c, 0x0, @in6}}, 0x90) 14:47:16 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e617400000000000000000000000300", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:16 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0xa00]}, 0x48) [ 1177.874114] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1177.906025] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:16 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:16 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0xb000000]}, 0x2c) 14:47:16 executing program 3: pwrite64(0xffffffffffffffff, &(0x7f0000000200)="d96574c9698ba1fec1", 0x9, 0x0) r0 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000240)={'syz'}, &(0x7f0000000300)="0700542df80000000000000000000000", 0x10, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r1, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'sha224-avx2\x00'}}) [ 1178.008713] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:16 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6}}, 0x90) 14:47:16 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x44]}, 0x48) 14:47:16 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e61740000000000000000000300", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:16 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x40000000]}, 0x2c) 14:47:16 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:16 executing program 3: clone(0x3102001ff3, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000003e80), 0x1c) r1 = dup2(r0, r0) syz_execute_func(&(0x7f00000002c0)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0xfdf2) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000100), 0x8) [ 1178.183338] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1178.192967] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:16 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e61740000000000000000000600", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:16 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x435]}, 0x48) 14:47:16 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6}}, 0x90) 14:47:16 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x2, 0x9, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) 14:47:17 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x2]}, 0x2c) 14:47:17 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1178.346672] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:17 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:47:17 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x40000000]}, 0x48) 14:47:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x400}]}, 0x10) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x100, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) r1 = socket$inet6(0xa, 0x3, 0x6) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00', 0x9) sendto$inet6(r2, &(0x7f0000000280), 0x0, 0x2000012c, 0x0, 0x0) close(r0) 14:47:17 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6}}, 0x90) [ 1178.513023] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:17 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x3f00]}, 0x48) 14:47:17 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x1500000000000000]}, 0x2c) 14:47:17 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e6174000000000000000000000000000000ff00", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1178.569952] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:17 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x6, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00', 0x9) sendto$inet6(r1, &(0x7f0000000280), 0x0, 0x2000012c, 0x0, 0x0) close(r0) [ 1178.689704] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:17 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6}}, 0x90) 14:47:17 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x1100]}, 0x2c) 14:47:17 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x61000000]}, 0x48) 14:47:17 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'sit0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000080)={@dev}) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 14:47:17 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e617400000000000000000000000100", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:17 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6}}, 0x90) 14:47:17 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x500]}, 0x48) 14:47:17 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x900]}, 0x2c) 14:47:17 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x10000014c) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) [ 1178.936944] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:17 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6}}, 0x90) [ 1179.010011] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:17 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2]}, 0x48) 14:47:17 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e617400000000000000000300", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:17 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6}}, 0x90) 14:47:17 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x15]}, 0x2c) 14:47:17 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x3504]}, 0x48) [ 1179.183326] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1179.256646] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1179.497231] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1179.503996] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 14:47:18 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="550000001e007f5300fe01b2a4a280930a06000000a8430891000000390008000a000c0000dc1338d54400009b84136ef75afb83de448daa7227c43ab8220000060cec4fab91d40000000000000000000000000000", 0x55}], 0x1}, 0x0) 14:47:18 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0), 0x2000000000000}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000700)={0x16, 0x98, 0xfa00, {&(0x7f0000000340), 0x0, 0xffffffffffffffff, 0x1c, 0x0, @ib={0x1b, 0x0, 0x0, {"6d3a03a22ad13804238c25806cdd75ac"}}}}, 0xa0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x200000, 0x0, 0x1000, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x339, 0x0, 0x0, 0x0, 0x2000000002, 0x0, 0x0, 0x2cb3, 0x7, 0x0, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vsock\x00', 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x80, 0x0) readv(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f00000000c0)=""/176, 0xb0}], 0x1) r2 = add_key$user(&(0x7f0000000680)='user\x00', &(0x7f00000008c0)={'syz', 0x3}, &(0x7f0000000900)="5c195772864583bec847f2c6fb876dac7e566b1240169fe75e19f3fc3ecae3f4d24c5cf12e9b8c187a8d95bb0a3f9b6a854e49962e2c31a155edbca2a6cc8de47272781bafbaa0a4dd1a584e8ab21484ffafdd2477a0a24f278460cb71730afbfc2c61b14daf98d5dffbd0472992adff47437cd3d82b1e2eec3247b103432f7c955b4081b7e1c3b2a0871a413f9184fa2123", 0x92, 0xffffffffffffffff) keyctl$invalidate(0x15, r2) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f00000006c0)=""/23) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000600)='/dev/qat_adf_ctl\x00', 0x600001, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0x8000080000000020) syz_open_dev$dmmidi(&(0x7f0000000a80)='/dev/dmmidi#\x00', 0x1, 0x20400) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000280)={0x7d, 0x6}) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x1, 0xad7, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7f}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x80000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='em0mime_typecpuset\x00'}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getpid() ioctl$EVIOCGEFFECTS(r3, 0x80044584, &(0x7f00000003c0)=""/126) io_setup(0x5, &(0x7f00000009c0)=0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000ac0)) ioctl$VIDIOC_G_OUTPUT(r0, 0x8004562e, &(0x7f0000000080)) io_destroy(r4) ioctl$sock_SIOCDELDLCI(r3, 0x8981, &(0x7f00000005c0)={'ifb0\x00', 0x1ff}) llistxattr(&(0x7f0000000240)='./file0\x00', &(0x7f00000007c0)=""/196, 0x2b7) get_mempolicy(&(0x7f0000000a00), &(0x7f0000000a40), 0x9, &(0x7f0000ffe000/0x2000)=nil, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000480)={0x10, 0x0, 0x7}, 0x10) openat$vsock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vsock\x00', 0x200100, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @rand_addr}, &(0x7f0000000180)=0x10) 14:47:18 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6}}, 0x90) 14:47:18 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e617400000000000000000600", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:18 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x6300000000000000]}, 0x48) 14:47:18 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x1500]}, 0x2c) 14:47:18 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x35040000]}, 0x48) [ 1179.882929] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:18 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6}}, 0x90) 14:47:18 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e61740000000000000000000000007fffffff00", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:18 executing program 5: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000100)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0xffffffffffffffbc}, 0x68) 14:47:18 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x10]}, 0x2c) 14:47:18 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6}}, 0x90) [ 1180.099983] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:18 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0x48) 14:47:18 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0), 0x2000000000000}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000700)={0x16, 0x98, 0xfa00, {&(0x7f0000000340), 0x0, 0xffffffffffffffff, 0x1c, 0x0, @ib={0x1b, 0x0, 0x0, {"6d3a03a22ad13804238c25806cdd75ac"}}}}, 0xa0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x200000, 0x0, 0x1000, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x339, 0x0, 0x0, 0x0, 0x2000000002, 0x0, 0x0, 0x2cb3, 0x7, 0x0, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vsock\x00', 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x80, 0x0) readv(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f00000000c0)=""/176, 0xb0}], 0x1) r2 = add_key$user(&(0x7f0000000680)='user\x00', &(0x7f00000008c0)={'syz', 0x3}, &(0x7f0000000900)="5c195772864583bec847f2c6fb876dac7e566b1240169fe75e19f3fc3ecae3f4d24c5cf12e9b8c187a8d95bb0a3f9b6a854e49962e2c31a155edbca2a6cc8de47272781bafbaa0a4dd1a584e8ab21484ffafdd2477a0a24f278460cb71730afbfc2c61b14daf98d5dffbd0472992adff47437cd3d82b1e2eec3247b103432f7c955b4081b7e1c3b2a0871a413f9184fa2123", 0x92, 0xffffffffffffffff) keyctl$invalidate(0x15, r2) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f00000006c0)=""/23) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000600)='/dev/qat_adf_ctl\x00', 0x600001, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0x8000080000000020) syz_open_dev$dmmidi(&(0x7f0000000a80)='/dev/dmmidi#\x00', 0x1, 0x20400) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000280)={0x7d, 0x6}) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x1, 0xad7, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7f}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x80000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='em0mime_typecpuset\x00'}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getpid() ioctl$EVIOCGEFFECTS(r3, 0x80044584, &(0x7f00000003c0)=""/126) io_setup(0x5, &(0x7f00000009c0)=0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000ac0)) ioctl$VIDIOC_G_OUTPUT(r0, 0x8004562e, &(0x7f0000000080)) io_destroy(r4) ioctl$sock_SIOCDELDLCI(r3, 0x8981, &(0x7f00000005c0)={'ifb0\x00', 0x1ff}) llistxattr(&(0x7f0000000240)='./file0\x00', &(0x7f00000007c0)=""/196, 0x2b7) get_mempolicy(&(0x7f0000000a00), &(0x7f0000000a40), 0x9, &(0x7f0000ffe000/0x2000)=nil, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000480)={0x10, 0x0, 0x7}, 0x10) openat$vsock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vsock\x00', 0x200100, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @rand_addr}, &(0x7f0000000180)=0x10) [ 1180.211556] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:18 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e61740000000000000000000000000000000200", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:18 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0), 0x2000000000000}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000700)={0x16, 0x98, 0xfa00, {&(0x7f0000000340), 0x0, 0xffffffffffffffff, 0x1c, 0x0, @ib={0x1b, 0x0, 0x0, {"6d3a03a22ad13804238c25806cdd75ac"}}}}, 0xa0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x200000, 0x0, 0x1000, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x339, 0x0, 0x0, 0x0, 0x2000000002, 0x0, 0x0, 0x2cb3, 0x7, 0x0, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vsock\x00', 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x80, 0x0) readv(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f00000000c0)=""/176, 0xb0}], 0x1) r2 = add_key$user(&(0x7f0000000680)='user\x00', &(0x7f00000008c0)={'syz', 0x3}, &(0x7f0000000900)="5c195772864583bec847f2c6fb876dac7e566b1240169fe75e19f3fc3ecae3f4d24c5cf12e9b8c187a8d95bb0a3f9b6a854e49962e2c31a155edbca2a6cc8de47272781bafbaa0a4dd1a584e8ab21484ffafdd2477a0a24f278460cb71730afbfc2c61b14daf98d5dffbd0472992adff47437cd3d82b1e2eec3247b103432f7c955b4081b7e1c3b2a0871a413f9184fa2123", 0x92, 0xffffffffffffffff) keyctl$invalidate(0x15, r2) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f00000006c0)=""/23) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000600)='/dev/qat_adf_ctl\x00', 0x600001, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) mkdir(&(0x7f0000000380)='./file0\x00', 0x8000080000000020) syz_open_dev$dmmidi(&(0x7f0000000a80)='/dev/dmmidi#\x00', 0x1, 0x20400) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000280)={0x7d, 0x6}) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x1, 0xad7, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7f}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x80000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='em0mime_typecpuset\x00'}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getpid() ioctl$EVIOCGEFFECTS(r3, 0x80044584, &(0x7f00000003c0)=""/126) io_setup(0x5, &(0x7f00000009c0)=0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000ac0)) ioctl$VIDIOC_G_OUTPUT(r0, 0x8004562e, &(0x7f0000000080)) io_destroy(r4) ioctl$sock_SIOCDELDLCI(r3, 0x8981, &(0x7f00000005c0)={'ifb0\x00', 0x1ff}) llistxattr(&(0x7f0000000240)='./file0\x00', &(0x7f00000007c0)=""/196, 0x2b7) get_mempolicy(&(0x7f0000000a00), &(0x7f0000000a40), 0x9, &(0x7f0000ffe000/0x2000)=nil, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000480)={0x10, 0x0, 0x7}, 0x10) openat$vsock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vsock\x00', 0x200100, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @rand_addr}, &(0x7f0000000180)=0x10) 14:47:18 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6}}, 0x90) 14:47:19 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0xe000000]}, 0x2c) [ 1180.382858] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:19 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x4400]}, 0x48) 14:47:19 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e61740000000000000000000500", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:19 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6}}, 0x90) [ 1180.550313] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:19 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x1200]}, 0x2c) 14:47:19 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x6300]}, 0x48) 14:47:19 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6}}, 0x90) 14:47:19 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1180.786540] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1180.828340] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1180.857223] Unknown ioctl -2147199442 [ 1180.911907] Unknown ioctl -2147199442 14:47:19 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) writev(r0, &(0x7f0000003440)=[{&(0x7f00000001c0)='\x00', 0x1}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2b0b, 0x0, 0x0, 0x0, 0xffff}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xfdfdffff}) 14:47:19 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6}}, 0x90) 14:47:19 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0x1c, 0x6, 0x3, 0x2, 0xffffffffffffff9c}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001100)={r0, &(0x7f00000000c0), 0x0}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f00000000c0)}, 0x10) 14:47:19 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x7a]}, 0x48) 14:47:19 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x1800]}, 0x2c) 14:47:19 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:19 executing program 3: clone(0x3102001ff3, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000003e80), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0xfdf2) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) write$apparmor_exec(r1, 0x0, 0x0) 14:47:19 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6}}, 0x90) 14:47:20 executing program 5: process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000002040)=""/224, 0xe0}], 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000002580)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f0000000f40)=""/31, 0x1f}, 0x4}], 0x1, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$xdp(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000780)={0x2c, 0x0, 0x0, 0x27}, 0x10, 0x0}, 0x0) recvmsg(r0, &(0x7f00000002c0)={&(0x7f0000000140)=@hci, 0x80, 0x0}, 0x0) process_vm_writev(0x0, &(0x7f0000000b80)=[{&(0x7f0000000700)=""/124, 0x7c}, {&(0x7f0000000d00)=""/226, 0x1d1}, {&(0x7f0000000980)=""/69, 0x45}], 0x3, &(0x7f0000002180), 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f00000000c0)=""/85, 0xb}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x6c}, {&(0x7f0000000480)=""/60, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x40d}, {&(0x7f0000000340)=""/22, 0x16}], 0x161, &(0x7f0000000600)=""/191, 0xbf}}], 0x40000000000020a, 0x0, &(0x7f0000003700)={0x77359400}) 14:47:20 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e61740000000000000000000000000000000400", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1181.302849] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:20 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x2, 0x0, 0x0, 0x0, 0x2, 0x0, 0x70bd27}, 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="020a040007000000000013002d54036205001a0086cebafc22000000000000001ac600b20000000000fb0000000000f20700000002000020"], 0x38}}, 0x0) sendmmsg(r1, &(0x7f0000000180), 0x20, 0x0) 14:47:20 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0xd00]}, 0x2c) 14:47:20 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6}}, 0x90) 14:47:20 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x74]}, 0x48) 14:47:20 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x10) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 14:47:20 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x10000000000000]}, 0x48) 14:47:20 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x3]}, 0x2c) 14:47:20 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000000380)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10811, r0, 0x0) 14:47:20 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x100000]}, 0x48) 14:47:20 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x12]}, 0x2c) 14:47:20 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x1c, 0x0, @in6}}, 0x90) 14:47:21 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c0000001a001102000000000030a977876723d1128929884b070000b0020000000000000000000000c7efe07eba89"], 0x1}}, 0x0) 14:47:21 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e6174000000000000000000ff00", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x100, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) r1 = socket$inet6(0xa, 0x3, 0x6) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00', 0x9) sendto$inet6(r2, &(0x7f0000000280), 0x0, 0x2000012c, 0x0, 0x0) close(r0) 14:47:21 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6}}, 0x90) 14:47:21 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x300000000000000]}, 0x2c) 14:47:21 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x7400]}, 0x48) 14:47:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0xd}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000002c7, 0x0) 14:47:21 executing program 5: r0 = creat(0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000003c0)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000008c0)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c343cbabfb4e32f1439006c7c78313c7b7e61e641a6cc53e6828a03fd5a33613ce37b93ecf7e27e7bd0ee892da4e3bb67068966c39f8e12dd019f87355be0a1892950a508f81c4fd9ae48d74c386fb2d44b2ea8d2757a4b5f30d626f25275", 0x2761, 0x0) dup2(r0, r0) write$cgroup_pid(r3, &(0x7f0000000080), 0xfffffe38) r4 = dup3(r2, r0, 0x80000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect(r4, &(0x7f0000000480)=@nfc={0x27, 0x1, 0x0, 0x4}, 0x80) write(r0, 0x0, 0x2f) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x5) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000300), &(0x7f0000000340)=0xc) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000240)=0x856, &(0x7f0000000400)=0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x660c, 0x4000001) r5 = epoll_create(0xffffffffffffffff) getsockopt$inet6_mreq(r3, 0x29, 0x14, &(0x7f0000000100)={@empty, 0x0}, &(0x7f0000000440)=0x14) connect$packet(r5, &(0x7f00000005c0)={0x11, 0xfd, r6, 0x1, 0x8835}, 0x14) poll(&(0x7f0000000380)=[{r1, 0x10}, {r0, 0x2}], 0x2, 0x3) pread64(r4, &(0x7f0000000540)=""/24, 0x18, 0x0) writev(0xffffffffffffffff, &(0x7f0000e11ff0), 0x0) r7 = openat$cgroup_ro(r3, &(0x7f00000002c0)='cgroup.controllers\x00', 0x0, 0x0) r8 = add_key(&(0x7f0000000600)='rxrpc\x00', &(0x7f0000000640)={'syz', 0x1}, &(0x7f0000000680)="6cd006d98d9bf2e48c2dc98de3aae61ac5aeb5eab25d3e9b3a7073602495d8a2bd97ad90aac35579186778dd3f5113f66bfa5d3354556bba443a03d3a7c730336bc92698f1d274d007b17140fe1ea4978e7f3a0d4e49019a11385265ff72dc74cd5c1c5e5eb52ca30d8e8914c8260a844a499a48eb221141e05afc2113150b13ce0ec62fdf20599220c83e82f0", 0x8d, 0x0) r9 = add_key(&(0x7f0000000740)='asymmetric\x00', &(0x7f00000007c0)={'syz', 0x0}, &(0x7f0000000800)="eeb76f905a94032cab481b3a8af542af7ae775f0949963c38be9da5351b9137c064c8765f624888a153719f28042515c02cd7d7784549d35c6a4", 0x3a, 0xfffffffffffffffe) keyctl$unlink(0x9, r8, r9) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000200)={r10, @multicast2, @remote}, 0xc) clock_gettime(0x0, &(0x7f0000000280)) utimensat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', &(0x7f0000000500)={{}, {0x77359400}}, 0xfffffffffffffffe) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000140)=[@window={0x3, 0x3a, 0xffff}, @window={0x3, 0x30000000000, 0x6}, @sack_perm, @sack_perm], 0x4) open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) 14:47:21 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x7a00000000000000]}, 0x48) [ 1182.739325] IPVS: ftp: loaded support on port[0] = 21 14:47:21 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x1c, 0x0, @in6}}, 0x90) 14:47:21 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x4000000000000000]}, 0x2c) 14:47:21 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x48) 14:47:21 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6}}, 0x90) [ 1183.326490] device bridge_slave_1 left promiscuous mode [ 1183.337381] bridge0: port 2(bridge_slave_1) entered disabled state [ 1183.405836] device bridge_slave_0 left promiscuous mode [ 1183.411333] bridge0: port 1(bridge_slave_0) entered disabled state [ 1183.535184] team0 (unregistering): Port device team_slave_1 removed [ 1183.545689] team0 (unregistering): Port device team_slave_0 removed [ 1183.556680] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1183.579466] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1183.653136] bond0 (unregistering): Released all slaves [ 1184.149352] bridge0: port 1(bridge_slave_0) entered blocking state [ 1184.156238] bridge0: port 1(bridge_slave_0) entered disabled state [ 1184.163582] device bridge_slave_0 entered promiscuous mode [ 1184.208325] bridge0: port 2(bridge_slave_1) entered blocking state [ 1184.215205] bridge0: port 2(bridge_slave_1) entered disabled state [ 1184.222540] device bridge_slave_1 entered promiscuous mode [ 1184.264954] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1184.309729] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1184.444746] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1184.490669] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1184.702701] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1184.711848] team0: Port device team_slave_0 added [ 1184.755251] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1184.762641] team0: Port device team_slave_1 added [ 1184.806100] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1184.812942] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1184.828871] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1184.866372] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1184.873313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1184.889822] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1184.924556] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1184.931728] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1184.943259] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1184.976008] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1184.983138] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1184.992338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1185.322240] bridge0: port 2(bridge_slave_1) entered blocking state [ 1185.328734] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1185.335507] bridge0: port 1(bridge_slave_0) entered blocking state [ 1185.341883] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1185.349663] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1185.744688] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1186.277074] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1186.366350] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1186.456064] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1186.462322] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1186.469600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1186.562654] 8021q: adding VLAN 0 to HW filter on device team0 14:47:25 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6}}, 0x90) 14:47:25 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e617400000000000000000200", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:25 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x9fffffff]}, 0x48) 14:47:25 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x5000000]}, 0x2c) 14:47:25 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x0) 14:47:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0xd}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000002c7, 0x0) [ 1187.125966] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1187.135068] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:25 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6}}, 0x90) 14:47:25 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e617400000000000000000400", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:25 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x4800]}, 0x48) [ 1187.238734] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:26 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0xd00000000000000]}, 0x2c) 14:47:26 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x1810000000000000]}, 0x48) 14:47:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0xd}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000002c7, 0x0) [ 1187.409536] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:26 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, 0x0, 0x111, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x1c, 0x0, @in6}}, 0x90) [ 1187.494922] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:26 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x68000000]}, 0x48) 14:47:26 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0xf00000000000000]}, 0x2c) 14:47:26 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:26 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x73]}, 0x48) [ 1187.729695] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:26 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:26 executing program 3: sched_setaffinity(0x0, 0xffffffffffffffb1, &(0x7f0000000180)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4000000000000000, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect(r2, &(0x7f0000000140)=@pppol2tp={0x18, 0x1, {0x0, r1, {0x2, 0x0, @broadcast}, 0x4, 0x0, 0x1, 0x3}}, 0x80) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4001fe) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_int(r3, 0x6, 0x2, &(0x7f0000000040)=0xfff, 0x4) sendto$inet(r3, &(0x7f0000002440), 0x0, 0x20000802, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='sit0\x00', 0xa) r4 = dup3(r2, r2, 0x100800080001) ioctl$UI_END_FF_ERASE(r4, 0x400c55cb, &(0x7f00000004c0)={0x8}) sendto$inet(r3, &(0x7f0000d7cfcb), 0x0, 0x0, 0x0, 0x0) r5 = getpid() ptrace$getregset(0x4204, r5, 0x4, &(0x7f0000000200)={&(0x7f00000005c0)=""/186, 0xba}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r4, 0xc0505405, &(0x7f0000000240)={{0x3, 0x0, 0x0, 0x3}, 0xc26, 0x9, 0x4}) shutdown(r3, 0x1) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r4, 0xc0505405, &(0x7f0000000400)={{0x3, 0x3, 0x332, 0x3, 0x21}, 0x4, 0x3ff, 0xffffffffffffff80}) fanotify_init(0x10, 0x2) capset(&(0x7f0000000340)={0x20080522}, &(0x7f0000000480)={0x7, 0x4, 0x5, 0xa3e5, 0x9, 0x7fff}) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000080)={'lo\x00', {0x2, 0x4e24, @local}}) getsockopt$EBT_SO_GET_INIT_INFO(r4, 0x0, 0x82, &(0x7f00000002c0)={'broute\x00'}, &(0x7f00000003c0)=0x78) ioctl$sock_inet6_tcp_SIOCATMARK(r4, 0x8905, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000009c0)) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @rand_addr=0xa000000000000}, 0xfffffffffffffee4) syz_genetlink_get_family_id$ipvs(&(0x7f0000000780)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r4, &(0x7f0000000980)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x20200000}, 0xc, &(0x7f0000000940)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000800)={0x0, 0x62, 0x1, 0x1, 0x6}) getgid() bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000500)={r4, &(0x7f0000000680)="b004e3618bb63004b5fbabf33d9323674ddb2b3448dc02aa37ad7e5a67c90617409a9394a67ba202bbf107e11a705a443eb30f1faaadbaf98f75799a5387008f752669258e4522e17dbafa114984e15287272e14b19863d0f24934fad15ade0f523e354247ccf822d3a1a6868199cb9e792f1e6e4a85713f7c661e2a83a86fe3a296293fd685b610f94f52bb6f33084ba39d413b5cf05dada185b9dc41a1b78d7bc5ac56cbb9bd0482dd849225c6f348ff739d21f987ed4109b3b406f26c0b0fda6f8a2df1bb230f870cc244c30acebd650a27b50fe3c1bd54a88048a2189af30148a15c8d34"}, 0x10) 14:47:26 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x0, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6}}, 0x90) 14:47:26 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x500000000000000]}, 0x2c) 14:47:26 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xffffff9f]}, 0x48) [ 1188.247885] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:27 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x1000000000000]}, 0x48) [ 1188.293223] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:27 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x88d9, @loopback}, 0x1c) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x18, &(0x7f0000000300)={@local}, &(0x7f0000000340)=0x20) 14:47:27 executing program 3: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000540)=""/11, 0x2) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = creat(&(0x7f0000000080)="e91f7189591e9233614b00", 0x109) dup2(r0, r1) execve(&(0x7f00000002c0)="e91f7189591e9233614b00", 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) ioctl$EVIOCGSW(r1, 0x8040451b, 0x0) 14:47:27 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:27 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6}}, 0x90) 14:47:27 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0xf000000]}, 0x2c) 14:47:27 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x500000000000000]}, 0x48) 14:47:27 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:27 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 14:47:27 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x3504000000000000]}, 0x48) [ 1188.567829] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:27 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6}}, 0x90) 14:47:27 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x40000]}, 0x2c) 14:47:27 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x1c3855]}, 0x48) [ 1188.721288] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:27 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, 0x0, 0x0) [ 1188.769842] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:28 executing program 3: clone(0x3102001ff3, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000003e80), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0xfdf2) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000100), 0x8) 14:47:28 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:28 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x1100]}, 0x2c) 14:47:28 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x44]}, 0x48) 14:47:28 executing program 5: migrate_pages(0x0, 0x0, 0x0, 0x0) 14:47:28 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x1c, 0x0, @in6}}, 0x90) 14:47:28 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e61740000000000000000000000000000000600", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:28 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x48}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 1189.439619] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:28 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x6100000000000000]}, 0x48) 14:47:28 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:28 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x0, 0x0, @in6}}, 0x90) 14:47:28 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x1500000000000000]}, 0x2c) 14:47:28 executing program 3: 14:47:28 executing program 5: [ 1189.647240] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:28 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x85ffffff00000000]}, 0x48) 14:47:28 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)='c', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x1c, &(0x7f00000000c0)={r1}, 0x0, 0x0, 0x0) 14:47:28 executing program 4: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x1, 0x0) write$FUSE_CREATE_OPEN(r0, &(0x7f0000000040)={0xa0}, 0xa0) 14:47:28 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e617400000000000000007fffffff00", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1189.690154] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:28 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x700000000000000]}, 0x2c) 14:47:28 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1189.801653] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:28 executing program 4: pwrite64(0xffffffffffffffff, &(0x7f0000000200)="d96574c9698ba1fec1", 0x9, 0x0) r0 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000240)={'syz'}, &(0x7f0000000300)="0700542df800000000", 0x9, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r1, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'sha224-avx2\x00'}}) 14:47:28 executing program 3: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000200)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000fe0ff4)) 14:47:28 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, 0x48) [ 1189.878209] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:28 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0xc]}, 0x2c) 14:47:28 executing program 4: 14:47:28 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x700000000000000]}, 0x48) 14:47:28 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:28 executing program 3: 14:47:28 executing program 4: 14:47:28 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:28 executing program 3: [ 1190.136894] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:28 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x6000000]}, 0x48) 14:47:28 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:28 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x200000000000000]}, 0x2c) 14:47:28 executing program 4: 14:47:29 executing program 3: 14:47:29 executing program 4: 14:47:29 executing program 3: 14:47:29 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xa]}, 0x48) [ 1190.349732] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:29 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e61740000000000000000000000000000000300", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:29 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:29 executing program 4: 14:47:29 executing program 3: 14:47:29 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x7400000000000000]}, 0x48) 14:47:29 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x800000000000000]}, 0x2c) [ 1190.531262] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:29 executing program 4: 14:47:29 executing program 3: [ 1190.592559] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:29 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e617400000000000000000000000200", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:29 executing program 3: 14:47:29 executing program 4: 14:47:29 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x300000000000000]}, 0x48) 14:47:29 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1190.731951] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1190.763788] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:29 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e617400000000000000000000000400", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:29 executing program 3: 14:47:29 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x9000000]}, 0x2c) 14:47:29 executing program 4: 14:47:29 executing program 3: 14:47:29 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x435]}, 0x48) [ 1190.896749] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:29 executing program 3: 14:47:29 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x11000000]}, 0x2c) [ 1190.985359] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:29 executing program 4: 14:47:29 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x6]}, 0x48) 14:47:29 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e617400000000000000000500", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:29 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:29 executing program 3: 14:47:29 executing program 4: 14:47:29 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x3f000000]}, 0x2c) 14:47:29 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x18100000]}, 0x48) [ 1191.196028] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:29 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:29 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:29 executing program 3: 14:47:30 executing program 4: 14:47:30 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x4800000000000000]}, 0x48) 14:47:30 executing program 3: 14:47:30 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:30 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x13]}, 0x2c) [ 1191.409224] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:30 executing program 4: 14:47:30 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e61740000000000000000000000000000000100", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1191.459191] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:30 executing program 3: 14:47:30 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, 0x48) 14:47:30 executing program 4: [ 1191.571840] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:30 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e617400000000000000000000000500", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:30 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:30 executing program 3: 14:47:30 executing program 4: 14:47:30 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x600000000000000]}, 0x48) [ 1191.706731] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:30 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:47:30 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x10]}, 0x2c) 14:47:30 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e617400000000000000000000000600", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1191.766463] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:30 executing program 4: 14:47:30 executing program 3: 14:47:30 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x85ffffff]}, 0x48) 14:47:30 executing program 4: [ 1191.898685] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:30 executing program 3: 14:47:30 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x300]}, 0x2c) [ 1191.943486] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:30 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:47:30 executing program 3: 14:47:30 executing program 4: 14:47:30 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e61740000000000000000000000ff00", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:30 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x4000000000000000]}, 0x2c) 14:47:30 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x6c00]}, 0x48) 14:47:30 executing program 3: 14:47:30 executing program 4: 14:47:30 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:30 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 1192.211333] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:30 executing program 3: 14:47:31 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x7100]}, 0x48) 14:47:31 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0xb000000]}, 0x2c) 14:47:31 executing program 4: clone(0x3102001ff3, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000003e80), 0x1c) r1 = dup2(r0, r0) syz_execute_func(&(0x7f00000002c0)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0xfdf2) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) write$apparmor_exec(r1, 0x0, 0x0) 14:47:31 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x88d9, @loopback}, 0x1c) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000300)={@local}, &(0x7f0000000340)=0x20) 14:47:31 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r0, 0xae80, 0x0) 14:47:31 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x0, 0x0, &(0x7f0000000480)) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000680)) socket$kcm(0x2, 0x0, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x802, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x802}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, 0x0, 0x0) write$cgroup_int(r2, &(0x7f0000000000), 0x12) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x7, 0x0, 0x0) [ 1192.414297] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:31 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e61740000000000000000000000000300", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:31 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x88d9, @loopback}, 0x1c) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000300)={@local}, &(0x7f0000000340)=0x20) 14:47:31 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x14000000]}, 0x2c) 14:47:31 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xffffff85]}, 0x48) [ 1192.517325] can: request_module (can-proto-0) failed. 14:47:31 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:31 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000001c0)='sit0\x00', 0x7) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, &(0x7f0000000800)) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f00000002c0), 0x4cc, 0xfff6) getresgid(&(0x7f0000000040)=0x0, &(0x7f0000000280), 0x0) ioctl$TUNSETGROUP(r0, 0x400454ce, r2) [ 1192.606488] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1192.617205] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:31 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r0, 0xae80, 0x0) 14:47:31 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xffffff9c]}, 0x48) [ 1192.689707] can: request_module (can-proto-0) failed. 14:47:31 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x13000000]}, 0x2c) [ 1192.743732] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:31 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e61740000000000000000000000000200", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:31 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0xc]}, 0x2c) 14:47:31 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r0, 0xae80, 0x0) 14:47:31 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x4c00000000000000]}, 0x48) 14:47:31 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x500]}, 0x2c) [ 1192.875654] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:31 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}, 0x48) 14:47:31 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, 0x48) 14:47:31 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1192.929086] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:31 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:31 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)=@known='trusted.overlay.metacopy\x00', &(0x7f0000000200)=""/4096, 0x1000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6}}, 0x90) 14:47:31 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x74000000]}, 0x48) 14:47:31 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x7]}, 0x2c) [ 1193.046968] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:31 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x6c00]}, 0x48) 14:47:31 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e61740000000000000000000600", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:31 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x7100]}, 0x48) [ 1193.115877] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:31 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xa000000]}, 0x48) 14:47:31 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:31 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e6174000000000000000500", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:32 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x1c, 0x0, @in6}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1, 0x8}}, 0x10) 14:47:32 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x4c00]}, 0x48) [ 1193.279329] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:32 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x1400000000000000]}, 0x2c) 14:47:32 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e61740000000000000000000300", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1193.340854] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1193.349762] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:32 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:32 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x1c, 0x0, @in6}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1, 0x8}}, 0x10) 14:47:32 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x7300]}, 0x48) [ 1193.457979] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:32 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x40000, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa]}, 0x2c) 14:47:32 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e61740000000000000000000400", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:32 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x12000000]}, 0x2c) 14:47:32 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x1c, 0x0, @in6}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1, 0x8}}, 0x10) 14:47:32 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x7a00]}, 0x48) [ 1193.589773] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:32 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:32 executing program 5: ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r1, 0xae80, 0x0) 14:47:32 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e61740000000000000000000000000600", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:32 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x40000000]}, 0x2c) 14:47:32 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x1c, 0x0, @in6}}, 0x90) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x8}}, 0x10) 14:47:32 executing program 5: ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r1, 0xae80, 0x0) 14:47:32 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x7]}, 0x48) 14:47:32 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x600]}, 0x2c) 14:47:32 executing program 5: ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r1, 0xae80, 0x0) 14:47:32 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0xa00000000000000, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa]}, 0x2c) 14:47:32 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}, 0x48) 14:47:32 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:32 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:32 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}, 0x48) 14:47:33 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e61740000000000000000000000000400", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:33 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:33 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x1c, 0x0, @in6}}, 0x90) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x8}}, 0x10) 14:47:33 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x0, r4, 0x10, 0x0, @in6={0xa, 0x4e22, 0xc11e, @remote, 0x5}}}, 0xa0) 14:47:33 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000000000000]}, 0x48) 14:47:33 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x1200]}, 0x2c) 14:47:33 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x40000000]}, 0x48) 14:47:33 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:33 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x1c, 0x0, @in6}}, 0x90) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x8}}, 0x10) 14:47:33 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x6c]}, 0x48) 14:47:33 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x9]}, 0x2c) 14:47:33 executing program 3 (fault-call:3 fault-nth:0): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6}}, 0x90) [ 1194.785335] FAULT_INJECTION: forcing a failure. [ 1194.785335] name failslab, interval 1, probability 0, space 0, times 0 [ 1194.816775] CPU: 1 PID: 11163 Comm: syz-executor3 Not tainted 4.20.0-rc3+ #251 [ 1194.824162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1194.829512] IPVS: ftp: loaded support on port[0] = 21 [ 1194.833530] Call Trace: [ 1194.833563] dump_stack+0x244/0x39d [ 1194.833596] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1194.833618] ? perf_trace_lock+0x4a7/0x7a0 [ 1194.845094] should_fail.cold.4+0xa/0x17 [ 1194.854510] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1194.854525] ? lock_is_held_type+0x210/0x210 [ 1194.854552] ? zap_class+0x640/0x640 [ 1194.854566] ? zap_class+0x640/0x640 [ 1194.854589] ? zap_class+0x640/0x640 [ 1194.854603] ? zap_class+0x640/0x640 [ 1194.854623] ? find_held_lock+0x36/0x1c0 [ 1194.863769] ? __lock_is_held+0xb5/0x140 [ 1194.863810] ? perf_trace_sched_process_exec+0x860/0x860 [ 1194.863825] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1194.863844] ? kasan_check_read+0x11/0x20 [ 1194.871952] __should_failslab+0x124/0x180 [ 1194.871972] should_failslab+0x9/0x14 [ 1194.871987] kmem_cache_alloc_trace+0x2d7/0x750 [ 1194.872088] ? cma_pernet_idr+0x23f/0x3c0 [ 1194.879404] ? cma_acquire_dev_by_src_ip+0x950/0x950 [ 1194.879425] cma_alloc_port+0x51/0x190 [ 1194.879443] rdma_bind_addr+0x1763/0x23c0 [ 1194.879471] ? cma_ndev_work_handler+0x1b0/0x1b0 [ 1194.887236] ucma_bind+0x23e/0x2a0 [ 1194.887255] ? ucma_resolve_addr+0x380/0x380 [ 1194.887290] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1194.887309] ? _copy_from_user+0xdf/0x150 [ 1194.896790] ? ucma_resolve_addr+0x380/0x380 [ 1194.896815] ucma_write+0x365/0x460 [ 1194.896834] ? ucma_open+0x3f0/0x3f0 [ 1194.896873] __vfs_write+0x119/0x9f0 [ 1194.896920] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 1194.896935] ? ucma_open+0x3f0/0x3f0 [ 1194.896966] ? kernel_read+0x120/0x120 [ 1194.906051] ? apparmor_path_rmdir+0x30/0x30 [ 1194.906078] ? apparmor_file_permission+0x24/0x30 [ 1194.906094] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1194.906109] ? security_file_permission+0x1c2/0x220 [ 1194.906127] ? rw_verify_area+0x118/0x360 [ 1194.906145] vfs_write+0x1fc/0x560 [ 1194.914189] ksys_write+0x101/0x260 [ 1194.914208] ? __ia32_sys_read+0xb0/0xb0 [ 1194.914226] ? trace_hardirqs_off_caller+0x310/0x310 [ 1194.914244] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1194.923087] ? __do_page_fault+0x491/0xe60 [ 1194.923108] __ia32_sys_write+0x71/0xb0 [ 1194.923129] do_fast_syscall_32+0x34d/0xfb2 [ 1194.923149] ? do_int80_syscall_32+0x890/0x890 [ 1194.923167] ? entry_SYSENTER_compat+0x68/0x7f [ 1194.932148] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1194.932165] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1194.932181] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1194.932197] ? trace_hardirqs_on_caller+0x310/0x310 [ 1194.932216] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1194.941096] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1194.941134] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1194.941184] entry_SYSENTER_compat+0x70/0x7f [ 1194.941199] RIP: 0023:0xf7fb6a29 [ 1194.949116] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1194.949124] RSP: 002b:00000000f5fb20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 1194.949138] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000080 [ 1194.949146] RDX: 0000000000000090 RSI: 0000000000000000 RDI: 0000000000000000 [ 1194.949154] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1194.949162] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1194.949174] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1195.346305] device bridge_slave_1 left promiscuous mode [ 1195.351901] bridge0: port 2(bridge_slave_1) entered disabled state [ 1195.395262] device bridge_slave_0 left promiscuous mode [ 1195.400725] bridge0: port 1(bridge_slave_0) entered disabled state [ 1195.465525] team0 (unregistering): Port device team_slave_1 removed [ 1195.476201] team0 (unregistering): Port device team_slave_0 removed [ 1195.487391] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1195.558573] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1195.624096] bond0 (unregistering): Released all slaves [ 1196.096199] bridge0: port 1(bridge_slave_0) entered blocking state [ 1196.102734] bridge0: port 1(bridge_slave_0) entered disabled state [ 1196.110831] device bridge_slave_0 entered promiscuous mode [ 1196.174591] bridge0: port 2(bridge_slave_1) entered blocking state [ 1196.181178] bridge0: port 2(bridge_slave_1) entered disabled state [ 1196.189677] device bridge_slave_1 entered promiscuous mode [ 1196.255262] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1196.322898] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1196.477340] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1196.526374] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1196.731341] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1196.739110] team0: Port device team_slave_0 added [ 1196.781621] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1196.789964] team0: Port device team_slave_1 added [ 1196.830387] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1196.837293] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1196.845692] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1196.888545] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1196.895601] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1196.903587] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1196.934655] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1196.941754] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1196.950092] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1196.978785] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1196.986389] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1196.994173] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1197.323230] bridge0: port 2(bridge_slave_1) entered blocking state [ 1197.329616] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1197.336279] bridge0: port 1(bridge_slave_0) entered blocking state [ 1197.342619] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1197.349839] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1197.744706] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1198.235205] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1198.328813] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1198.415271] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1198.421470] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1198.429062] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1198.513748] 8021q: adding VLAN 0 to HW filter on device team0 14:47:37 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:37 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1, 0x8}}, 0x10) 14:47:37 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x8000000]}, 0x2c) 14:47:37 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:37 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x4400000000000000]}, 0x48) 14:47:37 executing program 3 (fault-call:3 fault-nth:1): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6}}, 0x90) [ 1199.077140] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1199.086263] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:37 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x7300000000000000]}, 0x48) 14:47:37 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1, 0x8}}, 0x10) 14:47:37 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x3f00000000000000]}, 0x2c) 14:47:37 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x9cffffff]}, 0x48) [ 1199.206421] FAULT_INJECTION: forcing a failure. [ 1199.206421] name failslab, interval 1, probability 0, space 0, times 0 [ 1199.223534] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1199.268441] CPU: 1 PID: 11438 Comm: syz-executor3 Not tainted 4.20.0-rc3+ #251 [ 1199.273436] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1199.275837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1199.275845] Call Trace: [ 1199.275872] dump_stack+0x244/0x39d [ 1199.275903] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1199.275937] ? debug_smp_processor_id+0x1c/0x20 [ 1199.293681] ? perf_trace_lock+0x14d/0x7a0 [ 1199.299903] should_fail.cold.4+0xa/0x17 [ 1199.318029] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1199.323148] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1199.328696] ? check_preemption_disabled+0x48/0x280 [ 1199.333724] ? zap_class+0x640/0x640 [ 1199.337446] ? perf_trace_lock+0x14d/0x7a0 [ 1199.341681] ? __lock_acquire+0x62f/0x4c20 [ 1199.345945] ? __lock_acquire+0x62f/0x4c20 [ 1199.350189] ? find_held_lock+0x36/0x1c0 [ 1199.354275] ? __lock_is_held+0xb5/0x140 [ 1199.358356] ? perf_trace_sched_process_exec+0x860/0x860 [ 1199.363831] __should_failslab+0x124/0x180 [ 1199.368078] should_failslab+0x9/0x14 [ 1199.371905] kmem_cache_alloc+0x2be/0x730 [ 1199.376060] ? node_tag_get.constprop.18+0xa0/0xa0 [ 1199.380996] ? lock_downgrade+0x900/0x900 [ 1199.385160] radix_tree_node_alloc.constprop.19+0x81/0x370 [ 1199.390786] ? mark_held_locks+0x130/0x130 [ 1199.395051] idr_get_free+0x7a4/0xf70 [ 1199.398875] ? radix_tree_iter_tag_clear+0x90/0x90 [ 1199.403819] ? __save_stack_trace+0x8d/0xf0 [ 1199.408166] ? lock_is_held_type+0x210/0x210 [ 1199.412604] ? zap_class+0x640/0x640 [ 1199.416321] ? save_stack+0x43/0xd0 [ 1199.419946] ? kasan_kmalloc+0xc7/0xe0 [ 1199.423871] ? kmem_cache_alloc_trace+0x152/0x750 [ 1199.428714] ? cma_alloc_port+0x51/0x190 [ 1199.432779] ? rdma_bind_addr+0x1763/0x23c0 [ 1199.437111] ? ucma_bind+0x23e/0x2a0 [ 1199.440829] ? ucma_write+0x365/0x460 [ 1199.444629] ? __vfs_write+0x119/0x9f0 [ 1199.448535] ? vfs_write+0x1fc/0x560 [ 1199.452266] ? __ia32_sys_write+0x71/0xb0 [ 1199.456420] ? do_fast_syscall_32+0x34d/0xfb2 [ 1199.460947] ? entry_SYSENTER_compat+0x70/0x7f [ 1199.465556] ? find_held_lock+0x36/0x1c0 [ 1199.469639] idr_alloc_u32+0x1d4/0x3a0 [ 1199.473535] ? __fprop_inc_percpu_max+0x2d0/0x2d0 [ 1199.478384] ? rcu_softirq_qs+0x20/0x20 [ 1199.482372] idr_alloc+0x111/0x1b0 [ 1199.485936] ? idr_alloc_u32+0x3a0/0x3a0 [ 1199.490006] ? cma_acquire_dev_by_src_ip+0x950/0x950 [ 1199.495121] cma_alloc_port+0xb0/0x190 [ 1199.499014] rdma_bind_addr+0x1763/0x23c0 [ 1199.503240] ? cma_ndev_work_handler+0x1b0/0x1b0 [ 1199.508013] ucma_bind+0x23e/0x2a0 [ 1199.511554] ? ucma_resolve_addr+0x380/0x380 [ 1199.515988] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1199.521525] ? _copy_from_user+0xdf/0x150 [ 1199.525673] ? ucma_resolve_addr+0x380/0x380 [ 1199.530085] ucma_write+0x365/0x460 [ 1199.533726] ? ucma_open+0x3f0/0x3f0 [ 1199.537461] __vfs_write+0x119/0x9f0 [ 1199.541213] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 1199.546146] ? ucma_open+0x3f0/0x3f0 [ 1199.549871] ? kernel_read+0x120/0x120 [ 1199.553763] ? apparmor_path_rmdir+0x30/0x30 [ 1199.558188] ? apparmor_file_permission+0x24/0x30 [ 1199.563178] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1199.568718] ? security_file_permission+0x1c2/0x220 [ 1199.573741] ? rw_verify_area+0x118/0x360 [ 1199.577897] vfs_write+0x1fc/0x560 [ 1199.581449] ksys_write+0x101/0x260 [ 1199.585083] ? __ia32_sys_read+0xb0/0xb0 [ 1199.589185] ? trace_hardirqs_off_caller+0x310/0x310 [ 1199.594293] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1199.599854] ? __do_page_fault+0x491/0xe60 [ 1199.604113] __ia32_sys_write+0x71/0xb0 [ 1199.608133] do_fast_syscall_32+0x34d/0xfb2 [ 1199.612505] ? do_int80_syscall_32+0x890/0x890 [ 1199.617109] ? entry_SYSENTER_compat+0x68/0x7f [ 1199.621709] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1199.626726] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1199.631590] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1199.636446] ? trace_hardirqs_on_caller+0x310/0x310 [ 1199.641515] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1199.646537] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1199.651566] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1199.656426] entry_SYSENTER_compat+0x70/0x7f [ 1199.660837] RIP: 0023:0xf7fb6a29 [ 1199.664207] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1199.683109] RSP: 002b:00000000f5fb20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 1199.690822] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000080 [ 1199.698104] RDX: 0000000000000090 RSI: 0000000000000000 RDI: 0000000000000000 [ 1199.705389] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1199.712660] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 14:47:38 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e6174000000000000000000000500", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:38 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1199.719928] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:47:38 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1, 0x8}}, 0x10) 14:47:38 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x4c000000]}, 0x48) 14:47:38 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1, 0x8}}, 0x10) [ 1199.844835] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:38 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x3f00]}, 0x2c) 14:47:38 executing program 3 (fault-call:3 fault-nth:2): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6}}, 0x90) 14:47:38 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1199.903033] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:38 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e6174000000000000000000000000000000000600", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:38 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x4000]}, 0x48) 14:47:38 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1, 0x8}}, 0x10) [ 1200.009479] FAULT_INJECTION: forcing a failure. [ 1200.009479] name failslab, interval 1, probability 0, space 0, times 0 [ 1200.070690] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1200.082657] CPU: 0 PID: 11488 Comm: syz-executor3 Not tainted 4.20.0-rc3+ #251 [ 1200.090054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1200.099449] Call Trace: [ 1200.102069] dump_stack+0x244/0x39d [ 1200.105723] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1200.110945] ? perf_trace_lock+0x4a7/0x7a0 [ 1200.115251] should_fail.cold.4+0xa/0x17 [ 1200.119351] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1200.124490] ? save_stack+0xa9/0xd0 [ 1200.128146] ? kasan_kmalloc+0xc7/0xe0 [ 1200.132043] ? kasan_slab_alloc+0x12/0x20 [ 1200.136240] ? radix_tree_node_alloc.constprop.19+0x81/0x370 [ 1200.142048] ? idr_get_free+0x7a4/0xf70 [ 1200.146035] ? idr_alloc_u32+0x1d4/0x3a0 [ 1200.150108] ? zap_class+0x640/0x640 [ 1200.153839] ? ucma_bind+0x23e/0x2a0 [ 1200.157565] ? __vfs_write+0x119/0x9f0 [ 1200.161481] ? vfs_write+0x1fc/0x560 [ 1200.165206] ? ksys_write+0x101/0x260 [ 1200.169019] ? __ia32_sys_write+0x71/0xb0 [ 1200.173179] ? do_fast_syscall_32+0x34d/0xfb2 [ 1200.177699] ? find_held_lock+0x36/0x1c0 [ 1200.181784] ? __lock_is_held+0xb5/0x140 [ 1200.185897] ? perf_trace_sched_process_exec+0x860/0x860 [ 1200.191386] __should_failslab+0x124/0x180 [ 1200.195642] should_failslab+0x9/0x14 [ 1200.199459] kmem_cache_alloc+0x2be/0x730 [ 1200.203619] ? node_tag_get.constprop.18+0xa0/0xa0 [ 1200.208636] ? perf_trace_run_bpf_submit+0x267/0x330 [ 1200.213781] ? radix_tree_node_alloc.constprop.19+0x81/0x370 [ 1200.219608] radix_tree_node_alloc.constprop.19+0x81/0x370 [ 1200.225264] idr_get_free+0x7a4/0xf70 [ 1200.229086] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1200.234672] ? radix_tree_iter_tag_clear+0x90/0x90 [ 1200.239627] ? lock_is_held_type+0x210/0x210 [ 1200.244074] ? zap_class+0x640/0x640 [ 1200.247815] ? save_stack+0x43/0xd0 [ 1200.251459] ? kmem_cache_alloc_trace+0x152/0x750 [ 1200.256318] ? cma_alloc_port+0x51/0x190 [ 1200.260391] ? rdma_bind_addr+0x1763/0x23c0 [ 1200.264724] ? ucma_bind+0x23e/0x2a0 [ 1200.268454] ? ucma_write+0x365/0x460 [ 1200.272320] ? __vfs_write+0x119/0x9f0 [ 1200.276240] ? vfs_write+0x1fc/0x560 [ 1200.279981] ? __ia32_sys_write+0x71/0xb0 [ 1200.284204] ? do_fast_syscall_32+0x34d/0xfb2 [ 1200.288707] ? entry_SYSENTER_compat+0x70/0x7f [ 1200.293308] ? find_held_lock+0x36/0x1c0 [ 1200.297401] idr_alloc_u32+0x1d4/0x3a0 [ 1200.301342] ? __fprop_inc_percpu_max+0x2d0/0x2d0 [ 1200.306231] ? rcu_softirq_qs+0x20/0x20 [ 1200.310232] idr_alloc+0x111/0x1b0 [ 1200.313790] ? idr_alloc_u32+0x3a0/0x3a0 [ 1200.317880] ? cma_acquire_dev_by_src_ip+0x950/0x950 [ 1200.323002] cma_alloc_port+0xb0/0x190 [ 1200.326904] rdma_bind_addr+0x1763/0x23c0 [ 1200.331121] ? cma_ndev_work_handler+0x1b0/0x1b0 [ 1200.335931] ucma_bind+0x23e/0x2a0 [ 1200.339509] ? ucma_resolve_addr+0x380/0x380 [ 1200.343986] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1200.349533] ? _copy_from_user+0xdf/0x150 [ 1200.353693] ? ucma_resolve_addr+0x380/0x380 [ 1200.358161] ucma_write+0x365/0x460 [ 1200.361814] ? ucma_open+0x3f0/0x3f0 [ 1200.365560] __vfs_write+0x119/0x9f0 [ 1200.369290] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 1200.374249] ? ucma_open+0x3f0/0x3f0 [ 1200.378022] ? kernel_read+0x120/0x120 [ 1200.381923] ? apparmor_path_rmdir+0x30/0x30 [ 1200.386364] ? apparmor_file_permission+0x24/0x30 [ 1200.391235] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1200.396842] ? security_file_permission+0x1c2/0x220 [ 1200.401888] ? rw_verify_area+0x118/0x360 [ 1200.406058] vfs_write+0x1fc/0x560 [ 1200.409813] ksys_write+0x101/0x260 [ 1200.413462] ? __ia32_sys_read+0xb0/0xb0 [ 1200.417540] ? trace_hardirqs_off_caller+0x310/0x310 [ 1200.422654] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1200.428209] ? __do_page_fault+0x491/0xe60 [ 1200.432463] __ia32_sys_write+0x71/0xb0 [ 1200.436456] do_fast_syscall_32+0x34d/0xfb2 [ 1200.440796] ? do_int80_syscall_32+0x890/0x890 [ 1200.445417] ? entry_SYSENTER_compat+0x68/0x7f [ 1200.450014] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1200.455040] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1200.459907] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1200.464774] ? trace_hardirqs_on_caller+0x310/0x310 [ 1200.469819] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1200.474858] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1200.479895] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1200.484760] entry_SYSENTER_compat+0x70/0x7f [ 1200.489230] RIP: 0023:0xf7fb6a29 [ 1200.492624] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1200.511529] RSP: 002b:00000000f5fb20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 14:47:39 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0xb]}, 0x2c) [ 1200.519259] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000080 [ 1200.526533] RDX: 0000000000000090 RSI: 0000000000000000 RDI: 0000000000000000 [ 1200.533829] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1200.541329] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1200.548612] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:47:39 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e6174000000000000000000000000000000000500", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:39 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x68]}, 0x48) 14:47:39 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(0xffffffffffffffff, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r0, 0x8}}, 0x10) [ 1200.665513] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:39 executing program 3 (fault-call:3 fault-nth:3): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6}}, 0x90) 14:47:39 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e61740000000000000000000000000100", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:39 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1200.711639] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:39 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(0xffffffffffffffff, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r0, 0x8}}, 0x10) 14:47:39 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0xc00000000000000]}, 0x2c) 14:47:39 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x4]}, 0x48) [ 1200.802231] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:39 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:39 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1200.886341] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:39 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x4c]}, 0x48) 14:47:39 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:39 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(0xffffffffffffffff, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r0, 0x8}}, 0x10) 14:47:39 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x100000000000000]}, 0x2c) [ 1200.998360] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1201.060642] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:39 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6}}, 0x90) 14:47:39 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e61740000000000000000000500", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:39 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1, 0x8}}, 0x10) 14:47:39 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}, 0x48) 14:47:39 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x18000000]}, 0x2c) 14:47:39 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e6174000000000000000000000000007fffffff00", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:39 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r1, 0xae80, 0x0) [ 1201.234679] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1201.252165] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:40 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x16, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6}}, 0x90) 14:47:40 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1, 0x8}}, 0x10) 14:47:40 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r1, 0xae80, 0x0) 14:47:40 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x3f000000]}, 0x48) [ 1201.387237] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:40 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x2]}, 0x2c) 14:47:40 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x20000110, 0xfa00, {r1, 0x1c, 0x0, @in6}}, 0x90) [ 1201.453394] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:40 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1, 0x8}}, 0x10) 14:47:40 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r1, 0xae80, 0x0) 14:47:40 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:40 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x300]}, 0x48) 14:47:40 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0xe00000000000000]}, 0x2c) 14:47:40 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa02, {r1, 0x1c, 0x0, @in6}}, 0x90) 14:47:40 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e6174000000000000000000000300", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:40 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:40 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1, 0x8}}, 0x10) 14:47:40 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x600]}, 0x48) 14:47:40 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:40 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e617400000000000000000000ff00", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1201.830130] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1201.845733] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:40 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfafc, {r1, 0x1c, 0x0, @in6}}, 0x90) 14:47:40 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x10]}, 0x48) 14:47:40 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1, 0x8}}, 0x10) 14:47:40 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0xf00000000000000]}, 0x2c) [ 1201.950496] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:40 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:40 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}, 0x48) 14:47:40 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1, 0x8}}, 0x10) 14:47:40 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e61740000000000000000000200", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1202.025977] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:40 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0xed2d, @in6}}, 0x90) 14:47:40 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x3000000]}, 0x2c) [ 1202.149984] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:40 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x6800000000000000]}, 0x48) 14:47:40 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1, 0x8}}, 0x10) 14:47:40 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e61740000000000000000000000000500", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:40 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:41 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x9fffffff00000000]}, 0x48) 14:47:41 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0xfc00000000000000, @in6}}, 0x90) 14:47:41 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x1000000]}, 0x2c) 14:47:41 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1, 0x8}}, 0x10) [ 1202.346890] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:41 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:41 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:41 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x55381c00]}, 0x48) 14:47:41 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e6174000000000000000000000000000000000200", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1202.489723] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:41 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1, 0x8}}, 0x10) 14:47:41 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x3f00000000000000, @in6}}, 0x90) 14:47:41 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0xb00]}, 0x2c) 14:47:41 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x9cffffff00000000]}, 0x48) [ 1202.582027] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:41 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e6174000000000000000000000000000000000400", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:41 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:41 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1, 0x8}}, 0x10) 14:47:41 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x3]}, 0x48) 14:47:41 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:41 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x2ded, @in6}}, 0x90) [ 1202.745557] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:41 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1, 0x8}}, 0x10) 14:47:41 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0xe00]}, 0x2c) 14:47:41 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:41 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x63000000]}, 0x48) 14:47:41 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1202.903802] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:41 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0xfec0, @in6}}, 0x90) 14:47:41 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x63]}, 0x48) 14:47:41 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x1300]}, 0x2c) 14:47:41 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1, 0x8}}, 0x10) [ 1203.038212] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:41 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:41 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e6174000000000000000000000000000000000100", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1203.114023] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:41 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0xfe80, @in6}}, 0x90) 14:47:41 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x3]}, 0x2c) 14:47:41 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1, 0x8}}, 0x10) 14:47:41 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x3c00000000000000]}, 0x48) [ 1203.257659] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:42 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:42 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:42 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1, 0x8}}, 0x10) 14:47:42 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0xc0fe, @in6}}, 0x90) 14:47:42 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x55381c0000000000]}, 0x48) 14:47:42 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1, 0x8}}, 0x10) 14:47:42 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x12]}, 0x2c) [ 1203.420995] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1203.454023] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:42 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:42 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0xfe80000000000000, @in6}}, 0x90) 14:47:42 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:42 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x44000000]}, 0x48) 14:47:42 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1, 0x8}}, 0x10) [ 1203.594274] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:42 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1203.655189] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:42 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x3f000000, @in6}}, 0x90) 14:47:42 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:42 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x900000000000000]}, 0x2c) [ 1203.763027] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:42 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x48000000]}, 0x48) 14:47:42 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1, 0x8}}, 0x10) 14:47:42 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e6174000000000000000000000000ff00", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1203.823847] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:42 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:42 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0xff000000, @in6}}, 0x90) 14:47:42 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x7000000]}, 0x2c) 14:47:42 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x5000000]}, 0x48) 14:47:42 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1, 0x8}}, 0x10) [ 1204.028409] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1204.043104] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:42 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e6174000000000000000000000600", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:42 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:42 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x6100]}, 0x48) 14:47:42 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0xfec00000, @in6}}, 0x90) 14:47:42 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0xd00]}, 0x2c) [ 1204.159177] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:42 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e617400000000000000000000000000000000ff00", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:42 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x3c00]}, 0x48) 14:47:42 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1, 0x8}}, 0x10) 14:47:43 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x2, @in6}}, 0x90) 14:47:43 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e61740000000000000000007fffffff00", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:43 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1204.314110] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:43 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x48]}, 0x48) [ 1204.405867] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:43 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x8}}, 0x10) 14:47:43 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e6174000000000000000000000000000000000300", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:43 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x900]}, 0x2c) 14:47:43 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:43 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0xfc, @in6}}, 0x90) 14:47:43 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x6c000000]}, 0x48) [ 1204.541867] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:43 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:43 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x15]}, 0x2c) 14:47:43 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x8}}, 0x10) 14:47:43 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:43 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0xfec0000000000000, @in6}}, 0x90) 14:47:43 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x48) [ 1204.750200] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:43 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x8}}, 0x10) 14:47:43 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0xb00000000000000]}, 0x2c) 14:47:43 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:43 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:43 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}, 0x48) 14:47:43 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0xfc000000, @in6}}, 0x90) 14:47:43 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0xd]}, 0x2c) [ 1204.972076] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:43 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x8}}, 0x10) 14:47:43 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x1810]}, 0x48) 14:47:43 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e61740000000000000000000000ff00", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:43 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:47:43 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x3f00, @in6}}, 0x90) 14:47:43 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x5]}, 0x48) 14:47:43 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x700]}, 0x2c) [ 1205.180309] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:43 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x8}}, 0x10) 14:47:43 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 14:47:43 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e617400000000000000000000000000007fffffff00", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x2ded0000, @in6}}, 0x90) 14:47:44 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x7a000000]}, 0x48) 14:47:44 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x14]}, 0x2c) 14:47:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x8}}, 0x10) [ 1205.411883] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:44 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x700]}, 0x48) 14:47:44 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e617400000000000000000000000000000000000100", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0xfe800000, @in6}}, 0x90) 14:47:44 executing program 5 (fault-call:6 fault-nth:0): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:44 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x73000000]}, 0x48) [ 1205.588791] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x0, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1, 0x8}}, 0x10) 14:47:44 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e6174000000000000000000000000000200", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1205.673885] FAULT_INJECTION: forcing a failure. [ 1205.673885] name failslab, interval 1, probability 0, space 0, times 0 [ 1205.713679] CPU: 0 PID: 12151 Comm: syz-executor5 Not tainted 4.20.0-rc3+ #251 [ 1205.721062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1205.721069] Call Trace: [ 1205.721100] dump_stack+0x244/0x39d [ 1205.721124] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1205.721170] should_fail.cold.4+0xa/0x17 [ 1205.721190] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1205.721212] ? __lock_acquire+0x62f/0x4c20 [ 1205.721231] ? mem_cgroup_update_lru_size+0xd0/0xd0 [ 1205.721249] ? zap_class+0x640/0x640 [ 1205.721279] ? find_held_lock+0x36/0x1c0 [ 1205.768218] ? __lock_is_held+0xb5/0x140 [ 1205.772327] ? perf_trace_sched_process_exec+0x860/0x860 [ 1205.777784] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1205.783346] ? check_preemption_disabled+0x48/0x280 [ 1205.783382] __should_failslab+0x124/0x180 [ 1205.783405] should_failslab+0x9/0x14 [ 1205.796461] kmem_cache_alloc+0x2be/0x730 [ 1205.800610] ? lock_acquire+0x1ed/0x520 [ 1205.804615] ? kvm_arch_vcpu_ioctl_run+0x30f/0x72a0 [ 1205.809637] mmu_topup_memory_caches+0xfb/0x470 [ 1205.814311] ? kvm_inject_realmode_interrupt+0x260/0x260 [ 1205.819787] kvm_mmu_load+0x21/0x1290 [ 1205.823604] kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1205.828540] ? kvm_vcpu_ioctl+0x1e5/0x1150 [ 1205.832779] ? __lock_acquire+0x62f/0x4c20 [ 1205.837031] ? kvm_arch_vcpu_runnable+0x710/0x710 [ 1205.841870] ? zap_class+0x640/0x640 [ 1205.845585] ? mark_held_locks+0x130/0x130 [ 1205.849836] ? print_usage_bug+0xc0/0xc0 [ 1205.853902] ? mark_held_locks+0xc7/0x130 [ 1205.858057] ? mem_cgroup_commit_charge+0x2c1/0xa50 [ 1205.863081] ? zap_class+0x640/0x640 [ 1205.866848] ? find_held_lock+0x36/0x1c0 [ 1205.870919] ? get_task_pid+0x1ea/0x3b0 14:47:44 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x11]}, 0x2c) 14:47:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0xfc00, @in6}}, 0x90) [ 1205.874897] ? lock_downgrade+0x900/0x900 [ 1205.879064] ? check_preemption_disabled+0x48/0x280 [ 1205.884114] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1205.889041] ? kasan_check_read+0x11/0x20 [ 1205.893185] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1205.898459] ? rcu_softirq_qs+0x20/0x20 [ 1205.902457] ? get_task_pid+0x211/0x3b0 [ 1205.906455] ? find_get_pid+0x270/0x270 [ 1205.910470] kvm_vcpu_ioctl+0x5c8/0x1150 [ 1205.910484] ? kvm_vcpu_ioctl+0x5c8/0x1150 [ 1205.910501] ? kvm_uevent_notify_change.part.32+0x450/0x450 [ 1205.910514] ? lock_downgrade+0x900/0x900 [ 1205.910545] ? check_preemption_disabled+0x48/0x280 [ 1205.924559] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1205.924571] ? kasan_check_read+0x11/0x20 [ 1205.924583] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1205.924595] ? rcu_softirq_qs+0x20/0x20 [ 1205.924639] ? ksys_dup3+0x680/0x680 [ 1205.924651] ? find_held_lock+0x36/0x1c0 [ 1205.924668] ? kasan_check_write+0x14/0x20 [ 1205.924687] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1205.969030] ? wait_for_completion+0x8a0/0x8a0 [ 1205.973623] ? __lock_is_held+0xb5/0x140 [ 1205.977695] ? __fget_light+0x2e9/0x430 [ 1205.981674] kvm_vcpu_compat_ioctl+0x210/0x4a0 [ 1205.986260] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1205.990592] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1205.996156] ? fput+0x130/0x1a0 [ 1205.999439] ? do_fast_syscall_32+0x150/0xfb2 [ 1206.003951] ? do_fast_syscall_32+0x150/0xfb2 [ 1206.008493] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1206.013097] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1206.017426] __ia32_compat_sys_ioctl+0x20e/0x630 [ 1206.022241] do_fast_syscall_32+0x34d/0xfb2 [ 1206.026587] ? do_int80_syscall_32+0x890/0x890 [ 1206.031184] ? entry_SYSENTER_compat+0x68/0x7f [ 1206.035869] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1206.040908] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1206.045753] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1206.050599] ? trace_hardirqs_on_caller+0x310/0x310 [ 1206.055634] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1206.060652] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1206.065680] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1206.070538] entry_SYSENTER_compat+0x70/0x7f [ 1206.074946] RIP: 0023:0xf7ff6a29 [ 1206.078311] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1206.097220] RSP: 002b:00000000f5ff20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 1206.104924] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000000ae80 [ 1206.112190] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 14:47:44 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xff00]}, 0x48) [ 1206.119457] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1206.126721] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1206.133991] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:47:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x0, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1, 0x8}}, 0x10) 14:47:44 executing program 5 (fault-call:6 fault-nth:1): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:44 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xa00]}, 0x48) 14:47:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x0, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1, 0x8}}, 0x10) 14:47:45 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0xa00000000000000]}, 0x2c) [ 1206.344280] FAULT_INJECTION: forcing a failure. [ 1206.344280] name failslab, interval 1, probability 0, space 0, times 0 14:47:45 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000]}, 0x48) [ 1206.434894] CPU: 1 PID: 12182 Comm: syz-executor5 Not tainted 4.20.0-rc3+ #251 [ 1206.442312] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1206.451667] Call Trace: [ 1206.454298] dump_stack+0x244/0x39d [ 1206.457976] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1206.458001] ? debug_smp_processor_id+0x1c/0x20 [ 1206.458023] ? perf_trace_lock+0x14d/0x7a0 [ 1206.467863] should_fail.cold.4+0xa/0x17 [ 1206.467883] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1206.467902] ? save_stack+0xa9/0xd0 [ 1206.467920] ? kasan_kmalloc+0xc7/0xe0 [ 1206.488780] ? kasan_slab_alloc+0x12/0x20 [ 1206.492947] ? kmem_cache_alloc+0x12e/0x730 [ 1206.497280] ? mmu_topup_memory_caches+0xfb/0x470 [ 1206.502138] ? kvm_mmu_load+0x21/0x1290 [ 1206.506122] ? kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1206.511235] ? zap_class+0x640/0x640 [ 1206.514953] ? do_fast_syscall_32+0x34d/0xfb2 [ 1206.519465] ? find_held_lock+0x36/0x1c0 [ 1206.523578] ? __lock_is_held+0xb5/0x140 [ 1206.527680] ? perf_trace_sched_process_exec+0x860/0x860 [ 1206.533178] __should_failslab+0x124/0x180 [ 1206.537449] should_failslab+0x9/0x14 [ 1206.541740] kmem_cache_alloc+0x2be/0x730 [ 1206.545895] ? lock_acquire+0x1ed/0x520 [ 1206.549888] ? kvm_arch_vcpu_ioctl_run+0x30f/0x72a0 [ 1206.554911] ? mmu_topup_memory_caches+0xfb/0x470 [ 1206.559767] mmu_topup_memory_caches+0xfb/0x470 [ 1206.564441] ? kvm_inject_realmode_interrupt+0x260/0x260 [ 1206.569907] kvm_mmu_load+0x21/0x1290 [ 1206.573759] kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1206.578706] ? kvm_vcpu_ioctl+0x1e5/0x1150 [ 1206.582989] ? kvm_arch_vcpu_runnable+0x710/0x710 [ 1206.587843] ? zap_class+0x640/0x640 [ 1206.591590] ? mark_held_locks+0x130/0x130 [ 1206.595852] ? lock_is_held_type+0x210/0x210 [ 1206.600303] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1206.605856] ? check_preemption_disabled+0x48/0x280 [ 1206.610938] ? find_held_lock+0x36/0x1c0 [ 1206.615034] ? get_task_pid+0x1ea/0x3b0 [ 1206.619038] ? lock_downgrade+0x900/0x900 [ 1206.623204] ? check_preemption_disabled+0x48/0x280 [ 1206.628225] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1206.633159] ? kasan_check_read+0x11/0x20 [ 1206.637345] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1206.642625] ? rcu_softirq_qs+0x20/0x20 [ 1206.646622] ? get_task_pid+0x211/0x3b0 [ 1206.650630] ? find_get_pid+0x270/0x270 [ 1206.654630] kvm_vcpu_ioctl+0x5c8/0x1150 [ 1206.658700] ? kvm_vcpu_ioctl+0x5c8/0x1150 [ 1206.662968] ? kvm_uevent_notify_change.part.32+0x450/0x450 [ 1206.668687] ? lock_downgrade+0x900/0x900 [ 1206.672859] ? check_preemption_disabled+0x48/0x280 [ 1206.677882] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1206.682834] ? kasan_check_read+0x11/0x20 [ 1206.686997] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1206.692301] ? rcu_softirq_qs+0x20/0x20 [ 1206.696359] ? ksys_dup3+0x680/0x680 [ 1206.700125] ? find_held_lock+0x36/0x1c0 [ 1206.704191] ? kasan_check_write+0x14/0x20 [ 1206.708438] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1206.713401] ? wait_for_completion+0x8a0/0x8a0 [ 1206.717998] ? __fget_light+0x2e9/0x430 [ 1206.722006] kvm_vcpu_compat_ioctl+0x210/0x4a0 [ 1206.726639] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1206.730987] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1206.736529] ? fput+0x130/0x1a0 [ 1206.739808] ? do_fast_syscall_32+0x150/0xfb2 [ 1206.744324] ? do_fast_syscall_32+0x150/0xfb2 [ 1206.748846] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1206.753442] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1206.757783] __ia32_compat_sys_ioctl+0x20e/0x630 [ 1206.762589] do_fast_syscall_32+0x34d/0xfb2 [ 1206.766913] ? do_int80_syscall_32+0x890/0x890 [ 1206.771503] ? entry_SYSENTER_compat+0x68/0x7f [ 1206.776107] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1206.781151] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1206.786012] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1206.790853] ? trace_hardirqs_on_caller+0x310/0x310 [ 1206.795877] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1206.800907] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1206.805938] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1206.810782] entry_SYSENTER_compat+0x70/0x7f [ 1206.815190] RIP: 0023:0xf7ff6a29 14:47:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x80fe, @in6}}, 0x90) [ 1206.818554] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1206.837458] RSP: 002b:00000000f5ff20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 1206.845187] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000000ae80 [ 1206.852458] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1206.859717] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1206.866995] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1206.874270] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:47:45 executing program 5 (fault-call:6 fault-nth:2): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1206.999516] FAULT_INJECTION: forcing a failure. [ 1206.999516] name failslab, interval 1, probability 0, space 0, times 0 [ 1207.022213] CPU: 1 PID: 12208 Comm: syz-executor5 Not tainted 4.20.0-rc3+ #251 [ 1207.029598] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1207.038949] Call Trace: [ 1207.041556] dump_stack+0x244/0x39d [ 1207.045227] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1207.050466] ? __kernel_text_address+0xd/0x40 [ 1207.054970] ? unwind_get_return_address+0x61/0xa0 [ 1207.059919] should_fail.cold.4+0xa/0x17 [ 1207.063998] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1207.069144] ? save_stack+0xa9/0xd0 [ 1207.072806] ? kasan_kmalloc+0xc7/0xe0 [ 1207.076705] ? kasan_slab_alloc+0x12/0x20 [ 1207.080885] ? kmem_cache_alloc+0x12e/0x730 [ 1207.085220] ? mmu_topup_memory_caches+0xfb/0x470 [ 1207.090138] ? kvm_mmu_load+0x21/0x1290 [ 1207.094140] ? kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1207.099265] ? zap_class+0x640/0x640 [ 1207.102983] ? do_fast_syscall_32+0x34d/0xfb2 [ 1207.107494] ? entry_SYSENTER_compat+0x70/0x7f [ 1207.112091] ? find_held_lock+0x36/0x1c0 [ 1207.116196] ? __lock_is_held+0xb5/0x140 [ 1207.120298] ? perf_trace_sched_process_exec+0x860/0x860 [ 1207.125783] __should_failslab+0x124/0x180 [ 1207.130051] should_failslab+0x9/0x14 [ 1207.133872] kmem_cache_alloc+0x2be/0x730 [ 1207.138025] ? lock_acquire+0x1ed/0x520 [ 1207.142000] ? kvm_arch_vcpu_ioctl_run+0x30f/0x72a0 [ 1207.147036] ? mmu_topup_memory_caches+0xfb/0x470 [ 1207.151890] mmu_topup_memory_caches+0xfb/0x470 [ 1207.156569] ? kvm_inject_realmode_interrupt+0x260/0x260 [ 1207.162048] kvm_mmu_load+0x21/0x1290 [ 1207.165909] kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1207.170857] ? kvm_vcpu_ioctl+0x1e5/0x1150 [ 1207.175098] ? __lock_acquire+0x62f/0x4c20 [ 1207.179355] ? kvm_arch_vcpu_runnable+0x710/0x710 [ 1207.184197] ? zap_class+0x640/0x640 [ 1207.187914] ? mark_held_locks+0x130/0x130 [ 1207.192163] ? print_usage_bug+0xc0/0xc0 [ 1207.196236] ? mark_held_locks+0xc7/0x130 [ 1207.200383] ? mem_cgroup_commit_charge+0x2c1/0xa50 [ 1207.205430] ? zap_class+0x640/0x640 [ 1207.209172] ? find_held_lock+0x36/0x1c0 [ 1207.213241] ? get_task_pid+0x1ea/0x3b0 [ 1207.217218] ? lock_downgrade+0x900/0x900 [ 1207.221411] ? check_preemption_disabled+0x48/0x280 [ 1207.226485] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1207.231431] ? kasan_check_read+0x11/0x20 [ 1207.235614] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1207.240894] ? rcu_softirq_qs+0x20/0x20 [ 1207.244915] ? get_task_pid+0x211/0x3b0 [ 1207.248890] ? find_get_pid+0x270/0x270 [ 1207.252877] kvm_vcpu_ioctl+0x5c8/0x1150 [ 1207.256978] ? kvm_vcpu_ioctl+0x5c8/0x1150 [ 1207.261276] ? kvm_uevent_notify_change.part.32+0x450/0x450 [ 1207.267020] ? lock_downgrade+0x900/0x900 [ 1207.271166] ? check_preemption_disabled+0x48/0x280 [ 1207.276189] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1207.281118] ? kasan_check_read+0x11/0x20 [ 1207.285271] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1207.290548] ? rcu_softirq_qs+0x20/0x20 [ 1207.294548] ? ksys_dup3+0x680/0x680 [ 1207.298259] ? find_held_lock+0x36/0x1c0 [ 1207.302322] ? kasan_check_write+0x14/0x20 [ 1207.306564] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1207.311502] ? wait_for_completion+0x8a0/0x8a0 [ 1207.316180] ? __lock_is_held+0xb5/0x140 [ 1207.320252] ? __fget_light+0x2e9/0x430 [ 1207.324232] kvm_vcpu_compat_ioctl+0x210/0x4a0 [ 1207.328856] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1207.333178] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1207.338719] ? fput+0x130/0x1a0 [ 1207.341996] ? do_fast_syscall_32+0x150/0xfb2 [ 1207.346507] ? do_fast_syscall_32+0x150/0xfb2 [ 1207.351017] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1207.355612] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1207.359933] __ia32_compat_sys_ioctl+0x20e/0x630 [ 1207.364699] do_fast_syscall_32+0x34d/0xfb2 [ 1207.369026] ? do_int80_syscall_32+0x890/0x890 [ 1207.373631] ? entry_SYSENTER_compat+0x68/0x7f [ 1207.378245] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1207.383260] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1207.388105] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1207.392968] ? trace_hardirqs_on_caller+0x310/0x310 [ 1207.398005] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1207.403025] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1207.408051] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1207.412919] entry_SYSENTER_compat+0x70/0x7f [ 1207.417323] RIP: 0023:0xf7ff6a29 [ 1207.420687] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1207.439596] RSP: 002b:00000000f5ff20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 14:47:46 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e617400000000000000000000000000000000000200", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1207.447337] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000000ae80 [ 1207.454636] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1207.461960] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1207.469263] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1207.476544] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:47:46 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x10000000]}, 0x48) 14:47:46 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x15000000]}, 0x2c) 14:47:46 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1, 0x8}}, 0x10) 14:47:46 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0xff00000000000000, @in6}}, 0x90) 14:47:46 executing program 5 (fault-call:6 fault-nth:3): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:46 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x3c000000]}, 0x48) 14:47:46 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1, 0x8}}, 0x10) 14:47:46 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x10000000]}, 0x2c) [ 1207.662128] FAULT_INJECTION: forcing a failure. [ 1207.662128] name failslab, interval 1, probability 0, space 0, times 0 [ 1207.720153] CPU: 0 PID: 12224 Comm: syz-executor5 Not tainted 4.20.0-rc3+ #251 [ 1207.727552] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1207.736905] Call Trace: [ 1207.739515] dump_stack+0x244/0x39d [ 1207.743185] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1207.748416] ? __kernel_text_address+0xd/0x40 [ 1207.752941] ? unwind_get_return_address+0x61/0xa0 [ 1207.757887] should_fail.cold.4+0xa/0x17 [ 1207.761959] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1207.767104] ? save_stack+0xa9/0xd0 [ 1207.770740] ? kasan_kmalloc+0xc7/0xe0 [ 1207.774631] ? kasan_slab_alloc+0x12/0x20 [ 1207.778789] ? kmem_cache_alloc+0x12e/0x730 [ 1207.782501] IPVS: ftp: loaded support on port[0] = 21 [ 1207.783157] ? mmu_topup_memory_caches+0xfb/0x470 [ 1207.783174] ? kvm_mmu_load+0x21/0x1290 [ 1207.783187] ? kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1207.783207] ? zap_class+0x640/0x640 [ 1207.793231] ? do_fast_syscall_32+0x34d/0xfb2 [ 1207.802292] ? entry_SYSENTER_compat+0x70/0x7f [ 1207.802315] ? find_held_lock+0x36/0x1c0 [ 1207.802338] ? __lock_is_held+0xb5/0x140 [ 1207.810545] ? perf_trace_sched_process_exec+0x860/0x860 [ 1207.810569] __should_failslab+0x124/0x180 [ 1207.810587] should_failslab+0x9/0x14 [ 1207.819232] kmem_cache_alloc+0x2be/0x730 [ 1207.819247] ? lock_acquire+0x1ed/0x520 [ 1207.819273] ? kvm_arch_vcpu_ioctl_run+0x30f/0x72a0 [ 1207.819308] ? mmu_topup_memory_caches+0xfb/0x470 [ 1207.828872] mmu_topup_memory_caches+0xfb/0x470 [ 1207.828903] ? kvm_inject_realmode_interrupt+0x260/0x260 [ 1207.828924] kvm_mmu_load+0x21/0x1290 [ 1207.828948] kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1207.828966] ? kvm_vcpu_ioctl+0x1e5/0x1150 [ 1207.828983] ? __lock_acquire+0x62f/0x4c20 [ 1207.837026] ? kvm_arch_vcpu_runnable+0x710/0x710 [ 1207.837040] ? zap_class+0x640/0x640 [ 1207.837054] ? mark_held_locks+0x130/0x130 [ 1207.837070] ? print_usage_bug+0xc0/0xc0 [ 1207.845219] ? mark_held_locks+0xc7/0x130 [ 1207.845237] ? mem_cgroup_commit_charge+0x2c1/0xa50 [ 1207.845266] ? zap_class+0x640/0x640 [ 1207.845301] ? find_held_lock+0x36/0x1c0 [ 1207.845323] ? get_task_pid+0x1ea/0x3b0 14:47:46 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x200000000000000, @in6}}, 0x90) [ 1207.845340] ? lock_downgrade+0x900/0x900 [ 1207.855184] ? check_preemption_disabled+0x48/0x280 [ 1207.855216] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1207.855230] ? kasan_check_read+0x11/0x20 [ 1207.855257] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1207.855285] ? rcu_softirq_qs+0x20/0x20 [ 1207.855330] ? get_task_pid+0x211/0x3b0 [ 1207.865419] ? find_get_pid+0x270/0x270 [ 1207.865442] kvm_vcpu_ioctl+0x5c8/0x1150 [ 1207.865470] ? kvm_vcpu_ioctl+0x5c8/0x1150 [ 1207.865504] ? kvm_uevent_notify_change.part.32+0x450/0x450 [ 1207.865518] ? lock_downgrade+0x900/0x900 [ 1207.865551] ? check_preemption_disabled+0x48/0x280 [ 1207.874290] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1207.874319] ? kasan_check_read+0x11/0x20 [ 1207.874332] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1207.874350] ? rcu_softirq_qs+0x20/0x20 [ 1207.882832] ? ksys_dup3+0x680/0x680 [ 1207.882846] ? find_held_lock+0x36/0x1c0 [ 1207.882865] ? kasan_check_write+0x14/0x20 [ 1207.891392] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1207.891412] ? wait_for_completion+0x8a0/0x8a0 14:47:46 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x6800]}, 0x48) [ 1207.891431] ? __lock_is_held+0xb5/0x140 [ 1207.891449] ? __fget_light+0x2e9/0x430 [ 1207.899736] kvm_vcpu_compat_ioctl+0x210/0x4a0 [ 1207.899754] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1207.899769] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1207.899786] ? fput+0x130/0x1a0 [ 1207.908928] ? do_fast_syscall_32+0x150/0xfb2 [ 1207.908942] ? do_fast_syscall_32+0x150/0xfb2 [ 1207.908959] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1207.916708] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1207.916724] __ia32_compat_sys_ioctl+0x20e/0x630 [ 1207.916746] do_fast_syscall_32+0x34d/0xfb2 [ 1207.916779] ? do_int80_syscall_32+0x890/0x890 [ 1207.916793] ? entry_SYSENTER_compat+0x68/0x7f [ 1207.916811] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1207.924925] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1207.924939] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1207.924955] ? trace_hardirqs_on_caller+0x310/0x310 [ 1207.924970] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1207.924986] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1207.925004] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1207.925024] entry_SYSENTER_compat+0x70/0x7f [ 1207.934985] RIP: 0023:0xf7ff6a29 [ 1207.935001] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1207.935009] RSP: 002b:00000000f5ff20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 1207.935038] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000000ae80 [ 1207.935061] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 14:47:46 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x71]}, 0x48) [ 1207.935070] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1207.935102] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1207.935112] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1208.535231] device bridge_slave_1 left promiscuous mode [ 1208.541004] bridge0: port 2(bridge_slave_1) entered disabled state [ 1208.565275] device bridge_slave_0 left promiscuous mode [ 1208.570700] bridge0: port 1(bridge_slave_0) entered disabled state [ 1208.625806] team0 (unregistering): Port device team_slave_1 removed [ 1208.636070] team0 (unregistering): Port device team_slave_0 removed [ 1208.647705] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1208.688188] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1208.763511] bond0 (unregistering): Released all slaves [ 1209.015736] bridge0: port 1(bridge_slave_0) entered blocking state [ 1209.022206] bridge0: port 1(bridge_slave_0) entered disabled state [ 1209.029891] device bridge_slave_0 entered promiscuous mode [ 1209.074279] bridge0: port 2(bridge_slave_1) entered blocking state [ 1209.081116] bridge0: port 2(bridge_slave_1) entered disabled state [ 1209.088686] device bridge_slave_1 entered promiscuous mode [ 1209.130901] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1209.172511] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1209.298532] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1209.346126] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1209.545801] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1209.553175] team0: Port device team_slave_0 added [ 1209.594971] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1209.602324] team0: Port device team_slave_1 added [ 1209.643498] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1209.687660] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1209.733299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1209.777803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1210.148801] bridge0: port 2(bridge_slave_1) entered blocking state [ 1210.155246] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1210.161920] bridge0: port 1(bridge_slave_0) entered blocking state [ 1210.168339] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1210.176302] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1210.874741] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1211.088966] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1211.175175] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1211.259037] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1211.265381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1211.272351] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1211.356089] 8021q: adding VLAN 0 to HW filter on device team0 14:47:50 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e6174000000000000000000000000000300", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:50 executing program 5 (fault-call:6 fault-nth:4): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:50 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1, 0x8}}, 0x10) 14:47:50 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x7000000]}, 0x48) 14:47:50 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0xf00]}, 0x2c) 14:47:50 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x2ded000000000000, @in6}}, 0x90) [ 1211.902127] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1211.911391] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1211.964119] FAULT_INJECTION: forcing a failure. [ 1211.964119] name failslab, interval 1, probability 0, space 0, times 0 [ 1211.982715] CPU: 0 PID: 12520 Comm: syz-executor5 Not tainted 4.20.0-rc3+ #251 [ 1211.990094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1211.999442] Call Trace: [ 1212.002030] dump_stack+0x244/0x39d [ 1212.005659] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1212.010863] ? __kernel_text_address+0xd/0x40 [ 1212.015357] ? unwind_get_return_address+0x61/0xa0 [ 1212.020293] should_fail.cold.4+0xa/0x17 [ 1212.024385] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1212.029524] ? save_stack+0xa9/0xd0 [ 1212.033147] ? kasan_kmalloc+0xc7/0xe0 [ 1212.037031] ? kasan_slab_alloc+0x12/0x20 [ 1212.041215] ? kmem_cache_alloc+0x12e/0x730 [ 1212.045532] ? mmu_topup_memory_caches+0xfb/0x470 [ 1212.050365] ? kvm_mmu_load+0x21/0x1290 [ 1212.054331] ? kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1212.059429] ? zap_class+0x640/0x640 [ 1212.063155] ? do_fast_syscall_32+0x34d/0xfb2 [ 1212.067660] ? entry_SYSENTER_compat+0x70/0x7f [ 1212.072266] ? find_held_lock+0x36/0x1c0 [ 1212.076327] ? __lock_is_held+0xb5/0x140 [ 1212.080397] ? perf_trace_sched_process_exec+0x860/0x860 [ 1212.085888] __should_failslab+0x124/0x180 [ 1212.090141] should_failslab+0x9/0x14 [ 1212.093940] kmem_cache_alloc+0x2be/0x730 [ 1212.098093] ? lock_acquire+0x1ed/0x520 [ 1212.102067] ? kvm_arch_vcpu_ioctl_run+0x30f/0x72a0 [ 1212.107104] ? mmu_topup_memory_caches+0xfb/0x470 [ 1212.111963] mmu_topup_memory_caches+0xfb/0x470 [ 1212.116631] ? kvm_inject_realmode_interrupt+0x260/0x260 [ 1212.122085] kvm_mmu_load+0x21/0x1290 [ 1212.125906] kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1212.130847] ? kvm_vcpu_ioctl+0x1e5/0x1150 [ 1212.135081] ? __lock_acquire+0x62f/0x4c20 [ 1212.139347] ? kvm_arch_vcpu_runnable+0x710/0x710 [ 1212.144191] ? zap_class+0x640/0x640 [ 1212.147906] ? mark_held_locks+0x130/0x130 [ 1212.152138] ? print_usage_bug+0xc0/0xc0 [ 1212.156196] ? mark_held_locks+0xc7/0x130 [ 1212.160368] ? mem_cgroup_commit_charge+0x2c1/0xa50 [ 1212.165429] ? zap_class+0x640/0x640 [ 1212.169151] ? find_held_lock+0x36/0x1c0 [ 1212.173219] ? get_task_pid+0x1ea/0x3b0 [ 1212.177195] ? lock_downgrade+0x900/0x900 [ 1212.181348] ? check_preemption_disabled+0x48/0x280 [ 1212.186366] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1212.191295] ? kasan_check_read+0x11/0x20 [ 1212.195441] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1212.200718] ? rcu_softirq_qs+0x20/0x20 [ 1212.204702] ? get_task_pid+0x211/0x3b0 [ 1212.208689] ? find_get_pid+0x270/0x270 [ 1212.212696] kvm_vcpu_ioctl+0x5c8/0x1150 [ 1212.216752] ? kvm_vcpu_ioctl+0x5c8/0x1150 [ 1212.220986] ? kvm_uevent_notify_change.part.32+0x450/0x450 [ 1212.226690] ? lock_downgrade+0x900/0x900 [ 1212.230840] ? check_preemption_disabled+0x48/0x280 [ 1212.235884] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1212.240806] ? kasan_check_read+0x11/0x20 [ 1212.244959] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1212.250242] ? rcu_softirq_qs+0x20/0x20 [ 1212.254233] ? ksys_dup3+0x680/0x680 [ 1212.257943] ? find_held_lock+0x36/0x1c0 [ 1212.262003] ? kasan_check_write+0x14/0x20 [ 1212.266281] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1212.271215] ? wait_for_completion+0x8a0/0x8a0 [ 1212.275825] ? __lock_is_held+0xb5/0x140 [ 1212.279926] ? __fget_light+0x2e9/0x430 [ 1212.283936] kvm_vcpu_compat_ioctl+0x210/0x4a0 [ 1212.288558] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1212.292895] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1212.298429] ? fput+0x130/0x1a0 [ 1212.301733] ? do_fast_syscall_32+0x150/0xfb2 [ 1212.306249] ? do_fast_syscall_32+0x150/0xfb2 [ 1212.310746] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1212.315334] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1212.319655] __ia32_compat_sys_ioctl+0x20e/0x630 [ 1212.324419] do_fast_syscall_32+0x34d/0xfb2 [ 1212.328759] ? do_int80_syscall_32+0x890/0x890 [ 1212.333340] ? entry_SYSENTER_compat+0x68/0x7f [ 1212.337919] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1212.342944] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1212.347795] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1212.352637] ? trace_hardirqs_on_caller+0x310/0x310 [ 1212.357649] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1212.362673] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1212.367691] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1212.372538] entry_SYSENTER_compat+0x70/0x7f [ 1212.376949] RIP: 0023:0xf7ff6a29 [ 1212.380336] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1212.399238] RSP: 002b:00000000f5ff20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 1212.406949] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000000ae80 14:47:51 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x71000000]}, 0x48) [ 1212.414392] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1212.421663] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1212.428930] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1212.436201] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:47:51 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(0xffffffffffffffff, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1, 0x8}}, 0x10) 14:47:51 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x6]}, 0x2c) 14:47:51 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e617400000000000000000000000000000000000500", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1212.491533] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1212.502911] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:51 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x20000000]}, 0x48) 14:47:51 executing program 5 (fault-call:6 fault-nth:5): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1212.594642] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1212.609007] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:51 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x600000000000000]}, 0x2c) 14:47:51 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:51 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xff000000]}, 0x48) 14:47:51 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(0xffffffffffffffff, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1, 0x8}}, 0x10) 14:47:51 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x48) 14:47:51 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x2000000, @in6}}, 0x90) 14:47:51 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1212.784054] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1212.793376] FAULT_INJECTION: forcing a failure. [ 1212.793376] name failslab, interval 1, probability 0, space 0, times 0 [ 1212.798132] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1212.851376] CPU: 0 PID: 12564 Comm: syz-executor5 Not tainted 4.20.0-rc3+ #251 [ 1212.858748] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1212.868104] Call Trace: [ 1212.868144] dump_stack+0x244/0x39d [ 1212.868183] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1212.868202] ? __kernel_text_address+0xd/0x40 [ 1212.868218] ? unwind_get_return_address+0x61/0xa0 [ 1212.868242] should_fail.cold.4+0xa/0x17 [ 1212.868264] ? fault_create_debugfs_attr+0x1f0/0x1f0 14:47:51 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e617400000000000000000000000500", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1212.868284] ? save_stack+0xa9/0xd0 [ 1212.868301] ? kasan_kmalloc+0xc7/0xe0 [ 1212.868317] ? kasan_slab_alloc+0x12/0x20 [ 1212.868332] ? kmem_cache_alloc+0x12e/0x730 [ 1212.868349] ? mmu_topup_memory_caches+0xfb/0x470 [ 1212.868365] ? kvm_mmu_load+0x21/0x1290 [ 1212.868379] ? kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1212.868396] ? zap_class+0x640/0x640 [ 1212.868412] ? do_fast_syscall_32+0x34d/0xfb2 [ 1212.868425] ? entry_SYSENTER_compat+0x70/0x7f [ 1212.868449] ? find_held_lock+0x36/0x1c0 [ 1212.868472] ? __lock_is_held+0xb5/0x140 [ 1212.868553] ? bond_change_active_slave+0x2048/0x2540 [ 1212.868587] ? perf_trace_sched_process_exec+0x860/0x860 [ 1212.897979] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1212.898611] __should_failslab+0x124/0x180 [ 1212.898631] should_failslab+0x9/0x14 [ 1212.898645] kmem_cache_alloc+0x2be/0x730 [ 1212.898661] ? lock_acquire+0x1ed/0x520 [ 1212.898679] ? kvm_arch_vcpu_ioctl_run+0x30f/0x72a0 [ 1212.907857] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1212.910357] ? mmu_topup_memory_caches+0xfb/0x470 [ 1212.910406] mmu_topup_memory_caches+0xfb/0x470 [ 1212.910436] ? kvm_inject_realmode_interrupt+0x260/0x260 [ 1212.910471] kvm_mmu_load+0x21/0x1290 [ 1212.928670] kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1212.936852] ? kvm_vcpu_ioctl+0x1e5/0x1150 [ 1212.936868] ? __lock_acquire+0x62f/0x4c20 [ 1212.936891] ? kvm_arch_vcpu_runnable+0x710/0x710 [ 1212.936905] ? zap_class+0x640/0x640 [ 1212.936919] ? mark_held_locks+0x130/0x130 [ 1212.936936] ? print_usage_bug+0xc0/0xc0 [ 1212.972278] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1212.972850] ? mark_held_locks+0xc7/0x130 [ 1212.979931] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1212.980790] ? mem_cgroup_commit_charge+0x2c1/0xa50 [ 1212.980805] ? zap_class+0x640/0x640 [ 1212.980865] ? find_held_lock+0x36/0x1c0 [ 1212.980885] ? get_task_pid+0x1ea/0x3b0 [ 1213.084709] ? lock_downgrade+0x900/0x900 [ 1213.088874] ? check_preemption_disabled+0x48/0x280 [ 1213.093955] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1213.098930] ? kasan_check_read+0x11/0x20 [ 1213.103085] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1213.108381] ? rcu_softirq_qs+0x20/0x20 [ 1213.112393] ? get_task_pid+0x211/0x3b0 [ 1213.116366] ? find_get_pid+0x270/0x270 [ 1213.120345] kvm_vcpu_ioctl+0x5c8/0x1150 [ 1213.124408] ? kvm_vcpu_ioctl+0x5c8/0x1150 [ 1213.128645] ? kvm_uevent_notify_change.part.32+0x450/0x450 [ 1213.134352] ? lock_downgrade+0x900/0x900 [ 1213.138501] ? check_preemption_disabled+0x48/0x280 [ 1213.143519] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1213.148446] ? kasan_check_read+0x11/0x20 [ 1213.152593] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1213.157867] ? rcu_softirq_qs+0x20/0x20 [ 1213.161912] ? ksys_dup3+0x680/0x680 [ 1213.165651] ? find_held_lock+0x36/0x1c0 [ 1213.169716] ? kasan_check_write+0x14/0x20 [ 1213.173948] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1213.178884] ? wait_for_completion+0x8a0/0x8a0 [ 1213.183497] ? __lock_is_held+0xb5/0x140 [ 1213.187580] ? __fget_light+0x2e9/0x430 [ 1213.191578] kvm_vcpu_compat_ioctl+0x210/0x4a0 [ 1213.196163] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1213.200484] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1213.206020] ? fput+0x130/0x1a0 [ 1213.209295] ? do_fast_syscall_32+0x150/0xfb2 [ 1213.213785] ? do_fast_syscall_32+0x150/0xfb2 [ 1213.218453] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1213.223037] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1213.227355] __ia32_compat_sys_ioctl+0x20e/0x630 [ 1213.232132] do_fast_syscall_32+0x34d/0xfb2 [ 1213.236456] ? do_int80_syscall_32+0x890/0x890 [ 1213.241035] ? entry_SYSENTER_compat+0x68/0x7f [ 1213.245615] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1213.250643] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1213.255481] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1213.260318] ? trace_hardirqs_on_caller+0x310/0x310 [ 1213.265330] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1213.270343] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1213.275366] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1213.280230] entry_SYSENTER_compat+0x70/0x7f [ 1213.284633] RIP: 0023:0xf7ff6a29 14:47:52 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1213.287999] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1213.306962] RSP: 002b:00000000f5ff20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 1213.314672] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000000ae80 [ 1213.321948] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1213.329255] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1213.336517] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1213.343778] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:47:52 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x3000000]}, 0x48) 14:47:52 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(0xffffffffffffffff, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1, 0x8}}, 0x10) [ 1213.392396] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:52 executing program 5 (fault-call:6 fault-nth:6): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:52 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x300000000000000]}, 0x2c) [ 1213.445534] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:52 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e6174000000000000000000000200", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:52 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0xff00, @in6}}, 0x90) 14:47:52 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, 0x0, 0x0) 14:47:52 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x1018]}, 0x48) 14:47:52 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x1200000000000000]}, 0x2c) [ 1213.647467] FAULT_INJECTION: forcing a failure. [ 1213.647467] name failslab, interval 1, probability 0, space 0, times 0 [ 1213.662255] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1213.699235] CPU: 1 PID: 12616 Comm: syz-executor5 Not tainted 4.20.0-rc3+ #251 [ 1213.706663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1213.716021] Call Trace: [ 1213.718621] dump_stack+0x244/0x39d [ 1213.722259] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1213.727453] ? __kernel_text_address+0xd/0x40 [ 1213.731951] ? unwind_get_return_address+0x61/0xa0 [ 1213.736892] should_fail.cold.4+0xa/0x17 [ 1213.740964] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1213.746092] ? save_stack+0xa9/0xd0 [ 1213.749734] ? kasan_kmalloc+0xc7/0xe0 [ 1213.753631] ? kasan_slab_alloc+0x12/0x20 [ 1213.757785] ? kmem_cache_alloc+0x12e/0x730 [ 1213.757803] ? mmu_topup_memory_caches+0xfb/0x470 [ 1213.757829] ? kvm_mmu_load+0x21/0x1290 [ 1213.757844] ? kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1213.757863] ? zap_class+0x640/0x640 [ 1213.779782] ? do_fast_syscall_32+0x34d/0xfb2 [ 1213.784302] ? entry_SYSENTER_compat+0x70/0x7f [ 1213.788921] ? find_held_lock+0x36/0x1c0 [ 1213.788943] ? __lock_is_held+0xb5/0x140 [ 1213.788960] ? __kprobes_text_end+0x3bab0/0x44db8 [ 1213.801909] ? perf_trace_sched_process_exec+0x860/0x860 [ 1213.807383] __should_failslab+0x124/0x180 [ 1213.811634] should_failslab+0x9/0x14 [ 1213.815436] kmem_cache_alloc+0x2be/0x730 [ 1213.819588] ? lock_acquire+0x1ed/0x520 [ 1213.823568] ? kvm_arch_vcpu_ioctl_run+0x30f/0x72a0 [ 1213.828616] ? mmu_topup_memory_caches+0xfb/0x470 [ 1213.833476] mmu_topup_memory_caches+0xfb/0x470 [ 1213.838152] ? kvm_inject_realmode_interrupt+0x260/0x260 [ 1213.843629] kvm_mmu_load+0x21/0x1290 [ 1213.847438] kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1213.852399] ? kvm_vcpu_ioctl+0x1e5/0x1150 [ 1213.856656] ? __lock_acquire+0x62f/0x4c20 [ 1213.860926] ? kvm_arch_vcpu_runnable+0x710/0x710 [ 1213.865780] ? zap_class+0x640/0x640 [ 1213.869496] ? mark_held_locks+0x130/0x130 [ 1213.873728] ? print_usage_bug+0xc0/0xc0 [ 1213.877788] ? mark_held_locks+0xc7/0x130 [ 1213.881976] ? mem_cgroup_commit_charge+0x2c1/0xa50 [ 1213.886991] ? zap_class+0x640/0x640 [ 1213.890729] ? find_held_lock+0x36/0x1c0 [ 1213.894827] ? get_task_pid+0x1ea/0x3b0 [ 1213.898851] ? lock_downgrade+0x900/0x900 [ 1213.903017] ? check_preemption_disabled+0x48/0x280 [ 1213.908056] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1213.912990] ? kasan_check_read+0x11/0x20 [ 1213.917155] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1213.922465] ? rcu_softirq_qs+0x20/0x20 [ 1213.926478] ? get_task_pid+0x211/0x3b0 [ 1213.930468] ? find_get_pid+0x270/0x270 [ 1213.934454] kvm_vcpu_ioctl+0x5c8/0x1150 [ 1213.938522] ? kvm_vcpu_ioctl+0x5c8/0x1150 [ 1213.942764] ? kvm_uevent_notify_change.part.32+0x450/0x450 [ 1213.948494] ? lock_downgrade+0x900/0x900 [ 1213.952643] ? check_preemption_disabled+0x48/0x280 [ 1213.957663] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1213.962631] ? kasan_check_read+0x11/0x20 [ 1213.966779] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1213.972075] ? rcu_softirq_qs+0x20/0x20 [ 1213.976090] ? ksys_dup3+0x680/0x680 [ 1213.979825] ? find_held_lock+0x36/0x1c0 [ 1213.983895] ? kasan_check_write+0x14/0x20 [ 1213.988131] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1213.993061] ? wait_for_completion+0x8a0/0x8a0 [ 1213.997646] ? __lock_is_held+0xb5/0x140 [ 1214.001712] ? __fget_light+0x2e9/0x430 [ 1214.005696] kvm_vcpu_compat_ioctl+0x210/0x4a0 [ 1214.010285] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1214.014631] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1214.020174] ? fput+0x130/0x1a0 [ 1214.023462] ? do_fast_syscall_32+0x150/0xfb2 [ 1214.027965] ? do_fast_syscall_32+0x150/0xfb2 [ 1214.032466] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1214.037068] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1214.041397] __ia32_compat_sys_ioctl+0x20e/0x630 [ 1214.046169] do_fast_syscall_32+0x34d/0xfb2 [ 1214.050496] ? do_int80_syscall_32+0x890/0x890 [ 1214.055080] ? entry_SYSENTER_compat+0x68/0x7f [ 1214.059663] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1214.064678] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1214.069578] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1214.074426] ? trace_hardirqs_on_caller+0x310/0x310 [ 1214.079443] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1214.084462] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1214.089497] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1214.094347] entry_SYSENTER_compat+0x70/0x7f [ 1214.098752] RIP: 0023:0xf7ff6a29 [ 1214.102137] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1214.121065] RSP: 002b:00000000f5ff20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 1214.128774] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000000ae80 [ 1214.136044] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1214.143328] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 14:47:52 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, 0x0, 0x0) 14:47:52 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x6c00000000000000]}, 0x48) 14:47:52 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e6174000000000000000000000300", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1214.150651] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1214.157918] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1214.172130] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:52 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0x2}}}, 0x90) 14:47:52 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x7100000000000000]}, 0x48) [ 1214.285129] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:53 executing program 5 (fault-call:6 fault-nth:7): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:53 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x2000000]}, 0x2c) 14:47:53 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, 0x0, 0x0) 14:47:53 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e617400000000000000000000000000ff00", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:53 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x400000000000000]}, 0x48) 14:47:53 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0x1b}}}, 0x90) [ 1214.452551] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1214.499934] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:53 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x8}}, 0x10) 14:47:53 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x3c]}, 0x48) 14:47:53 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x6000000]}, 0x2c) [ 1214.547188] FAULT_INJECTION: forcing a failure. [ 1214.547188] name failslab, interval 1, probability 0, space 0, times 0 [ 1214.600176] CPU: 1 PID: 12674 Comm: syz-executor5 Not tainted 4.20.0-rc3+ #251 [ 1214.607604] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1214.616984] Call Trace: [ 1214.619585] dump_stack+0x244/0x39d [ 1214.623236] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1214.628476] ? __kernel_text_address+0xd/0x40 [ 1214.632998] ? unwind_get_return_address+0x61/0xa0 [ 1214.637958] should_fail.cold.4+0xa/0x17 [ 1214.642035] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1214.647156] ? save_stack+0xa9/0xd0 [ 1214.650791] ? kasan_kmalloc+0xc7/0xe0 [ 1214.654692] ? kasan_slab_alloc+0x12/0x20 [ 1214.658851] ? kmem_cache_alloc+0x12e/0x730 [ 1214.663175] ? mmu_topup_memory_caches+0xfb/0x470 [ 1214.668021] ? kvm_mmu_load+0x21/0x1290 [ 1214.671995] ? kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1214.677101] ? zap_class+0x640/0x640 [ 1214.680815] ? do_fast_syscall_32+0x34d/0xfb2 [ 1214.685378] ? entry_SYSENTER_compat+0x70/0x7f [ 1214.689983] ? find_held_lock+0x36/0x1c0 [ 1214.694048] ? __lock_is_held+0xb5/0x140 [ 1214.698143] ? perf_trace_sched_process_exec+0x860/0x860 [ 1214.703611] __should_failslab+0x124/0x180 [ 1214.707858] should_failslab+0x9/0x14 [ 1214.711659] kmem_cache_alloc+0x2be/0x730 [ 1214.715835] ? lock_acquire+0x1ed/0x520 [ 1214.719809] ? kvm_arch_vcpu_ioctl_run+0x30f/0x72a0 [ 1214.724840] ? mmu_topup_memory_caches+0xfb/0x470 [ 1214.729687] mmu_topup_memory_caches+0xfb/0x470 [ 1214.734354] ? kvm_inject_realmode_interrupt+0x260/0x260 [ 1214.739811] kvm_mmu_load+0x21/0x1290 [ 1214.743639] kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1214.748620] ? kvm_vcpu_ioctl+0x1e5/0x1150 [ 1214.752861] ? __lock_acquire+0x62f/0x4c20 [ 1214.757110] ? kvm_arch_vcpu_runnable+0x710/0x710 [ 1214.761958] ? zap_class+0x640/0x640 [ 1214.765677] ? mark_held_locks+0x130/0x130 [ 1214.769908] ? print_usage_bug+0xc0/0xc0 [ 1214.773970] ? mark_held_locks+0xc7/0x130 [ 1214.778193] ? mem_cgroup_commit_charge+0x2c1/0xa50 [ 1214.783219] ? zap_class+0x640/0x640 [ 1214.786950] ? find_held_lock+0x36/0x1c0 [ 1214.791032] ? get_task_pid+0x1ea/0x3b0 [ 1214.795034] ? lock_downgrade+0x900/0x900 [ 1214.799193] ? check_preemption_disabled+0x48/0x280 [ 1214.804238] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1214.809172] ? kasan_check_read+0x11/0x20 [ 1214.813341] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1214.818631] ? rcu_softirq_qs+0x20/0x20 [ 1214.822633] ? get_task_pid+0x211/0x3b0 [ 1214.826619] ? find_get_pid+0x270/0x270 [ 1214.830620] kvm_vcpu_ioctl+0x5c8/0x1150 [ 1214.834687] ? kvm_vcpu_ioctl+0x5c8/0x1150 [ 1214.838936] ? kvm_uevent_notify_change.part.32+0x450/0x450 [ 1214.844670] ? lock_downgrade+0x900/0x900 [ 1214.848833] ? check_preemption_disabled+0x48/0x280 [ 1214.853869] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1214.858803] ? kasan_check_read+0x11/0x20 [ 1214.862965] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1214.868251] ? rcu_softirq_qs+0x20/0x20 [ 1214.872259] ? ksys_dup3+0x680/0x680 [ 1214.875978] ? find_held_lock+0x36/0x1c0 [ 1214.880049] ? kasan_check_write+0x14/0x20 [ 1214.884291] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1214.889235] ? wait_for_completion+0x8a0/0x8a0 [ 1214.893841] ? __lock_is_held+0xb5/0x140 [ 1214.897920] ? __fget_light+0x2e9/0x430 [ 1214.901908] kvm_vcpu_compat_ioctl+0x210/0x4a0 [ 1214.906512] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1214.910844] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1214.916418] ? fput+0x130/0x1a0 [ 1214.919714] ? do_fast_syscall_32+0x150/0xfb2 [ 1214.924226] ? do_fast_syscall_32+0x150/0xfb2 [ 1214.928733] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1214.933331] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1214.937659] __ia32_compat_sys_ioctl+0x20e/0x630 [ 1214.942425] do_fast_syscall_32+0x34d/0xfb2 [ 1214.946765] ? do_int80_syscall_32+0x890/0x890 [ 1214.951366] ? entry_SYSENTER_compat+0x68/0x7f [ 1214.955997] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1214.961030] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1214.965875] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1214.970724] ? trace_hardirqs_on_caller+0x310/0x310 [ 1214.975744] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1214.980764] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1214.985787] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1214.990653] entry_SYSENTER_compat+0x70/0x7f [ 1214.995055] RIP: 0023:0xf7ff6a29 [ 1214.998435] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1215.017359] RSP: 002b:00000000f5ff20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 1215.025060] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000000ae80 [ 1215.032321] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1215.039607] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 14:47:53 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e6174000000000000000000000000000500", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1215.046902] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1215.054202] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1215.081172] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:53 executing program 5 (fault-call:6 fault-nth:8): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:53 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}, 0x48) 14:47:53 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e6174000000000000000000000500", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1215.101942] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:53 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0xfec0000000000000}}}, 0x90) 14:47:53 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x8}}, 0x10) 14:47:53 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x5000000]}, 0x2c) 14:47:53 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00000000000000]}, 0x48) 14:47:53 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1215.260814] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1215.273180] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:54 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x8}}, 0x10) [ 1215.328065] FAULT_INJECTION: forcing a failure. [ 1215.328065] name failslab, interval 1, probability 0, space 0, times 0 [ 1215.344791] CPU: 0 PID: 12717 Comm: syz-executor5 Not tainted 4.20.0-rc3+ #251 [ 1215.352198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1215.361556] Call Trace: [ 1215.364155] dump_stack+0x244/0x39d [ 1215.367834] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1215.373041] ? debug_smp_processor_id+0x1c/0x20 [ 1215.377717] ? perf_trace_lock+0x14d/0x7a0 [ 1215.382015] should_fail.cold.4+0xa/0x17 [ 1215.386089] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1215.391220] ? save_stack+0xa9/0xd0 [ 1215.394866] ? kasan_kmalloc+0xc7/0xe0 [ 1215.398764] ? kasan_slab_alloc+0x12/0x20 [ 1215.402922] ? kmem_cache_alloc+0x12e/0x730 [ 1215.407254] ? mmu_topup_memory_caches+0xfb/0x470 [ 1215.412330] ? kvm_mmu_load+0x21/0x1290 [ 1215.416314] ? kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1215.421418] ? zap_class+0x640/0x640 [ 1215.425133] ? do_fast_syscall_32+0x34d/0xfb2 [ 1215.429704] ? find_held_lock+0x36/0x1c0 [ 1215.433781] ? __lock_is_held+0xb5/0x140 [ 1215.437857] ? perf_trace_sched_process_exec+0x860/0x860 [ 1215.443313] __should_failslab+0x124/0x180 [ 1215.447595] should_failslab+0x9/0x14 [ 1215.451411] kmem_cache_alloc+0x2be/0x730 [ 1215.455556] ? lock_acquire+0x1ed/0x520 [ 1215.459529] ? kvm_arch_vcpu_ioctl_run+0x30f/0x72a0 [ 1215.464542] ? mmu_topup_memory_caches+0xfb/0x470 [ 1215.469384] mmu_topup_memory_caches+0xfb/0x470 [ 1215.474050] ? kvm_inject_realmode_interrupt+0x260/0x260 [ 1215.479503] kvm_mmu_load+0x21/0x1290 [ 1215.483337] kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1215.488281] ? kvm_vcpu_ioctl+0x1e5/0x1150 [ 1215.492537] ? kvm_arch_vcpu_runnable+0x710/0x710 [ 1215.497389] ? zap_class+0x640/0x640 [ 1215.501131] ? mark_held_locks+0x130/0x130 [ 1215.505363] ? lock_is_held_type+0x210/0x210 [ 1215.509795] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1215.515356] ? check_preemption_disabled+0x48/0x280 [ 1215.520373] ? find_held_lock+0x36/0x1c0 [ 1215.524442] ? get_task_pid+0x1ea/0x3b0 [ 1215.528416] ? lock_downgrade+0x900/0x900 [ 1215.532565] ? check_preemption_disabled+0x48/0x280 [ 1215.537584] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1215.542512] ? kasan_check_read+0x11/0x20 [ 1215.546654] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1215.551927] ? rcu_softirq_qs+0x20/0x20 [ 1215.555905] ? get_task_pid+0x211/0x3b0 [ 1215.559879] ? find_get_pid+0x270/0x270 [ 1215.563863] kvm_vcpu_ioctl+0x5c8/0x1150 [ 1215.567921] ? kvm_vcpu_ioctl+0x5c8/0x1150 [ 1215.572332] ? kvm_uevent_notify_change.part.32+0x450/0x450 [ 1215.578102] ? lock_downgrade+0x900/0x900 [ 1215.582257] ? check_preemption_disabled+0x48/0x280 [ 1215.587267] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1215.592195] ? kasan_check_read+0x11/0x20 [ 1215.596335] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1215.601601] ? rcu_softirq_qs+0x20/0x20 [ 1215.605588] ? ksys_dup3+0x680/0x680 [ 1215.609294] ? find_held_lock+0x36/0x1c0 [ 1215.613388] ? kasan_check_write+0x14/0x20 [ 1215.617650] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1215.622578] ? wait_for_completion+0x8a0/0x8a0 [ 1215.627163] ? __fget_light+0x2e9/0x430 [ 1215.631135] kvm_vcpu_compat_ioctl+0x210/0x4a0 [ 1215.635714] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1215.640034] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1215.645583] ? fput+0x130/0x1a0 [ 1215.648860] ? do_fast_syscall_32+0x150/0xfb2 [ 1215.653364] ? do_fast_syscall_32+0x150/0xfb2 [ 1215.657855] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1215.662463] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1215.666800] __ia32_compat_sys_ioctl+0x20e/0x630 [ 1215.671573] do_fast_syscall_32+0x34d/0xfb2 [ 1215.675904] ? do_int80_syscall_32+0x890/0x890 [ 1215.680488] ? entry_SYSENTER_compat+0x68/0x7f [ 1215.685066] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1215.690126] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1215.694980] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1215.699838] ? trace_hardirqs_on_caller+0x310/0x310 [ 1215.704859] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1215.709872] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1215.714904] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1215.719767] entry_SYSENTER_compat+0x70/0x7f [ 1215.724185] RIP: 0023:0xf7ff6a29 [ 1215.727553] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1215.746469] RSP: 002b:00000000f5ff20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 1215.754178] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000000ae80 [ 1215.761464] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1215.768731] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1215.775998] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1215.783268] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1215.813149] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:54 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000]}, 0x48) 14:47:54 executing program 5 (fault-call:6 fault-nth:9): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:54 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x3f00000000000000}}}, 0x90) 14:47:54 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e6174000000000000000000000000000600", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1215.838184] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:47:54 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x8]}, 0x2c) 14:47:54 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1}}, 0x10) 14:47:54 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7400]}, 0x48) 14:47:54 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e6174000000000000000000007fffffff00", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1215.988467] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1216.010614] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1216.015525] FAULT_INJECTION: forcing a failure. [ 1216.015525] name failslab, interval 1, probability 0, space 0, times 0 [ 1216.070120] CPU: 0 PID: 12749 Comm: syz-executor5 Not tainted 4.20.0-rc3+ #251 [ 1216.077513] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1216.086866] Call Trace: [ 1216.089461] dump_stack+0x244/0x39d [ 1216.093154] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1216.098356] ? __kernel_text_address+0xd/0x40 [ 1216.102897] ? unwind_get_return_address+0x61/0xa0 [ 1216.107845] should_fail.cold.4+0xa/0x17 [ 1216.111934] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1216.117135] ? save_stack+0xa9/0xd0 [ 1216.120818] ? kasan_kmalloc+0xc7/0xe0 [ 1216.124697] ? kasan_slab_alloc+0x12/0x20 [ 1216.128833] ? kmem_cache_alloc+0x12e/0x730 [ 1216.133141] ? mmu_topup_memory_caches+0xfb/0x470 [ 1216.138019] ? kvm_mmu_load+0x21/0x1290 [ 1216.141987] ? kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1216.143699] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1216.147104] ? zap_class+0x640/0x640 [ 1216.147122] ? do_fast_syscall_32+0x34d/0xfb2 [ 1216.147137] ? entry_SYSENTER_compat+0x70/0x7f 14:47:54 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1216.147160] ? find_held_lock+0x36/0x1c0 [ 1216.147180] ? __lock_is_held+0xb5/0x140 [ 1216.147210] ? perf_trace_sched_process_exec+0x860/0x860 [ 1216.147264] __should_failslab+0x124/0x180 [ 1216.166782] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1216.168526] should_failslab+0x9/0x14 [ 1216.168542] kmem_cache_alloc+0x2be/0x730 [ 1216.168558] ? lock_acquire+0x1ed/0x520 [ 1216.168571] ? kvm_arch_vcpu_ioctl_run+0x30f/0x72a0 [ 1216.168590] ? mmu_topup_memory_caches+0xfb/0x470 14:47:54 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1216.182135] mmu_topup_memory_caches+0xfb/0x470 [ 1216.182152] ? kvm_inject_realmode_interrupt+0x260/0x260 [ 1216.182174] kvm_mmu_load+0x21/0x1290 [ 1216.182199] kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1216.194832] ? kvm_vcpu_ioctl+0x1e5/0x1150 [ 1216.194851] ? __lock_acquire+0x62f/0x4c20 [ 1216.194878] ? kvm_arch_vcpu_runnable+0x710/0x710 [ 1216.194892] ? zap_class+0x640/0x640 [ 1216.194908] ? mark_held_locks+0x130/0x130 [ 1216.194921] ? print_usage_bug+0xc0/0xc0 [ 1216.194935] ? mark_held_locks+0xc7/0x130 [ 1216.194956] ? mem_cgroup_commit_charge+0x2c1/0xa50 14:47:54 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1216.221757] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1216.226796] ? zap_class+0x640/0x640 [ 1216.226817] ? find_held_lock+0x36/0x1c0 [ 1216.226850] ? get_task_pid+0x1ea/0x3b0 [ 1216.226867] ? lock_downgrade+0x900/0x900 [ 1216.226883] ? check_preemption_disabled+0x48/0x280 [ 1216.226900] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1216.226913] ? kasan_check_read+0x11/0x20 [ 1216.226926] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1216.226940] ? rcu_softirq_qs+0x20/0x20 14:47:55 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e617400000000000000000000000000000000000300", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1216.226964] ? get_task_pid+0x211/0x3b0 [ 1216.226978] ? find_get_pid+0x270/0x270 [ 1216.227000] kvm_vcpu_ioctl+0x5c8/0x1150 [ 1216.236767] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1216.239960] ? kvm_vcpu_ioctl+0x5c8/0x1150 [ 1216.239981] ? kvm_uevent_notify_change.part.32+0x450/0x450 [ 1216.239996] ? lock_downgrade+0x900/0x900 [ 1216.240011] ? check_preemption_disabled+0x48/0x280 [ 1216.240029] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1216.262819] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1216.265261] ? kasan_check_read+0x11/0x20 [ 1216.265277] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1216.265291] ? rcu_softirq_qs+0x20/0x20 [ 1216.265341] ? ksys_dup3+0x680/0x680 [ 1216.265354] ? find_held_lock+0x36/0x1c0 [ 1216.265392] ? kasan_check_write+0x14/0x20 [ 1216.273549] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1216.278854] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1216.278907] ? wait_for_completion+0x8a0/0x8a0 [ 1216.278928] ? __lock_is_held+0xb5/0x140 [ 1216.278951] ? __fget_light+0x2e9/0x430 [ 1216.278988] kvm_vcpu_compat_ioctl+0x210/0x4a0 [ 1216.279009] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1216.279030] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1216.303450] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1216.304810] ? fput+0x130/0x1a0 [ 1216.304842] ? do_fast_syscall_32+0x150/0xfb2 [ 1216.304858] ? do_fast_syscall_32+0x150/0xfb2 [ 1216.304874] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1216.304896] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1216.304910] __ia32_compat_sys_ioctl+0x20e/0x630 [ 1216.304932] do_fast_syscall_32+0x34d/0xfb2 [ 1216.311907] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1216.314371] ? do_int80_syscall_32+0x890/0x890 [ 1216.314390] ? entry_SYSENTER_compat+0x68/0x7f [ 1216.314408] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1216.314424] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1216.314439] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1216.314455] ? trace_hardirqs_on_caller+0x310/0x310 [ 1216.314506] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1216.314541] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1216.314574] entry_SYSENTER_compat+0x70/0x7f [ 1216.527337] RIP: 0023:0xf7ff6a29 [ 1216.530707] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1216.549723] RSP: 002b:00000000f5ff20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 1216.557461] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000000ae80 [ 1216.564728] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 14:47:55 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3c00000000000000]}, 0x48) [ 1216.571996] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1216.579265] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1216.586538] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:47:55 executing program 5 (fault-call:6 fault-nth:10): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:55 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x200000000000000}}}, 0x90) 14:47:55 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1}}, 0x10) 14:47:55 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x4]}, 0x2c) 14:47:55 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7300000000000000]}, 0x48) [ 1216.787437] FAULT_INJECTION: forcing a failure. [ 1216.787437] name failslab, interval 1, probability 0, space 0, times 0 [ 1216.812430] CPU: 1 PID: 12811 Comm: syz-executor5 Not tainted 4.20.0-rc3+ #251 [ 1216.819813] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1216.829185] Call Trace: [ 1216.831791] dump_stack+0x244/0x39d [ 1216.835453] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1216.840665] ? __kernel_text_address+0xd/0x40 [ 1216.845197] ? unwind_get_return_address+0x61/0xa0 [ 1216.850169] should_fail.cold.4+0xa/0x17 [ 1216.854243] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1216.859360] ? save_stack+0xa9/0xd0 [ 1216.863000] ? kasan_kmalloc+0xc7/0xe0 [ 1216.866904] ? kasan_slab_alloc+0x12/0x20 [ 1216.871130] ? kmem_cache_alloc+0x12e/0x730 [ 1216.875473] ? mmu_topup_memory_caches+0xfb/0x470 [ 1216.880314] ? kvm_mmu_load+0x21/0x1290 [ 1216.884298] ? kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1216.889402] ? zap_class+0x640/0x640 [ 1216.893150] ? do_fast_syscall_32+0x34d/0xfb2 [ 1216.897677] ? entry_SYSENTER_compat+0x70/0x7f [ 1216.902283] ? find_held_lock+0x36/0x1c0 [ 1216.906366] ? __lock_is_held+0xb5/0x140 [ 1216.910525] ? perf_trace_sched_process_exec+0x860/0x860 [ 1216.916023] __should_failslab+0x124/0x180 [ 1216.920267] should_failslab+0x9/0x14 [ 1216.924095] kmem_cache_alloc+0x2be/0x730 [ 1216.928296] ? lock_acquire+0x1ed/0x520 [ 1216.932270] ? kvm_arch_vcpu_ioctl_run+0x30f/0x72a0 [ 1216.937298] ? mmu_topup_memory_caches+0xfb/0x470 [ 1216.942148] mmu_topup_memory_caches+0xfb/0x470 [ 1216.946849] ? kvm_inject_realmode_interrupt+0x260/0x260 [ 1216.952325] kvm_mmu_load+0x21/0x1290 [ 1216.956139] kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1216.961076] ? kvm_vcpu_ioctl+0x1e5/0x1150 [ 1216.965324] ? __lock_acquire+0x62f/0x4c20 [ 1216.969574] ? kvm_arch_vcpu_runnable+0x710/0x710 [ 1216.974466] ? zap_class+0x640/0x640 [ 1216.978182] ? mark_held_locks+0x130/0x130 [ 1216.982419] ? print_usage_bug+0xc0/0xc0 [ 1216.986480] ? mark_held_locks+0xc7/0x130 [ 1216.990632] ? mem_cgroup_commit_charge+0x2c1/0xa50 [ 1216.995650] ? zap_class+0x640/0x640 [ 1216.999371] ? find_held_lock+0x36/0x1c0 [ 1217.003442] ? get_task_pid+0x1ea/0x3b0 [ 1217.007437] ? lock_downgrade+0x900/0x900 [ 1217.011612] ? check_preemption_disabled+0x48/0x280 [ 1217.016635] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1217.021560] ? kasan_check_read+0x11/0x20 [ 1217.025709] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1217.031009] ? rcu_softirq_qs+0x20/0x20 [ 1217.035062] ? get_task_pid+0x211/0x3b0 [ 1217.039039] ? find_get_pid+0x270/0x270 [ 1217.043074] kvm_vcpu_ioctl+0x5c8/0x1150 [ 1217.047152] ? kvm_vcpu_ioctl+0x5c8/0x1150 [ 1217.051389] ? kvm_uevent_notify_change.part.32+0x450/0x450 [ 1217.057094] ? lock_downgrade+0x900/0x900 [ 1217.061265] ? check_preemption_disabled+0x48/0x280 [ 1217.066312] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1217.071239] ? kasan_check_read+0x11/0x20 [ 1217.075423] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1217.080701] ? rcu_softirq_qs+0x20/0x20 [ 1217.084699] ? ksys_dup3+0x680/0x680 [ 1217.088409] ? find_held_lock+0x36/0x1c0 [ 1217.092479] ? kasan_check_write+0x14/0x20 [ 1217.096713] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1217.101649] ? wait_for_completion+0x8a0/0x8a0 [ 1217.106236] ? __lock_is_held+0xb5/0x140 [ 1217.110311] ? __fget_light+0x2e9/0x430 [ 1217.114316] kvm_vcpu_compat_ioctl+0x210/0x4a0 [ 1217.118923] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1217.123249] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1217.128833] ? fput+0x130/0x1a0 [ 1217.132116] ? do_fast_syscall_32+0x150/0xfb2 [ 1217.136619] ? do_fast_syscall_32+0x150/0xfb2 [ 1217.141118] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1217.145716] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1217.150046] __ia32_compat_sys_ioctl+0x20e/0x630 [ 1217.154818] do_fast_syscall_32+0x34d/0xfb2 [ 1217.159202] ? do_int80_syscall_32+0x890/0x890 [ 1217.163793] ? entry_SYSENTER_compat+0x68/0x7f [ 1217.168388] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1217.173425] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1217.178269] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1217.183135] ? trace_hardirqs_on_caller+0x310/0x310 [ 1217.188174] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1217.193193] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1217.198219] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1217.203089] entry_SYSENTER_compat+0x70/0x7f [ 1217.207497] RIP: 0023:0xf7ff6a29 [ 1217.210866] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1217.229779] RSP: 002b:00000000f5ff20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 14:47:55 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x2000000}}}, 0x90) 14:47:55 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7100000000000000]}, 0x48) [ 1217.237486] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000000ae80 [ 1217.244755] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1217.252021] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1217.259287] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1217.266562] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:47:56 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:47:56 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000]}, 0x48) 14:47:56 executing program 5 (fault-call:6 fault-nth:11): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:56 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x2ded}}}, 0x90) 14:47:56 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x4000000000000]}, 0x2c) [ 1217.514592] FAULT_INJECTION: forcing a failure. [ 1217.514592] name failslab, interval 1, probability 0, space 0, times 0 [ 1217.533700] CPU: 0 PID: 12831 Comm: syz-executor5 Not tainted 4.20.0-rc3+ #251 [ 1217.541141] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1217.550499] Call Trace: [ 1217.553133] dump_stack+0x244/0x39d [ 1217.556778] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1217.561979] ? __kernel_text_address+0xd/0x40 [ 1217.566515] ? unwind_get_return_address+0x61/0xa0 [ 1217.571471] should_fail.cold.4+0xa/0x17 [ 1217.575543] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1217.576239] IPVS: ftp: loaded support on port[0] = 21 [ 1217.580655] ? save_stack+0xa9/0xd0 [ 1217.580673] ? kasan_kmalloc+0xc7/0xe0 [ 1217.580687] ? kasan_slab_alloc+0x12/0x20 [ 1217.580700] ? kmem_cache_alloc+0x12e/0x730 [ 1217.580719] ? mmu_topup_memory_caches+0xfb/0x470 [ 1217.593408] ? kvm_mmu_load+0x21/0x1290 [ 1217.593420] ? kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1217.593435] ? zap_class+0x640/0x640 [ 1217.593450] ? do_fast_syscall_32+0x34d/0xfb2 [ 1217.593462] ? entry_SYSENTER_compat+0x70/0x7f [ 1217.593481] ? find_held_lock+0x36/0x1c0 [ 1217.601925] ? __lock_is_held+0xb5/0x140 [ 1217.601938] ? __irqentry_text_end+0xf6050/0x1f9658 [ 1217.601964] ? perf_trace_sched_process_exec+0x860/0x860 [ 1217.601986] __should_failslab+0x124/0x180 [ 1217.610794] should_failslab+0x9/0x14 [ 1217.610808] kmem_cache_alloc+0x2be/0x730 [ 1217.610831] ? lock_acquire+0x1ed/0x520 [ 1217.610845] ? kvm_arch_vcpu_ioctl_run+0x30f/0x72a0 [ 1217.610861] ? mmu_topup_memory_caches+0xfb/0x470 [ 1217.619731] mmu_topup_memory_caches+0xfb/0x470 [ 1217.619746] ? kvm_inject_realmode_interrupt+0x260/0x260 [ 1217.619782] kvm_mmu_load+0x21/0x1290 [ 1217.619803] kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1217.628902] ? kvm_vcpu_ioctl+0x1e5/0x1150 [ 1217.628932] ? __lock_acquire+0x62f/0x4c20 [ 1217.628956] ? kvm_arch_vcpu_runnable+0x710/0x710 [ 1217.628987] ? zap_class+0x640/0x640 [ 1217.637116] ? mark_held_locks+0x130/0x130 [ 1217.637129] ? print_usage_bug+0xc0/0xc0 [ 1217.637142] ? mark_held_locks+0xc7/0x130 [ 1217.637158] ? mem_cgroup_commit_charge+0x2c1/0xa50 [ 1217.637171] ? zap_class+0x640/0x640 [ 1217.637189] ? find_held_lock+0x36/0x1c0 [ 1217.637208] ? get_task_pid+0x1ea/0x3b0 [ 1217.647683] ? lock_downgrade+0x900/0x900 [ 1217.647715] ? check_preemption_disabled+0x48/0x280 [ 1217.647762] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1217.647776] ? kasan_check_read+0x11/0x20 [ 1217.647788] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 14:47:56 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff9f]}, 0x48) 14:47:56 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x48) [ 1217.647801] ? rcu_softirq_qs+0x20/0x20 [ 1217.647833] ? get_task_pid+0x211/0x3b0 [ 1217.647848] ? find_get_pid+0x270/0x270 [ 1217.647884] kvm_vcpu_ioctl+0x5c8/0x1150 [ 1217.655903] ? kvm_vcpu_ioctl+0x5c8/0x1150 [ 1217.655922] ? kvm_uevent_notify_change.part.32+0x450/0x450 [ 1217.655937] ? lock_downgrade+0x900/0x900 [ 1217.655951] ? check_preemption_disabled+0x48/0x280 [ 1217.655968] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1217.655981] ? kasan_check_read+0x11/0x20 [ 1217.655994] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1217.656008] ? rcu_softirq_qs+0x20/0x20 [ 1217.664169] ? ksys_dup3+0x680/0x680 [ 1217.664183] ? find_held_lock+0x36/0x1c0 [ 1217.664202] ? kasan_check_write+0x14/0x20 [ 1217.664220] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1217.674061] ? wait_for_completion+0x8a0/0x8a0 [ 1217.674080] ? __lock_is_held+0xb5/0x140 [ 1217.674106] ? __fget_light+0x2e9/0x430 [ 1217.674125] kvm_vcpu_compat_ioctl+0x210/0x4a0 [ 1217.684218] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1217.684234] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1217.684266] ? fput+0x130/0x1a0 [ 1217.684294] ? do_fast_syscall_32+0x150/0xfb2 [ 1217.684311] ? do_fast_syscall_32+0x150/0xfb2 [ 1217.693044] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1217.693080] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1217.693100] __ia32_compat_sys_ioctl+0x20e/0x630 [ 1217.693122] do_fast_syscall_32+0x34d/0xfb2 [ 1217.701569] ? do_int80_syscall_32+0x890/0x890 [ 1217.701584] ? entry_SYSENTER_compat+0x68/0x7f [ 1217.701598] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1217.701611] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1217.701623] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1217.701639] ? trace_hardirqs_on_caller+0x310/0x310 [ 1217.710164] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1217.710197] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1217.710219] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1217.710255] entry_SYSENTER_compat+0x70/0x7f [ 1217.710271] RIP: 0023:0xf7ff6a29 [ 1217.718538] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1217.718546] RSP: 002b:00000000f5ff20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 1217.718559] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000000ae80 [ 1217.718567] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1217.718576] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1217.718584] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1217.718591] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:47:56 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x44]}, 0x48) 14:47:56 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1}}, 0x10) 14:47:56 executing program 5 (fault-call:6 fault-nth:12): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:47:56 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0xfec0}}}, 0x90) 14:47:56 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}, 0x48) [ 1218.180001] device bridge_slave_1 left promiscuous mode [ 1218.201806] bridge0: port 2(bridge_slave_1) entered disabled state [ 1218.237973] FAULT_INJECTION: forcing a failure. [ 1218.237973] name failslab, interval 1, probability 0, space 0, times 0 [ 1218.273808] device bridge_slave_0 left promiscuous mode [ 1218.280800] bridge0: port 1(bridge_slave_0) entered disabled state [ 1218.294222] CPU: 1 PID: 12864 Comm: syz-executor5 Not tainted 4.20.0-rc3+ #251 [ 1218.301602] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1218.310956] Call Trace: [ 1218.313580] dump_stack+0x244/0x39d [ 1218.317228] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1218.322441] ? __kernel_text_address+0xd/0x40 [ 1218.326952] ? unwind_get_return_address+0x61/0xa0 [ 1218.331884] should_fail.cold.4+0xa/0x17 [ 1218.335951] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1218.341040] ? save_stack+0xa9/0xd0 [ 1218.344651] ? kasan_kmalloc+0xc7/0xe0 [ 1218.348550] ? kasan_slab_alloc+0x12/0x20 [ 1218.352703] ? kmem_cache_alloc+0x12e/0x730 [ 1218.357020] ? mmu_topup_memory_caches+0xfb/0x470 [ 1218.361854] ? kvm_mmu_load+0x21/0x1290 [ 1218.365842] ? kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1218.370930] ? zap_class+0x640/0x640 [ 1218.374627] ? do_fast_syscall_32+0x34d/0xfb2 [ 1218.379138] ? entry_SYSENTER_compat+0x70/0x7f [ 1218.383745] ? find_held_lock+0x36/0x1c0 [ 1218.387792] ? __lock_is_held+0xb5/0x140 [ 1218.391863] ? perf_trace_sched_process_exec+0x860/0x860 [ 1218.397316] __should_failslab+0x124/0x180 [ 1218.401536] should_failslab+0x9/0x14 [ 1218.405327] kmem_cache_alloc+0x2be/0x730 [ 1218.409594] ? lock_acquire+0x1ed/0x520 [ 1218.413554] ? kvm_arch_vcpu_ioctl_run+0x30f/0x72a0 [ 1218.418568] ? mmu_topup_memory_caches+0xfb/0x470 [ 1218.423469] mmu_topup_memory_caches+0xfb/0x470 [ 1218.428126] ? kvm_inject_realmode_interrupt+0x260/0x260 [ 1218.433564] kvm_mmu_load+0x21/0x1290 [ 1218.437354] kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1218.442281] ? kvm_vcpu_ioctl+0x1e5/0x1150 [ 1218.446510] ? __lock_acquire+0x62f/0x4c20 [ 1218.450745] ? kvm_arch_vcpu_runnable+0x710/0x710 [ 1218.455585] ? zap_class+0x640/0x640 [ 1218.459287] ? mark_held_locks+0x130/0x130 [ 1218.463502] ? print_usage_bug+0xc0/0xc0 [ 1218.467544] ? mark_held_locks+0xc7/0x130 [ 1218.471677] ? mem_cgroup_commit_charge+0x2c1/0xa50 [ 1218.476714] ? zap_class+0x640/0x640 [ 1218.480434] ? find_held_lock+0x36/0x1c0 [ 1218.484498] ? get_task_pid+0x1ea/0x3b0 [ 1218.488488] ? lock_downgrade+0x900/0x900 [ 1218.492648] ? check_preemption_disabled+0x48/0x280 [ 1218.497650] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1218.502561] ? kasan_check_read+0x11/0x20 [ 1218.506693] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1218.511982] ? rcu_softirq_qs+0x20/0x20 [ 1218.515961] ? get_task_pid+0x211/0x3b0 [ 1218.519925] ? find_get_pid+0x270/0x270 [ 1218.523893] kvm_vcpu_ioctl+0x5c8/0x1150 [ 1218.527956] ? kvm_vcpu_ioctl+0x5c8/0x1150 [ 1218.532195] ? kvm_uevent_notify_change.part.32+0x450/0x450 [ 1218.537961] ? lock_downgrade+0x900/0x900 [ 1218.542125] ? check_preemption_disabled+0x48/0x280 [ 1218.547124] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1218.552038] ? kasan_check_read+0x11/0x20 [ 1218.556170] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1218.561461] ? rcu_softirq_qs+0x20/0x20 [ 1218.565495] ? ksys_dup3+0x680/0x680 [ 1218.569212] ? find_held_lock+0x36/0x1c0 [ 1218.573290] ? kasan_check_write+0x14/0x20 [ 1218.577525] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1218.582443] ? wait_for_completion+0x8a0/0x8a0 [ 1218.587027] ? __lock_is_held+0xb5/0x140 [ 1218.591077] ? __fget_light+0x2e9/0x430 [ 1218.595038] kvm_vcpu_compat_ioctl+0x210/0x4a0 [ 1218.599622] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1218.603932] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1218.609467] ? fput+0x130/0x1a0 [ 1218.612734] ? do_fast_syscall_32+0x150/0xfb2 [ 1218.617220] ? do_fast_syscall_32+0x150/0xfb2 [ 1218.621707] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1218.626296] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1218.630606] __ia32_compat_sys_ioctl+0x20e/0x630 [ 1218.635351] do_fast_syscall_32+0x34d/0xfb2 [ 1218.639666] ? do_int80_syscall_32+0x890/0x890 [ 1218.644233] ? entry_SYSENTER_compat+0x68/0x7f [ 1218.648806] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1218.653850] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1218.658679] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1218.663550] ? trace_hardirqs_on_caller+0x310/0x310 [ 1218.668556] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1218.673590] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1218.678637] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1218.683465] entry_SYSENTER_compat+0x70/0x7f [ 1218.687866] RIP: 0023:0xf7ff6a29 [ 1218.691212] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1218.710092] RSP: 002b:00000000f5ff20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 1218.717797] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000000ae80 [ 1218.725052] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1218.732308] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1218.739566] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1218.746861] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1218.830072] team0 (unregistering): Port device team_slave_1 removed [ 1218.839583] team0 (unregistering): Port device team_slave_0 removed [ 1218.850441] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1218.918081] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1218.993852] bond0 (unregistering): Released all slaves [ 1219.531429] bridge0: port 1(bridge_slave_0) entered blocking state [ 1219.539085] bridge0: port 1(bridge_slave_0) entered disabled state [ 1219.547369] device bridge_slave_0 entered promiscuous mode [ 1219.593208] bridge0: port 2(bridge_slave_1) entered blocking state [ 1219.599814] bridge0: port 2(bridge_slave_1) entered disabled state [ 1219.607231] device bridge_slave_1 entered promiscuous mode [ 1219.651963] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1219.694322] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1219.818347] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1219.862785] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1220.077576] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1220.085167] team0: Port device team_slave_0 added [ 1220.124118] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1220.131509] team0: Port device team_slave_1 added [ 1220.172734] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1220.179976] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1220.195260] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1220.232016] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1220.238970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1220.246986] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1220.268737] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1220.275973] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1220.284036] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1220.327924] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1220.335204] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1220.350987] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1220.639980] bridge0: port 2(bridge_slave_1) entered blocking state [ 1220.646363] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1220.652929] bridge0: port 1(bridge_slave_0) entered blocking state [ 1220.659329] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1220.666665] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1221.114548] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1221.535704] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1221.620051] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1221.704914] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1221.711018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1221.718419] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1221.802550] 8021q: adding VLAN 0 to HW filter on device team0 14:48:01 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:48:01 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x1800]}, 0x2c) 14:48:01 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e6174000000000000000000000000000500", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:48:01 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}, 0x48) 14:48:01 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0xfc00}}}, 0x90) 14:48:01 executing program 5 (fault-call:6 fault-nth:13): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1222.346756] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1222.355794] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1222.392149] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1222.418060] FAULT_INJECTION: forcing a failure. [ 1222.418060] name failslab, interval 1, probability 0, space 0, times 0 14:48:01 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x48) [ 1222.438978] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1222.441277] CPU: 1 PID: 13137 Comm: syz-executor5 Not tainted 4.20.0-rc3+ #251 [ 1222.454786] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1222.464161] Call Trace: [ 1222.466751] dump_stack+0x244/0x39d [ 1222.470396] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1222.475594] ? debug_smp_processor_id+0x1c/0x20 [ 1222.480278] ? perf_trace_lock+0x14d/0x7a0 [ 1222.484556] should_fail.cold.4+0xa/0x17 [ 1222.488650] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1222.493759] ? save_stack+0xa9/0xd0 [ 1222.497389] ? kasan_kmalloc+0xc7/0xe0 [ 1222.501272] ? kasan_slab_alloc+0x12/0x20 [ 1222.505426] ? kmem_cache_alloc+0x12e/0x730 [ 1222.509746] ? mmu_topup_memory_caches+0xfb/0x470 [ 1222.514590] ? kvm_mmu_load+0x21/0x1290 [ 1222.518570] ? kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1222.523676] ? zap_class+0x640/0x640 [ 1222.527387] ? do_fast_syscall_32+0x34d/0xfb2 [ 1222.531905] ? find_held_lock+0x36/0x1c0 [ 1222.536067] ? __lock_is_held+0xb5/0x140 [ 1222.540645] ? perf_trace_sched_process_exec+0x860/0x860 [ 1222.546109] __should_failslab+0x124/0x180 [ 1222.550349] should_failslab+0x9/0x14 [ 1222.554150] kmem_cache_alloc+0x2be/0x730 [ 1222.558304] ? lock_acquire+0x1ed/0x520 [ 1222.562295] ? kvm_arch_vcpu_ioctl_run+0x30f/0x72a0 [ 1222.567316] ? mmu_topup_memory_caches+0xfb/0x470 [ 1222.572182] mmu_topup_memory_caches+0xfb/0x470 [ 1222.576865] ? kvm_inject_realmode_interrupt+0x260/0x260 [ 1222.582323] kvm_mmu_load+0x21/0x1290 [ 1222.586137] kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1222.591069] ? kvm_vcpu_ioctl+0x1e5/0x1150 [ 1222.595319] ? kvm_arch_vcpu_runnable+0x710/0x710 [ 1222.600164] ? zap_class+0x640/0x640 [ 1222.603880] ? mark_held_locks+0x130/0x130 [ 1222.608120] ? lock_is_held_type+0x210/0x210 [ 1222.612584] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1222.618160] ? check_preemption_disabled+0x48/0x280 [ 1222.623184] ? find_held_lock+0x36/0x1c0 [ 1222.627258] ? get_task_pid+0x1ea/0x3b0 [ 1222.631244] ? lock_downgrade+0x900/0x900 [ 1222.635396] ? check_preemption_disabled+0x48/0x280 [ 1222.640421] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1222.645359] ? kasan_check_read+0x11/0x20 [ 1222.649507] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1222.654786] ? rcu_softirq_qs+0x20/0x20 [ 1222.658774] ? get_task_pid+0x211/0x3b0 [ 1222.662754] ? find_get_pid+0x270/0x270 [ 1222.666743] kvm_vcpu_ioctl+0x5c8/0x1150 [ 1222.670823] ? kvm_vcpu_ioctl+0x5c8/0x1150 [ 1222.675090] ? kvm_uevent_notify_change.part.32+0x450/0x450 [ 1222.680802] ? lock_downgrade+0x900/0x900 [ 1222.685004] ? check_preemption_disabled+0x48/0x280 [ 1222.690024] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1222.694969] ? kasan_check_read+0x11/0x20 [ 1222.699134] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1222.704429] ? rcu_softirq_qs+0x20/0x20 [ 1222.708431] ? ksys_dup3+0x680/0x680 [ 1222.712147] ? find_held_lock+0x36/0x1c0 [ 1222.716220] ? kasan_check_write+0x14/0x20 [ 1222.720460] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1222.725399] ? wait_for_completion+0x8a0/0x8a0 [ 1222.730002] ? __fget_light+0x2e9/0x430 [ 1222.733985] kvm_vcpu_compat_ioctl+0x210/0x4a0 [ 1222.738571] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1222.742894] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1222.748445] ? fput+0x130/0x1a0 [ 1222.751721] ? do_fast_syscall_32+0x150/0xfb2 [ 1222.756215] ? do_fast_syscall_32+0x150/0xfb2 [ 1222.760737] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1222.765334] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1222.769654] __ia32_compat_sys_ioctl+0x20e/0x630 [ 1222.774414] do_fast_syscall_32+0x34d/0xfb2 [ 1222.778738] ? do_int80_syscall_32+0x890/0x890 [ 1222.783325] ? entry_SYSENTER_compat+0x68/0x7f [ 1222.787937] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1222.792967] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1222.797806] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1222.802654] ? trace_hardirqs_on_caller+0x310/0x310 [ 1222.807668] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1222.812681] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1222.817731] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1222.822616] entry_SYSENTER_compat+0x70/0x7f [ 1222.827020] RIP: 0023:0xf7ff6a29 [ 1222.830384] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1222.849308] RSP: 002b:00000000f5ff20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 1222.857061] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000000ae80 [ 1222.864340] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1222.871610] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1222.878875] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1222.886138] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:48:01 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0xed2d}}}, 0x90) 14:48:01 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e6174000000000000000000000000000500", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:48:01 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0xe]}, 0x2c) [ 1222.922367] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:48:01 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:48:01 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, 0x48) 14:48:01 executing program 5 (fault-call:6 fault-nth:14): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1223.022920] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:48:01 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x0, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1, 0x8}}, 0x10) [ 1223.100001] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:48:01 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0xfc}}}, 0x90) 14:48:01 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x5]}, 0x2c) [ 1223.151690] FAULT_INJECTION: forcing a failure. [ 1223.151690] name failslab, interval 1, probability 0, space 0, times 0 [ 1223.193160] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1223.214019] CPU: 0 PID: 13180 Comm: syz-executor5 Not tainted 4.20.0-rc3+ #251 [ 1223.221411] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1223.230790] Call Trace: [ 1223.233392] dump_stack+0x244/0x39d [ 1223.237046] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1223.242251] ? __kernel_text_address+0xd/0x40 [ 1223.246760] ? unwind_get_return_address+0x61/0xa0 [ 1223.251718] should_fail.cold.4+0xa/0x17 [ 1223.255794] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1223.260919] ? save_stack+0xa9/0xd0 [ 1223.264557] ? kasan_kmalloc+0xc7/0xe0 [ 1223.268455] ? kasan_slab_alloc+0x12/0x20 [ 1223.272610] ? kmem_cache_alloc+0x12e/0x730 [ 1223.276942] ? mmu_topup_memory_caches+0xfb/0x470 [ 1223.281794] ? kvm_mmu_load+0x21/0x1290 [ 1223.285785] ? kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1223.290906] ? zap_class+0x640/0x640 [ 1223.294627] ? do_fast_syscall_32+0x34d/0xfb2 [ 1223.299138] ? entry_SYSENTER_compat+0x70/0x7f [ 1223.303741] ? find_held_lock+0x36/0x1c0 [ 1223.307822] ? __lock_is_held+0xb5/0x140 [ 1223.311925] ? perf_trace_sched_process_exec+0x860/0x860 [ 1223.317399] __should_failslab+0x124/0x180 [ 1223.321647] should_failslab+0x9/0x14 [ 1223.325453] kmem_cache_alloc+0x2be/0x730 [ 1223.329611] ? lock_acquire+0x1ed/0x520 [ 1223.333594] ? kvm_arch_vcpu_ioctl_run+0x30f/0x72a0 [ 1223.338634] ? mmu_topup_memory_caches+0xfb/0x470 [ 1223.343490] mmu_topup_memory_caches+0xfb/0x470 [ 1223.348170] ? kvm_inject_realmode_interrupt+0x260/0x260 [ 1223.353640] kvm_mmu_load+0x21/0x1290 [ 1223.357463] kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1223.362406] ? kvm_vcpu_ioctl+0x1e5/0x1150 [ 1223.366651] ? __lock_acquire+0x62f/0x4c20 [ 1223.370913] ? kvm_arch_vcpu_runnable+0x710/0x710 [ 1223.375763] ? zap_class+0x640/0x640 [ 1223.379505] ? mark_held_locks+0x130/0x130 [ 1223.383749] ? print_usage_bug+0xc0/0xc0 [ 1223.387816] ? mark_held_locks+0xc7/0x130 [ 1223.391988] ? mem_cgroup_commit_charge+0x2c1/0xa50 [ 1223.397016] ? zap_class+0x640/0x640 [ 1223.400750] ? find_held_lock+0x36/0x1c0 [ 1223.404855] ? get_task_pid+0x1ea/0x3b0 [ 1223.409057] ? lock_downgrade+0x900/0x900 [ 1223.413252] ? check_preemption_disabled+0x48/0x280 [ 1223.418280] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1223.423232] ? kasan_check_read+0x11/0x20 [ 1223.427389] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1223.432671] ? rcu_softirq_qs+0x20/0x20 [ 1223.436666] ? get_task_pid+0x211/0x3b0 [ 1223.440642] ? find_get_pid+0x270/0x270 [ 1223.444634] kvm_vcpu_ioctl+0x5c8/0x1150 [ 1223.448701] ? kvm_vcpu_ioctl+0x5c8/0x1150 [ 1223.452947] ? kvm_uevent_notify_change.part.32+0x450/0x450 [ 1223.458678] ? lock_downgrade+0x900/0x900 [ 1223.462841] ? check_preemption_disabled+0x48/0x280 [ 1223.467868] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1223.472798] ? kasan_check_read+0x11/0x20 [ 1223.476963] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1223.482244] ? rcu_softirq_qs+0x20/0x20 [ 1223.486262] ? ksys_dup3+0x680/0x680 [ 1223.489978] ? find_held_lock+0x36/0x1c0 [ 1223.494047] ? kasan_check_write+0x14/0x20 [ 1223.498284] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1223.503241] ? wait_for_completion+0x8a0/0x8a0 [ 1223.507841] ? __lock_is_held+0xb5/0x140 [ 1223.511916] ? __fget_light+0x2e9/0x430 [ 1223.515905] kvm_vcpu_compat_ioctl+0x210/0x4a0 [ 1223.520498] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1223.524862] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1223.530402] ? fput+0x130/0x1a0 [ 1223.533685] ? do_fast_syscall_32+0x150/0xfb2 [ 1223.538186] ? do_fast_syscall_32+0x150/0xfb2 [ 1223.542692] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1223.547291] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1223.551620] __ia32_compat_sys_ioctl+0x20e/0x630 [ 1223.556428] do_fast_syscall_32+0x34d/0xfb2 [ 1223.560761] ? do_int80_syscall_32+0x890/0x890 [ 1223.565353] ? entry_SYSENTER_compat+0x68/0x7f [ 1223.569944] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1223.574974] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1223.579821] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1223.584681] ? trace_hardirqs_on_caller+0x310/0x310 [ 1223.589707] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1223.594733] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1223.599759] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1223.604614] entry_SYSENTER_compat+0x70/0x7f [ 1223.609021] RIP: 0023:0xf7ff6a29 [ 1223.612404] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1223.631302] RSP: 002b:00000000f5ff20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 14:48:02 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x63]}, 0x48) 14:48:02 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e6174000000000000000000000000000400", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1223.639013] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000000ae80 [ 1223.646281] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1223.653549] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1223.660814] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1223.668088] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:48:02 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x0, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1, 0x8}}, 0x10) 14:48:02 executing program 5 (fault-call:6 fault-nth:15): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:48:02 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, 0x48) 14:48:02 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x80fe}}}, 0x90) [ 1223.809713] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1223.840937] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:48:02 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e617400000000000000000000000300", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:48:02 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0xa000000]}, 0x2c) 14:48:02 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0xfc}}}, 0x90) 14:48:02 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6800]}, 0x48) [ 1223.979465] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1224.006952] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:48:02 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e6174000000000000000000000400", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1224.043143] FAULT_INJECTION: forcing a failure. [ 1224.043143] name failslab, interval 1, probability 0, space 0, times 0 [ 1224.073475] CPU: 1 PID: 13223 Comm: syz-executor5 Not tainted 4.20.0-rc3+ #251 [ 1224.080879] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1224.090241] Call Trace: [ 1224.092861] dump_stack+0x244/0x39d [ 1224.096515] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1224.101720] ? __kernel_text_address+0xd/0x40 [ 1224.106225] ? unwind_get_return_address+0x61/0xa0 [ 1224.111192] should_fail.cold.4+0xa/0x17 [ 1224.115270] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1224.120395] ? save_stack+0xa9/0xd0 [ 1224.123934] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1224.124033] ? kasan_kmalloc+0xc7/0xe0 [ 1224.124050] ? kasan_slab_alloc+0x12/0x20 14:48:02 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e617400000000000000000000000000000000000400", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1224.124065] ? kmem_cache_alloc+0x12e/0x730 [ 1224.124116] ? mmu_topup_memory_caches+0xfb/0x470 [ 1224.135469] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1224.136400] ? kvm_mmu_load+0x21/0x1290 [ 1224.136415] ? kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1224.136433] ? zap_class+0x640/0x640 [ 1224.136450] ? do_fast_syscall_32+0x34d/0xfb2 [ 1224.136470] ? entry_SYSENTER_compat+0x70/0x7f [ 1224.176969] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1224.179982] ? find_held_lock+0x36/0x1c0 14:48:02 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1224.180005] ? __lock_is_held+0xb5/0x140 [ 1224.180037] ? perf_trace_sched_process_exec+0x860/0x860 [ 1224.180063] __should_failslab+0x124/0x180 [ 1224.202021] should_failslab+0x9/0x14 [ 1224.202038] kmem_cache_alloc+0x2be/0x730 [ 1224.202056] ? lock_acquire+0x1ed/0x520 [ 1224.202070] ? kvm_arch_vcpu_ioctl_run+0x30f/0x72a0 [ 1224.202120] ? mmu_topup_memory_caches+0xfb/0x470 [ 1224.214290] mmu_topup_memory_caches+0xfb/0x470 [ 1224.214323] ? kvm_inject_realmode_interrupt+0x260/0x260 [ 1224.214345] kvm_mmu_load+0x21/0x1290 14:48:02 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e6174000000000000000000000600", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1224.214370] kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1224.236375] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1224.238315] ? kvm_vcpu_ioctl+0x1e5/0x1150 [ 1224.238335] ? __lock_acquire+0x62f/0x4c20 [ 1224.238363] ? kvm_arch_vcpu_runnable+0x710/0x710 [ 1224.238382] ? zap_class+0x640/0x640 [ 1224.245486] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1224.247107] ? mark_held_locks+0x130/0x130 [ 1224.247122] ? print_usage_bug+0xc0/0xc0 [ 1224.247151] ? mark_held_locks+0xc7/0x130 14:48:02 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e6174000000000000000000000000000100", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1224.247170] ? mem_cgroup_commit_charge+0x2c1/0xa50 [ 1224.247188] ? zap_class+0x640/0x640 [ 1224.273875] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1224.281008] ? find_held_lock+0x36/0x1c0 [ 1224.281034] ? get_task_pid+0x1ea/0x3b0 [ 1224.281052] ? lock_downgrade+0x900/0x900 [ 1224.281070] ? check_preemption_disabled+0x48/0x280 [ 1224.281088] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1224.289769] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1224.293611] ? kasan_check_read+0x11/0x20 [ 1224.293627] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1224.293641] ? rcu_softirq_qs+0x20/0x20 [ 1224.293682] ? get_task_pid+0x211/0x3b0 [ 1224.316720] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1224.318792] ? find_get_pid+0x270/0x270 [ 1224.318820] kvm_vcpu_ioctl+0x5c8/0x1150 [ 1224.318844] ? kvm_vcpu_ioctl+0x5c8/0x1150 [ 1224.318864] ? kvm_uevent_notify_change.part.32+0x450/0x450 [ 1224.326055] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1224.328009] ? lock_downgrade+0x900/0x900 [ 1224.328026] ? check_preemption_disabled+0x48/0x280 [ 1224.328042] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1224.328060] ? kasan_check_read+0x11/0x20 [ 1224.411591] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1224.416884] ? rcu_softirq_qs+0x20/0x20 [ 1224.420873] ? ksys_dup3+0x680/0x680 [ 1224.424571] ? find_held_lock+0x36/0x1c0 [ 1224.428626] ? kasan_check_write+0x14/0x20 [ 1224.432858] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1224.437777] ? wait_for_completion+0x8a0/0x8a0 [ 1224.442350] ? __lock_is_held+0xb5/0x140 [ 1224.446449] ? __fget_light+0x2e9/0x430 [ 1224.450428] kvm_vcpu_compat_ioctl+0x210/0x4a0 [ 1224.455046] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1224.459380] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1224.464920] ? fput+0x130/0x1a0 [ 1224.468245] ? do_fast_syscall_32+0x150/0xfb2 [ 1224.472746] ? do_fast_syscall_32+0x150/0xfb2 [ 1224.477234] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1224.481816] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1224.486157] __ia32_compat_sys_ioctl+0x20e/0x630 [ 1224.490933] do_fast_syscall_32+0x34d/0xfb2 [ 1224.495265] ? do_int80_syscall_32+0x890/0x890 [ 1224.499874] ? entry_SYSENTER_compat+0x68/0x7f [ 1224.504488] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1224.509507] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1224.514353] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1224.519198] ? trace_hardirqs_on_caller+0x310/0x310 [ 1224.524220] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1224.529226] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1224.534241] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1224.539090] entry_SYSENTER_compat+0x70/0x7f [ 1224.543500] RIP: 0023:0xf7ff6a29 [ 1224.546877] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1224.565949] RSP: 002b:00000000f5ff20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 1224.573671] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000000ae80 [ 1224.580947] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1224.588201] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1224.595473] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1224.602751] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:48:03 executing program 5 (fault-call:6 fault-nth:16): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:48:03 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e61740000000000000000000000000000000000ff00", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:48:03 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x48) 14:48:03 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0xc00]}, 0x2c) 14:48:03 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0xff000000}}}, 0x90) 14:48:03 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6800]}, 0x48) 14:48:03 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4c]}, 0x48) [ 1224.749894] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:48:03 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0xfc}}}, 0x90) 14:48:03 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1224.798116] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1224.825772] FAULT_INJECTION: forcing a failure. [ 1224.825772] name failslab, interval 1, probability 0, space 0, times 0 14:48:03 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0xfe800000}}}, 0x90) [ 1224.845281] CPU: 0 PID: 13282 Comm: syz-executor5 Not tainted 4.20.0-rc3+ #251 [ 1224.852661] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1224.862015] Call Trace: [ 1224.862043] dump_stack+0x244/0x39d [ 1224.862070] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1224.862117] ? __kernel_text_address+0xd/0x40 [ 1224.873542] ? unwind_get_return_address+0x61/0xa0 [ 1224.873569] should_fail.cold.4+0xa/0x17 [ 1224.873595] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1224.892193] ? save_stack+0xa9/0xd0 [ 1224.895844] ? kasan_kmalloc+0xc7/0xe0 [ 1224.899748] ? kasan_slab_alloc+0x12/0x20 [ 1224.903916] ? kmem_cache_alloc+0x12e/0x730 [ 1224.908262] ? mmu_topup_memory_caches+0xfb/0x470 [ 1224.913125] ? kvm_mmu_load+0x21/0x1290 [ 1224.917120] ? kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1224.922237] ? zap_class+0x640/0x640 [ 1224.922255] ? do_fast_syscall_32+0x34d/0xfb2 [ 1224.922271] ? entry_SYSENTER_compat+0x70/0x7f [ 1224.922297] ? find_held_lock+0x36/0x1c0 [ 1224.922318] ? __lock_is_held+0xb5/0x140 [ 1224.922348] ? perf_trace_sched_process_exec+0x860/0x860 14:48:03 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1224.934221] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1224.935171] __should_failslab+0x124/0x180 [ 1224.935193] should_failslab+0x9/0x14 [ 1224.935208] kmem_cache_alloc+0x2be/0x730 [ 1224.935225] ? mark_held_locks+0xc7/0x130 [ 1224.935257] ? mmu_topup_memory_caches+0xfb/0x470 [ 1224.935314] mmu_topup_memory_caches+0xfb/0x470 [ 1224.943438] ? kvm_inject_realmode_interrupt+0x260/0x260 [ 1224.943462] kvm_mmu_load+0x21/0x1290 [ 1224.943480] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 14:48:03 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x9cffffff00000000]}, 0x48) [ 1224.943499] ? check_preemption_disabled+0x48/0x280 [ 1224.943521] kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1224.953029] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1224.957427] ? kvm_arch_vcpu_runnable+0x710/0x710 [ 1224.957444] ? zap_class+0x640/0x640 [ 1224.957461] ? mark_held_locks+0x130/0x130 [ 1224.957491] ? print_usage_bug+0xc0/0xc0 [ 1224.957506] ? mark_held_locks+0xc7/0x130 [ 1224.957525] ? mem_cgroup_commit_charge+0x2c1/0xa50 [ 1224.957554] ? zap_class+0x640/0x640 [ 1224.957579] ? find_held_lock+0x36/0x1c0 [ 1224.957602] ? get_task_pid+0x1ea/0x3b0 [ 1224.957618] ? lock_downgrade+0x900/0x900 [ 1224.957634] ? check_preemption_disabled+0x48/0x280 [ 1224.957652] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1225.016516] ? kasan_check_read+0x11/0x20 [ 1225.016535] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1225.016551] ? rcu_softirq_qs+0x20/0x20 [ 1225.016580] ? get_task_pid+0x211/0x3b0 [ 1225.016610] ? find_get_pid+0x270/0x270 [ 1225.016652] kvm_vcpu_ioctl+0x5c8/0x1150 [ 1225.016668] ? kvm_vcpu_ioctl+0x5c8/0x1150 [ 1225.016689] ? kvm_uevent_notify_change.part.32+0x450/0x450 [ 1225.033532] ? lock_downgrade+0x900/0x900 [ 1225.086295] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1225.089851] ? check_preemption_disabled+0x48/0x280 [ 1225.089873] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1225.089889] ? kasan_check_read+0x11/0x20 [ 1225.089903] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1225.089924] ? rcu_softirq_qs+0x20/0x20 [ 1225.140464] ? ksys_dup3+0x680/0x680 [ 1225.144196] ? find_held_lock+0x36/0x1c0 [ 1225.148266] ? kasan_check_write+0x14/0x20 [ 1225.152520] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1225.157457] ? wait_for_completion+0x8a0/0x8a0 [ 1225.162043] ? __lock_is_held+0xb5/0x140 [ 1225.166136] ? __fget_light+0x2e9/0x430 [ 1225.170129] kvm_vcpu_compat_ioctl+0x210/0x4a0 [ 1225.174894] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1225.179222] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1225.184761] ? fput+0x130/0x1a0 [ 1225.188045] ? do_fast_syscall_32+0x150/0xfb2 [ 1225.192557] ? do_fast_syscall_32+0x150/0xfb2 [ 1225.197055] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1225.201670] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1225.205996] __ia32_compat_sys_ioctl+0x20e/0x630 [ 1225.210776] do_fast_syscall_32+0x34d/0xfb2 [ 1225.215130] ? do_int80_syscall_32+0x890/0x890 [ 1225.219720] ? entry_SYSENTER_compat+0x68/0x7f [ 1225.224306] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1225.229324] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1225.234169] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1225.239017] ? trace_hardirqs_on_caller+0x310/0x310 [ 1225.244054] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1225.249074] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1225.254099] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1225.258953] entry_SYSENTER_compat+0x70/0x7f [ 1225.263360] RIP: 0023:0xf7ff6a29 [ 1225.266734] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1225.285634] RSP: 002b:00000000f5ff20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 1225.293359] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000000ae80 [ 1225.300630] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1225.307910] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1225.315180] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1225.322450] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:48:04 executing program 5 (fault-call:6 fault-nth:17): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:48:04 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e617400000000000000000000000600", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:48:04 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x1400]}, 0x2c) 14:48:04 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0xfc}}}, 0x90) 14:48:04 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x3f000000}}}, 0x90) 14:48:04 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00000000000000]}, 0x48) [ 1225.484168] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:48:04 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:48:04 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6100000000000000]}, 0x48) [ 1225.525806] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:48:04 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0xfc000000}}}, 0x90) [ 1225.628012] FAULT_INJECTION: forcing a failure. [ 1225.628012] name failslab, interval 1, probability 0, space 0, times 0 [ 1225.633859] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1225.648767] CPU: 0 PID: 13341 Comm: syz-executor5 Not tainted 4.20.0-rc3+ #251 [ 1225.656183] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1225.665537] Call Trace: [ 1225.668152] dump_stack+0x244/0x39d [ 1225.671788] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1225.676987] ? __kernel_text_address+0xd/0x40 [ 1225.681488] ? unwind_get_return_address+0x61/0xa0 [ 1225.686444] should_fail.cold.4+0xa/0x17 [ 1225.690522] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1225.695626] ? save_stack+0xa9/0xd0 [ 1225.699256] ? kasan_kmalloc+0xc7/0xe0 [ 1225.703144] ? kasan_slab_alloc+0x12/0x20 [ 1225.707289] ? kmem_cache_alloc+0x12e/0x730 [ 1225.711612] ? mmu_topup_memory_caches+0xfb/0x470 [ 1225.716453] ? kvm_mmu_load+0x21/0x1290 [ 1225.720438] ? kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1225.725558] ? zap_class+0x640/0x640 [ 1225.729288] ? do_fast_syscall_32+0x34d/0xfb2 [ 1225.733801] ? entry_SYSENTER_compat+0x70/0x7f [ 1225.738411] ? find_held_lock+0x36/0x1c0 [ 1225.742473] ? __lock_is_held+0xb5/0x140 [ 1225.746544] ? perf_trace_sched_process_exec+0x860/0x860 [ 1225.752019] __should_failslab+0x124/0x180 [ 1225.756290] should_failslab+0x9/0x14 [ 1225.760110] kmem_cache_alloc+0x2be/0x730 [ 1225.764256] ? lock_acquire+0x1ed/0x520 [ 1225.768228] ? kvm_arch_vcpu_ioctl_run+0x30f/0x72a0 [ 1225.773260] ? mmu_topup_memory_caches+0xfb/0x470 [ 1225.778129] mmu_topup_memory_caches+0xfb/0x470 [ 1225.782798] ? kvm_inject_realmode_interrupt+0x260/0x260 [ 1225.788266] kvm_mmu_load+0x21/0x1290 [ 1225.792076] kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1225.797011] ? kvm_vcpu_ioctl+0x1e5/0x1150 [ 1225.801279] ? __lock_acquire+0x62f/0x4c20 [ 1225.805527] ? kvm_arch_vcpu_runnable+0x710/0x710 [ 1225.810383] ? zap_class+0x640/0x640 [ 1225.814113] ? mark_held_locks+0x130/0x130 [ 1225.818343] ? print_usage_bug+0xc0/0xc0 [ 1225.822399] ? mark_held_locks+0xc7/0x130 [ 1225.826568] ? mem_cgroup_commit_charge+0x2c1/0xa50 [ 1225.831586] ? zap_class+0x640/0x640 [ 1225.835320] ? find_held_lock+0x36/0x1c0 [ 1225.839392] ? get_task_pid+0x1ea/0x3b0 [ 1225.843373] ? lock_downgrade+0x900/0x900 [ 1225.847529] ? check_preemption_disabled+0x48/0x280 [ 1225.852550] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1225.857481] ? kasan_check_read+0x11/0x20 [ 1225.861644] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1225.866927] ? rcu_softirq_qs+0x20/0x20 [ 1225.870918] ? get_task_pid+0x211/0x3b0 [ 1225.874896] ? find_get_pid+0x270/0x270 [ 1225.878885] kvm_vcpu_ioctl+0x5c8/0x1150 [ 1225.882950] ? kvm_vcpu_ioctl+0x5c8/0x1150 [ 1225.887194] ? kvm_uevent_notify_change.part.32+0x450/0x450 [ 1225.892910] ? lock_downgrade+0x900/0x900 [ 1225.897058] ? check_preemption_disabled+0x48/0x280 [ 1225.902080] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1225.907021] ? kasan_check_read+0x11/0x20 [ 1225.911172] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1225.916451] ? rcu_softirq_qs+0x20/0x20 [ 1225.920449] ? ksys_dup3+0x680/0x680 [ 1225.924165] ? find_held_lock+0x36/0x1c0 [ 1225.928233] ? kasan_check_write+0x14/0x20 [ 1225.932475] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1225.937413] ? wait_for_completion+0x8a0/0x8a0 [ 1225.942003] ? __lock_is_held+0xb5/0x140 [ 1225.946076] ? __fget_light+0x2e9/0x430 [ 1225.950086] kvm_vcpu_compat_ioctl+0x210/0x4a0 [ 1225.954679] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1225.959003] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1225.964544] ? fput+0x130/0x1a0 [ 1225.967827] ? do_fast_syscall_32+0x150/0xfb2 [ 1225.972334] ? do_fast_syscall_32+0x150/0xfb2 [ 1225.976842] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1225.981437] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1225.985767] __ia32_compat_sys_ioctl+0x20e/0x630 [ 1225.990539] do_fast_syscall_32+0x34d/0xfb2 [ 1225.994875] ? do_int80_syscall_32+0x890/0x890 [ 1225.999461] ? entry_SYSENTER_compat+0x68/0x7f [ 1226.004051] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1226.009070] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1226.013922] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1226.018767] ? trace_hardirqs_on_caller+0x310/0x310 [ 1226.023791] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1226.028810] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1226.033849] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1226.038718] entry_SYSENTER_compat+0x70/0x7f [ 1226.043127] RIP: 0023:0xf7ff6a29 [ 1226.046497] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1226.065416] RSP: 002b:00000000f5ff20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 14:48:04 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x73000000]}, 0x48) [ 1226.073128] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000000ae80 [ 1226.080396] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1226.087661] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1226.094928] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1226.102233] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:48:04 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0x48) 14:48:04 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e617400000000000000000000000000000000000600", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:48:04 executing program 5 (fault-call:6 fault-nth:18): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:48:04 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x4000]}, 0x2c) 14:48:04 executing program 4 (fault-call:3 fault-nth:0): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1}}, 0x10) 14:48:04 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61]}, 0x48) [ 1226.232202] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:48:05 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:48:05 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0xff00}}}, 0x90) 14:48:05 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1}}, 0x10) 14:48:05 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x1000000000000000]}, 0x2c) [ 1226.388297] FAULT_INJECTION: forcing a failure. [ 1226.388297] name failslab, interval 1, probability 0, space 0, times 0 14:48:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3c]}, 0x48) [ 1226.437102] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1226.461876] CPU: 1 PID: 13372 Comm: syz-executor5 Not tainted 4.20.0-rc3+ #251 [ 1226.469268] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1226.478628] Call Trace: [ 1226.478656] dump_stack+0x244/0x39d [ 1226.478682] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1226.478702] ? __kernel_text_address+0xd/0x40 [ 1226.478725] ? unwind_get_return_address+0x61/0xa0 [ 1226.484940] should_fail.cold.4+0xa/0x17 [ 1226.484962] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1226.484982] ? save_stack+0xa9/0xd0 [ 1226.485001] ? kasan_kmalloc+0xc7/0xe0 [ 1226.517524] ? kasan_slab_alloc+0x12/0x20 [ 1226.521680] ? kmem_cache_alloc+0x12e/0x730 [ 1226.526015] ? mmu_topup_memory_caches+0xfb/0x470 [ 1226.530873] ? kvm_mmu_load+0x21/0x1290 [ 1226.534888] ? kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1226.540487] ? zap_class+0x640/0x640 [ 1226.544204] ? do_fast_syscall_32+0x34d/0xfb2 [ 1226.548707] ? entry_SYSENTER_compat+0x70/0x7f [ 1226.553298] ? find_held_lock+0x36/0x1c0 [ 1226.557367] ? __lock_is_held+0xb5/0x140 [ 1226.561449] ? perf_trace_sched_process_exec+0x860/0x860 [ 1226.566915] __should_failslab+0x124/0x180 [ 1226.571155] should_failslab+0x9/0x14 [ 1226.574955] kmem_cache_alloc+0x2be/0x730 [ 1226.579136] ? lock_acquire+0x1ed/0x520 [ 1226.583127] ? kvm_arch_vcpu_ioctl_run+0x30f/0x72a0 [ 1226.588143] ? mmu_topup_memory_caches+0xfb/0x470 [ 1226.593000] mmu_topup_memory_caches+0xfb/0x470 [ 1226.597695] ? kvm_inject_realmode_interrupt+0x260/0x260 [ 1226.603155] kvm_mmu_load+0x21/0x1290 [ 1226.606998] kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1226.611936] ? kvm_vcpu_ioctl+0x1e5/0x1150 [ 1226.616173] ? __lock_acquire+0x62f/0x4c20 [ 1226.620419] ? kvm_arch_vcpu_runnable+0x710/0x710 [ 1226.625276] ? zap_class+0x640/0x640 [ 1226.628995] ? mark_held_locks+0x130/0x130 [ 1226.633230] ? print_usage_bug+0xc0/0xc0 [ 1226.637294] ? mark_held_locks+0xc7/0x130 [ 1226.641444] ? mem_cgroup_commit_charge+0x2c1/0xa50 [ 1226.646475] ? zap_class+0x640/0x640 [ 1226.650197] ? find_held_lock+0x36/0x1c0 [ 1226.654282] ? get_task_pid+0x1ea/0x3b0 [ 1226.658259] ? lock_downgrade+0x900/0x900 [ 1226.662409] ? check_preemption_disabled+0x48/0x280 [ 1226.667450] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1226.672383] ? kasan_check_read+0x11/0x20 [ 1226.676533] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1226.681824] ? rcu_softirq_qs+0x20/0x20 [ 1226.685842] ? get_task_pid+0x211/0x3b0 [ 1226.689817] ? find_get_pid+0x270/0x270 [ 1226.693811] kvm_vcpu_ioctl+0x5c8/0x1150 [ 1226.697899] ? kvm_vcpu_ioctl+0x5c8/0x1150 [ 1226.702151] ? kvm_uevent_notify_change.part.32+0x450/0x450 [ 1226.707865] ? lock_downgrade+0x900/0x900 [ 1226.712012] ? check_preemption_disabled+0x48/0x280 [ 1226.717032] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1226.721962] ? kasan_check_read+0x11/0x20 [ 1226.726152] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1226.731432] ? rcu_softirq_qs+0x20/0x20 [ 1226.735433] ? ksys_dup3+0x680/0x680 [ 1226.739150] ? find_held_lock+0x36/0x1c0 [ 1226.743217] ? kasan_check_write+0x14/0x20 [ 1226.747454] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1226.752422] ? wait_for_completion+0x8a0/0x8a0 [ 1226.757015] ? __lock_is_held+0xb5/0x140 [ 1226.761086] ? __fget_light+0x2e9/0x430 [ 1226.765070] kvm_vcpu_compat_ioctl+0x210/0x4a0 [ 1226.769674] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1226.774013] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1226.779583] ? fput+0x130/0x1a0 [ 1226.782876] ? do_fast_syscall_32+0x150/0xfb2 [ 1226.787375] ? do_fast_syscall_32+0x150/0xfb2 [ 1226.791890] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1226.796487] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1226.800825] __ia32_compat_sys_ioctl+0x20e/0x630 [ 1226.805608] do_fast_syscall_32+0x34d/0xfb2 [ 1226.809938] ? do_int80_syscall_32+0x890/0x890 [ 1226.814521] ? entry_SYSENTER_compat+0x68/0x7f [ 1226.819102] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1226.824116] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1226.828957] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1226.833801] ? trace_hardirqs_on_caller+0x310/0x310 [ 1226.838827] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1226.843861] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1226.848884] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1226.853733] entry_SYSENTER_compat+0x70/0x7f [ 1226.858144] RIP: 0023:0xf7ff6a29 [ 1226.861544] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1226.880443] RSP: 002b:00000000f5ff20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 1226.888181] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000000ae80 [ 1226.895449] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1226.902712] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1226.909981] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1226.917265] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:48:05 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:48:05 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0xfe80}}}, 0x90) [ 1226.946303] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:48:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6100]}, 0x48) [ 1227.010281] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:48:05 executing program 5 (fault-call:6 fault-nth:19): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:48:05 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x1100000000000000]}, 0x2c) 14:48:05 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x182, 0x8, 0xfa00, {r1}}, 0x10) [ 1227.093570] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:48:05 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:48:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000]}, 0x48) 14:48:05 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0xfe80000000000000}}}, 0x90) 14:48:05 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x400000000000000]}, 0x2c) [ 1227.255188] FAULT_INJECTION: forcing a failure. [ 1227.255188] name failslab, interval 1, probability 0, space 0, times 0 [ 1227.288501] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:48:06 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x800, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000040)={0x0, 0x695}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000000c0)={r2, 0x2}, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r3}}, 0x10) 14:48:06 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x55381c00]}, 0x48) [ 1227.316653] CPU: 0 PID: 13425 Comm: syz-executor5 Not tainted 4.20.0-rc3+ #251 [ 1227.324084] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1227.327732] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1227.333457] Call Trace: [ 1227.333486] dump_stack+0x244/0x39d [ 1227.333512] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1227.333541] ? __kernel_text_address+0xd/0x40 [ 1227.357823] ? unwind_get_return_address+0x61/0xa0 [ 1227.362786] should_fail.cold.4+0xa/0x17 [ 1227.366872] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1227.371989] ? save_stack+0xa9/0xd0 [ 1227.375631] ? kasan_kmalloc+0xc7/0xe0 [ 1227.379529] ? kasan_slab_alloc+0x12/0x20 [ 1227.383689] ? kmem_cache_alloc+0x12e/0x730 [ 1227.388022] ? mmu_topup_memory_caches+0xfb/0x470 [ 1227.392881] ? kvm_mmu_load+0x21/0x1290 [ 1227.396867] ? kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1227.401976] ? zap_class+0x640/0x640 [ 1227.405728] ? do_fast_syscall_32+0x34d/0xfb2 [ 1227.410414] ? entry_SYSENTER_compat+0x70/0x7f [ 1227.415011] ? find_held_lock+0x36/0x1c0 [ 1227.419079] ? __lock_is_held+0xb5/0x140 [ 1227.423243] ? mlx4_cmd_post+0x2f8/0x7c0 [ 1227.427324] ? perf_trace_sched_process_exec+0x860/0x860 [ 1227.432787] __should_failslab+0x124/0x180 [ 1227.437033] should_failslab+0x9/0x14 [ 1227.440848] kmem_cache_alloc+0x2be/0x730 [ 1227.445000] ? lock_acquire+0x1ed/0x520 [ 1227.448974] ? kvm_arch_vcpu_ioctl_run+0x30f/0x72a0 [ 1227.453991] ? mmu_topup_memory_caches+0xfb/0x470 [ 1227.458845] mmu_topup_memory_caches+0xfb/0x470 [ 1227.463515] ? kvm_inject_realmode_interrupt+0x260/0x260 [ 1227.468978] kvm_mmu_load+0x21/0x1290 [ 1227.472791] kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1227.477753] ? kvm_vcpu_ioctl+0x1e5/0x1150 [ 1227.481996] ? __lock_acquire+0x62f/0x4c20 [ 1227.486242] ? kvm_arch_vcpu_runnable+0x710/0x710 [ 1227.491089] ? zap_class+0x640/0x640 [ 1227.494810] ? mark_held_locks+0x130/0x130 [ 1227.499054] ? print_usage_bug+0xc0/0xc0 [ 1227.503118] ? mark_held_locks+0xc7/0x130 [ 1227.507293] ? mem_cgroup_commit_charge+0x2c1/0xa50 [ 1227.512326] ? zap_class+0x640/0x640 [ 1227.516046] ? find_held_lock+0x36/0x1c0 [ 1227.520128] ? get_task_pid+0x1ea/0x3b0 [ 1227.524118] ? lock_downgrade+0x900/0x900 [ 1227.528269] ? check_preemption_disabled+0x48/0x280 [ 1227.533290] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1227.538222] ? kasan_check_read+0x11/0x20 [ 1227.542369] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1227.547648] ? rcu_softirq_qs+0x20/0x20 [ 1227.551630] ? get_task_pid+0x211/0x3b0 [ 1227.555606] ? find_get_pid+0x270/0x270 [ 1227.559618] kvm_vcpu_ioctl+0x5c8/0x1150 [ 1227.563683] ? kvm_vcpu_ioctl+0x5c8/0x1150 [ 1227.567925] ? kvm_uevent_notify_change.part.32+0x450/0x450 [ 1227.573638] ? lock_downgrade+0x900/0x900 [ 1227.577787] ? check_preemption_disabled+0x48/0x280 [ 1227.582891] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1227.587820] ? kasan_check_read+0x11/0x20 [ 1227.591975] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1227.597254] ? rcu_softirq_qs+0x20/0x20 [ 1227.601254] ? ksys_dup3+0x680/0x680 [ 1227.604970] ? find_held_lock+0x36/0x1c0 [ 1227.609054] ? kasan_check_write+0x14/0x20 [ 1227.613291] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1227.618226] ? wait_for_completion+0x8a0/0x8a0 [ 1227.622811] ? __lock_is_held+0xb5/0x140 [ 1227.626900] ? __fget_light+0x2e9/0x430 [ 1227.630885] kvm_vcpu_compat_ioctl+0x210/0x4a0 [ 1227.635476] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1227.639800] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1227.645348] ? fput+0x130/0x1a0 [ 1227.648648] ? do_fast_syscall_32+0x150/0xfb2 [ 1227.653161] ? do_fast_syscall_32+0x150/0xfb2 [ 1227.657657] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1227.662261] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1227.666581] __ia32_compat_sys_ioctl+0x20e/0x630 [ 1227.671344] do_fast_syscall_32+0x34d/0xfb2 [ 1227.675671] ? do_int80_syscall_32+0x890/0x890 [ 1227.680254] ? entry_SYSENTER_compat+0x68/0x7f [ 1227.684850] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1227.689875] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1227.694716] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1227.699563] ? trace_hardirqs_on_caller+0x310/0x310 [ 1227.704582] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1227.709605] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1227.714627] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1227.719582] entry_SYSENTER_compat+0x70/0x7f [ 1227.724003] RIP: 0023:0xf7ff6a29 [ 1227.727370] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1227.746272] RSP: 002b:00000000f5ff20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 1227.753976] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000000ae80 [ 1227.761257] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 14:48:06 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e61740000000000000000000000000000000000000100", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1227.768537] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1227.775802] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1227.783115] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:48:06 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0xd00000000000000]}, 0x2c) 14:48:06 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1}}, 0x10) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x3) 14:48:06 executing program 5 (fault-call:6 fault-nth:20): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:48:06 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x100000]}, 0x48) [ 1227.898961] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:48:06 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0xff00000000000000}}}, 0x90) 14:48:06 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1227.967707] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:48:06 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0xd000000]}, 0x2c) [ 1228.078461] FAULT_INJECTION: forcing a failure. [ 1228.078461] name failslab, interval 1, probability 0, space 0, times 0 [ 1228.100888] CPU: 1 PID: 13470 Comm: syz-executor5 Not tainted 4.20.0-rc3+ #251 [ 1228.108275] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1228.117633] Call Trace: [ 1228.117661] dump_stack+0x244/0x39d [ 1228.117687] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1228.117711] ? debug_smp_processor_id+0x1c/0x20 [ 1228.117731] ? perf_trace_lock+0x14d/0x7a0 [ 1228.117763] should_fail.cold.4+0xa/0x17 [ 1228.123981] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1228.124003] ? save_stack+0xa9/0xd0 [ 1228.124039] ? kasan_kmalloc+0xc7/0xe0 [ 1228.124055] ? kasan_slab_alloc+0x12/0x20 [ 1228.124069] ? kmem_cache_alloc+0x12e/0x730 [ 1228.124092] ? mmu_topup_memory_caches+0xfb/0x470 [ 1228.151401] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1228.154842] ? kvm_mmu_load+0x21/0x1290 [ 1228.154859] ? kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1228.154877] ? zap_class+0x640/0x640 [ 1228.154894] ? do_fast_syscall_32+0x34d/0xfb2 [ 1228.154919] ? find_held_lock+0x36/0x1c0 [ 1228.154943] ? __lock_is_held+0xb5/0x140 [ 1228.201974] ? perf_trace_sched_process_exec+0x860/0x860 [ 1228.203215] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1228.207451] __should_failslab+0x124/0x180 [ 1228.207472] should_failslab+0x9/0x14 [ 1228.207488] kmem_cache_alloc+0x2be/0x730 [ 1228.207506] ? lock_acquire+0x1ed/0x520 [ 1228.207521] ? kvm_arch_vcpu_ioctl_run+0x30f/0x72a0 [ 1228.207538] ? mmu_topup_memory_caches+0xfb/0x470 [ 1228.207559] mmu_topup_memory_caches+0xfb/0x470 [ 1228.246575] ? kvm_inject_realmode_interrupt+0x260/0x260 [ 1228.252062] kvm_mmu_load+0x21/0x1290 [ 1228.255887] kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1228.260830] ? kvm_vcpu_ioctl+0x1e5/0x1150 [ 1228.265114] ? kvm_arch_vcpu_runnable+0x710/0x710 [ 1228.269960] ? zap_class+0x640/0x640 [ 1228.273712] ? mark_held_locks+0x130/0x130 [ 1228.277952] ? lock_is_held_type+0x210/0x210 [ 1228.282355] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1228.287881] ? check_preemption_disabled+0x48/0x280 [ 1228.292899] ? find_held_lock+0x36/0x1c0 [ 1228.296971] ? get_task_pid+0x1ea/0x3b0 [ 1228.300953] ? lock_downgrade+0x900/0x900 [ 1228.305129] ? check_preemption_disabled+0x48/0x280 [ 1228.310145] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1228.315080] ? kasan_check_read+0x11/0x20 [ 1228.319225] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1228.324514] ? rcu_softirq_qs+0x20/0x20 [ 1228.328536] ? get_task_pid+0x211/0x3b0 [ 1228.332525] ? find_get_pid+0x270/0x270 [ 1228.336512] kvm_vcpu_ioctl+0x5c8/0x1150 [ 1228.340588] ? kvm_vcpu_ioctl+0x5c8/0x1150 [ 1228.344817] ? kvm_uevent_notify_change.part.32+0x450/0x450 [ 1228.350529] ? lock_downgrade+0x900/0x900 [ 1228.354695] ? check_preemption_disabled+0x48/0x280 [ 1228.359712] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1228.364640] ? kasan_check_read+0x11/0x20 [ 1228.368787] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1228.374072] ? rcu_softirq_qs+0x20/0x20 [ 1228.378078] ? ksys_dup3+0x680/0x680 [ 1228.381783] ? find_held_lock+0x36/0x1c0 [ 1228.385853] ? kasan_check_write+0x14/0x20 [ 1228.390102] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1228.395050] ? wait_for_completion+0x8a0/0x8a0 [ 1228.399652] ? __fget_light+0x2e9/0x430 [ 1228.403640] kvm_vcpu_compat_ioctl+0x210/0x4a0 [ 1228.408232] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1228.412557] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1228.418111] ? fput+0x130/0x1a0 [ 1228.421404] ? do_fast_syscall_32+0x150/0xfb2 [ 1228.425900] ? do_fast_syscall_32+0x150/0xfb2 [ 1228.430383] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1228.434956] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1228.439265] __ia32_compat_sys_ioctl+0x20e/0x630 [ 1228.444014] do_fast_syscall_32+0x34d/0xfb2 [ 1228.448325] ? do_int80_syscall_32+0x890/0x890 [ 1228.452897] ? entry_SYSENTER_compat+0x68/0x7f [ 1228.457479] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1228.462492] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1228.467318] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1228.472153] ? trace_hardirqs_on_caller+0x310/0x310 14:48:06 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$inet(0x2, 0x7, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000040)='?') perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) r3 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x0, 0x2) ioctl$TCSETA(r3, 0x5406, &(0x7f0000000100)={0x3, 0xfffffffffffffffb, 0x81, 0x8, 0x4000000000000000, 0x1, 0x80000000, 0xffff, 0xb2ae, 0x7}) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r2}}, 0x10) [ 1228.477165] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1228.482195] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1228.487213] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1228.492065] entry_SYSENTER_compat+0x70/0x7f [ 1228.496514] RIP: 0023:0xf7ff6a29 [ 1228.499912] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1228.518810] RSP: 002b:00000000f5ff20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 14:48:07 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1228.526537] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000000ae80 [ 1228.533823] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1228.541589] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1228.548868] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1228.556152] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:48:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}, 0x48) 14:48:07 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0xc0fe}}}, 0x90) 14:48:07 executing program 5 (fault-call:6 fault-nth:21): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1228.631592] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:48:07 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e617400000000000000000000000000000600", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1228.687185] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:48:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x44000000]}, 0x48) 14:48:07 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0xf]}, 0x2c) 14:48:07 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x2, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1000000000000, 0x48b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1}}, 0x10) syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x3, 0x2) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x60602, 0x0) ioctl$GIO_UNISCRNMAP(r2, 0x4b69, &(0x7f0000000040)=""/147) [ 1228.808674] FAULT_INJECTION: forcing a failure. [ 1228.808674] name failslab, interval 1, probability 0, space 0, times 0 [ 1228.833595] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1228.846975] CPU: 0 PID: 13514 Comm: syz-executor5 Not tainted 4.20.0-rc3+ #251 [ 1228.854366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1228.863726] Call Trace: [ 1228.866333] dump_stack+0x244/0x39d [ 1228.866362] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1228.866383] ? __kernel_text_address+0xd/0x40 [ 1228.866407] ? unwind_get_return_address+0x61/0xa0 [ 1228.884610] should_fail.cold.4+0xa/0x17 [ 1228.888688] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1228.893801] ? save_stack+0xa9/0xd0 [ 1228.897448] ? kasan_kmalloc+0xc7/0xe0 [ 1228.901341] ? kasan_slab_alloc+0x12/0x20 [ 1228.905511] ? kmem_cache_alloc+0x12e/0x730 [ 1228.909355] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1228.909871] ? mmu_topup_memory_caches+0xfb/0x470 [ 1228.923137] ? kvm_mmu_load+0x21/0x1290 [ 1228.927130] ? kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1228.932294] ? zap_class+0x640/0x640 [ 1228.936067] ? do_fast_syscall_32+0x34d/0xfb2 [ 1228.940582] ? entry_SYSENTER_compat+0x70/0x7f [ 1228.945199] ? find_held_lock+0x36/0x1c0 [ 1228.949272] ? __lock_is_held+0xb5/0x140 [ 1228.953362] ? perf_trace_sched_process_exec+0x860/0x860 [ 1228.958851] __should_failslab+0x124/0x180 [ 1228.963104] should_failslab+0x9/0x14 [ 1228.963144] kmem_cache_alloc+0x2be/0x730 [ 1228.963178] ? lock_acquire+0x1ed/0x520 [ 1228.975095] ? kvm_arch_vcpu_ioctl_run+0x30f/0x72a0 [ 1228.980159] ? mmu_topup_memory_caches+0xfb/0x470 [ 1228.985016] mmu_topup_memory_caches+0xfb/0x470 [ 1228.985034] ? kvm_inject_realmode_interrupt+0x260/0x260 [ 1228.985057] kvm_mmu_load+0x21/0x1290 [ 1228.985098] kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1228.985124] ? kvm_vcpu_ioctl+0x1e5/0x1150 14:48:07 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1}}, 0x10) r2 = syz_open_dev$adsp(&(0x7f00000002c0)='/dev/adsp#\x00', 0x3, 0x80) r3 = getpid() ptrace$poke(0x5, r3, &(0x7f0000000500), 0xff) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r2, 0xc0605345, &(0x7f0000000300)={0xfffffffffffffff9, 0x1, {0x3, 0x0, 0x100, 0x1, 0x67}}) mkdir(&(0x7f0000000040)='./file0\x00', 0x20) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f0000000440)={@in={0x2, 0x4e21, @rand_addr=0x8}, {&(0x7f0000000380)=""/128, 0x80}, &(0x7f0000000400), 0x8}, 0x9c) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000540)='/dev/loop-control\x00', 0x101000, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {r1, 0x7}}, 0x10) r4 = socket(0xd, 0x1, 0x3ff) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100), 0x0, 0x1009}}, 0x20) getsockopt$IPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x43, &(0x7f0000000080)={'icmp6\x00'}, &(0x7f00000000c0)=0x1e) [ 1228.985142] ? __lock_acquire+0x62f/0x4c20 [ 1229.012446] ? kvm_arch_vcpu_runnable+0x710/0x710 [ 1229.017319] ? zap_class+0x640/0x640 [ 1229.021042] ? mark_held_locks+0x130/0x130 [ 1229.025284] ? print_usage_bug+0xc0/0xc0 [ 1229.029354] ? mark_held_locks+0xc7/0x130 [ 1229.033511] ? mem_cgroup_commit_charge+0x2c1/0xa50 [ 1229.038570] ? zap_class+0x640/0x640 [ 1229.042293] ? find_held_lock+0x36/0x1c0 [ 1229.046365] ? get_task_pid+0x1ea/0x3b0 [ 1229.050347] ? lock_downgrade+0x900/0x900 [ 1229.054498] ? check_preemption_disabled+0x48/0x280 [ 1229.059522] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1229.064463] ? kasan_check_read+0x11/0x20 [ 1229.068624] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1229.073907] ? rcu_softirq_qs+0x20/0x20 [ 1229.077898] ? get_task_pid+0x211/0x3b0 [ 1229.081876] ? find_get_pid+0x270/0x270 [ 1229.085875] kvm_vcpu_ioctl+0x5c8/0x1150 [ 1229.089944] ? kvm_vcpu_ioctl+0x5c8/0x1150 [ 1229.094186] ? kvm_uevent_notify_change.part.32+0x450/0x450 [ 1229.099929] ? lock_downgrade+0x900/0x900 [ 1229.104083] ? check_preemption_disabled+0x48/0x280 [ 1229.109117] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1229.114050] ? kasan_check_read+0x11/0x20 [ 1229.118205] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1229.123486] ? rcu_softirq_qs+0x20/0x20 [ 1229.127484] ? ksys_dup3+0x680/0x680 [ 1229.131200] ? find_held_lock+0x36/0x1c0 [ 1229.135288] ? kasan_check_write+0x14/0x20 [ 1229.139543] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1229.144492] ? wait_for_completion+0x8a0/0x8a0 [ 1229.149078] ? __lock_is_held+0xb5/0x140 [ 1229.153150] ? __fget_light+0x2e9/0x430 [ 1229.157141] kvm_vcpu_compat_ioctl+0x210/0x4a0 [ 1229.161758] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1229.166082] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1229.171626] ? fput+0x130/0x1a0 [ 1229.174911] ? do_fast_syscall_32+0x150/0xfb2 [ 1229.179410] ? do_fast_syscall_32+0x150/0xfb2 [ 1229.183907] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1229.188501] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1229.192830] __ia32_compat_sys_ioctl+0x20e/0x630 [ 1229.197607] do_fast_syscall_32+0x34d/0xfb2 [ 1229.201937] ? do_int80_syscall_32+0x890/0x890 [ 1229.206541] ? entry_SYSENTER_compat+0x68/0x7f [ 1229.211134] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1229.216173] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1229.221020] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1229.225877] ? trace_hardirqs_on_caller+0x310/0x310 [ 1229.230897] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1229.235917] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1229.240941] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1229.245810] entry_SYSENTER_compat+0x70/0x7f [ 1229.250239] RIP: 0023:0xf7ff6a29 [ 1229.253609] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1229.272552] RSP: 002b:00000000f5ff20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 1229.280265] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000000ae80 [ 1229.287534] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1229.294800] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1229.302074] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 14:48:08 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x2}}}, 0x90) 14:48:08 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e617400000000000000000000000000000200", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1229.309359] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:48:08 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x2ded000000000000}}}, 0x90) [ 1229.383258] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:48:08 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0xa]}, 0x2c) 14:48:08 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e617400000000000000000000000000000400", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:48:08 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x48) [ 1229.442560] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1229.516204] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:48:08 executing program 5 (fault-call:6 fault-nth:22): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:48:08 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x10000, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40046602, &(0x7f00000000c0)=0x1f) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000040)={0x2b, @empty, 0x4e20, 0x4, 'sed\x00', 0x20, 0x80000001, 0x51}, 0x2c) ioctl$RTC_PLL_GET(r2, 0x801c7011, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1}}, 0x10) 14:48:08 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0xe000000]}, 0x2c) 14:48:08 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e61740000000000000000000000000500", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:48:08 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}, 0x48) 14:48:08 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0xfc00000000000000}}}, 0x90) [ 1229.713176] FAULT_INJECTION: forcing a failure. [ 1229.713176] name failslab, interval 1, probability 0, space 0, times 0 [ 1229.716305] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1229.748429] CPU: 0 PID: 13590 Comm: syz-executor5 Not tainted 4.20.0-rc3+ #251 14:48:08 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:48:08 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8000, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x6ad409fb, 0x40e002) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)={0xd0, r3, 0x300, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}]}, @IPVS_CMD_ATTR_SERVICE={0x48, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x3}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1, 0x4}}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x4}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x50, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x4}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x93db}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xfffffffffffff9b1}]}]}, 0xd0}}, 0x40804) getpid() write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r4}}, 0x10) ioctl$VIDIOC_S_JPEGCOMP(r2, 0x408c563e, &(0x7f0000000380)={0xfffffffffffffffd, 0x4, 0x31, "dbc26a1396dd898cadba7f1f73de17461315e8a48fdcb1f123713161996ccecc0239f02f2d71a4b2bbdf8812f347c3f2a46829785dab8c18ed85bedf", 0x26, "4bb5b944326b342b227ab2e634f929b6a4961d3837e563f549db040b520a56a79e12e55415fd4ef7f21227c0087db431103c10cfb4187509c626f4c0", 0xa0}) syslog(0x2, &(0x7f0000000080), 0x0) [ 1229.749025] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1229.755813] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1229.755822] Call Trace: [ 1229.755861] dump_stack+0x244/0x39d [ 1229.755895] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1229.755918] ? __kernel_text_address+0xd/0x40 [ 1229.755941] ? unwind_get_return_address+0x61/0xa0 [ 1229.773697] should_fail.cold.4+0xa/0x17 [ 1229.785087] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1229.785117] ? save_stack+0xa9/0xd0 [ 1229.785137] ? kasan_kmalloc+0xc7/0xe0 [ 1229.811220] ? kasan_slab_alloc+0x12/0x20 [ 1229.815390] ? kmem_cache_alloc+0x12e/0x730 [ 1229.819719] ? mmu_topup_memory_caches+0xfb/0x470 [ 1229.824569] ? kvm_mmu_load+0x21/0x1290 [ 1229.828567] ? kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1229.833704] ? zap_class+0x640/0x640 [ 1229.837420] ? do_fast_syscall_32+0x34d/0xfb2 [ 1229.841919] ? entry_SYSENTER_compat+0x70/0x7f [ 1229.846546] ? find_held_lock+0x36/0x1c0 [ 1229.850621] ? __lock_is_held+0xb5/0x140 [ 1229.854704] ? perf_trace_sched_process_exec+0x860/0x860 [ 1229.860187] __should_failslab+0x124/0x180 [ 1229.864443] should_failslab+0x9/0x14 [ 1229.868259] kmem_cache_alloc+0x2be/0x730 [ 1229.872411] ? lock_acquire+0x1ed/0x520 [ 1229.876393] ? kvm_arch_vcpu_ioctl_run+0x30f/0x72a0 [ 1229.881415] ? mmu_topup_memory_caches+0xfb/0x470 [ 1229.886265] mmu_topup_memory_caches+0xfb/0x470 [ 1229.890935] ? kvm_inject_realmode_interrupt+0x260/0x260 [ 1229.896408] kvm_mmu_load+0x21/0x1290 [ 1229.900220] kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1229.905156] ? kvm_vcpu_ioctl+0x1e5/0x1150 [ 1229.909390] ? __lock_acquire+0x62f/0x4c20 [ 1229.913654] ? kvm_arch_vcpu_runnable+0x710/0x710 [ 1229.918497] ? zap_class+0x640/0x640 [ 1229.922238] ? mark_held_locks+0x130/0x130 [ 1229.926480] ? print_usage_bug+0xc0/0xc0 [ 1229.930542] ? mark_held_locks+0xc7/0x130 [ 1229.934713] ? mem_cgroup_commit_charge+0x2c1/0xa50 [ 1229.939749] ? zap_class+0x640/0x640 [ 1229.943483] ? find_held_lock+0x36/0x1c0 [ 1229.947562] ? get_task_pid+0x1ea/0x3b0 [ 1229.951577] ? lock_downgrade+0x900/0x900 [ 1229.955734] ? check_preemption_disabled+0x48/0x280 [ 1229.960759] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1229.965692] ? kasan_check_read+0x11/0x20 [ 1229.969863] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1229.975145] ? rcu_softirq_qs+0x20/0x20 [ 1229.979204] ? get_task_pid+0x211/0x3b0 [ 1229.983184] ? find_get_pid+0x270/0x270 [ 1229.987194] kvm_vcpu_ioctl+0x5c8/0x1150 [ 1229.991257] ? kvm_vcpu_ioctl+0x5c8/0x1150 [ 1229.995517] ? kvm_uevent_notify_change.part.32+0x450/0x450 [ 1230.001232] ? lock_downgrade+0x900/0x900 [ 1230.005384] ? check_preemption_disabled+0x48/0x280 [ 1230.010406] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1230.015363] ? kasan_check_read+0x11/0x20 [ 1230.019519] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1230.024819] ? rcu_softirq_qs+0x20/0x20 [ 1230.028831] ? ksys_dup3+0x680/0x680 [ 1230.032569] ? find_held_lock+0x36/0x1c0 [ 1230.036660] ? kasan_check_write+0x14/0x20 [ 1230.040905] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1230.045851] ? wait_for_completion+0x8a0/0x8a0 [ 1230.050445] ? __lock_is_held+0xb5/0x140 [ 1230.054517] ? __fget_light+0x2e9/0x430 [ 1230.058503] kvm_vcpu_compat_ioctl+0x210/0x4a0 [ 1230.063091] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1230.067423] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1230.072976] ? fput+0x130/0x1a0 [ 1230.076259] ? do_fast_syscall_32+0x150/0xfb2 [ 1230.080761] ? do_fast_syscall_32+0x150/0xfb2 [ 1230.085261] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1230.089865] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1230.094191] __ia32_compat_sys_ioctl+0x20e/0x630 [ 1230.098962] do_fast_syscall_32+0x34d/0xfb2 [ 1230.103296] ? do_int80_syscall_32+0x890/0x890 [ 1230.107885] ? entry_SYSENTER_compat+0x68/0x7f [ 1230.112474] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1230.117493] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1230.122337] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1230.127184] ? trace_hardirqs_on_caller+0x310/0x310 [ 1230.132236] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1230.137263] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1230.142291] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1230.147153] entry_SYSENTER_compat+0x70/0x7f [ 1230.151586] RIP: 0023:0xf7ff6a29 [ 1230.154961] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1230.173866] RSP: 002b:00000000f5ff20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 1230.181579] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000000ae80 [ 1230.188872] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1230.196161] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1230.203428] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1230.210696] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:48:09 executing program 5 (fault-call:6 fault-nth:23): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:48:09 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1}}, 0x10) 14:48:09 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0xa00]}, 0x2c) 14:48:09 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}, 0x48) 14:48:09 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x3, 0x6a8041) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000080)={0x8, 0x2}) chdir(&(0x7f0000000000)='./file0\x00') ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f00000000c0)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x1000, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r2}}, 0x10) 14:48:09 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00]}, 0x48) 14:48:09 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x68]}, 0x48) 14:48:09 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x48) 14:48:09 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0xfec00000}}}, 0x90) 14:48:09 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}, 0x48) [ 1230.842680] FAULT_INJECTION: forcing a failure. [ 1230.842680] name failslab, interval 1, probability 0, space 0, times 0 [ 1230.855388] CPU: 1 PID: 13650 Comm: syz-executor5 Not tainted 4.20.0-rc3+ #251 [ 1230.862760] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1230.872115] Call Trace: [ 1230.874746] dump_stack+0x244/0x39d [ 1230.878393] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1230.883581] ? __kernel_text_address+0xd/0x40 [ 1230.888062] ? unwind_get_return_address+0x61/0xa0 [ 1230.892976] should_fail.cold.4+0xa/0x17 [ 1230.897020] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1230.902110] ? save_stack+0xa9/0xd0 [ 1230.905721] ? kasan_kmalloc+0xc7/0xe0 [ 1230.909622] ? kasan_slab_alloc+0x12/0x20 [ 1230.913767] ? kmem_cache_alloc+0x12e/0x730 [ 1230.918101] ? mmu_topup_memory_caches+0xfb/0x470 [ 1230.922941] ? kvm_mmu_load+0x21/0x1290 [ 1230.926895] ? kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1230.931983] ? zap_class+0x640/0x640 [ 1230.935700] ? do_fast_syscall_32+0x34d/0xfb2 [ 1230.940235] ? entry_SYSENTER_compat+0x70/0x7f [ 1230.944817] ? find_held_lock+0x36/0x1c0 [ 1230.948919] ? __lock_is_held+0xb5/0x140 [ 1230.952967] ? perf_trace_sched_process_exec+0x860/0x860 [ 1230.958403] __should_failslab+0x124/0x180 [ 1230.962624] should_failslab+0x9/0x14 [ 1230.966417] kmem_cache_alloc+0x2be/0x730 [ 1230.970573] ? lock_acquire+0x1ed/0x520 [ 1230.974532] ? kvm_arch_vcpu_ioctl_run+0x30f/0x72a0 [ 1230.979532] ? mmu_topup_memory_caches+0xfb/0x470 [ 1230.984365] mmu_topup_memory_caches+0xfb/0x470 [ 1230.989032] ? kvm_inject_realmode_interrupt+0x260/0x260 [ 1230.994470] kvm_mmu_load+0x21/0x1290 [ 1230.998257] kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1231.003173] ? kvm_vcpu_ioctl+0x1e5/0x1150 [ 1231.007391] ? __lock_acquire+0x62f/0x4c20 [ 1231.011615] ? kvm_arch_vcpu_runnable+0x710/0x710 [ 1231.016437] ? zap_class+0x640/0x640 [ 1231.020129] ? mark_held_locks+0x130/0x130 [ 1231.024356] ? print_usage_bug+0xc0/0xc0 [ 1231.028404] ? mark_held_locks+0xc7/0x130 [ 1231.032533] ? mem_cgroup_commit_charge+0x2c1/0xa50 [ 1231.037529] ? zap_class+0x640/0x640 [ 1231.041236] ? find_held_lock+0x36/0x1c0 [ 1231.045293] ? get_task_pid+0x1ea/0x3b0 [ 1231.049266] ? lock_downgrade+0x900/0x900 [ 1231.053404] ? check_preemption_disabled+0x48/0x280 [ 1231.058403] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1231.063311] ? kasan_check_read+0x11/0x20 [ 1231.067440] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1231.072700] ? rcu_softirq_qs+0x20/0x20 [ 1231.076678] ? get_task_pid+0x211/0x3b0 [ 1231.080635] ? find_get_pid+0x270/0x270 [ 1231.084595] kvm_vcpu_ioctl+0x5c8/0x1150 [ 1231.088651] ? kvm_vcpu_ioctl+0x5c8/0x1150 [ 1231.092876] ? kvm_uevent_notify_change.part.32+0x450/0x450 [ 1231.098568] ? lock_downgrade+0x900/0x900 [ 1231.102698] ? check_preemption_disabled+0x48/0x280 [ 1231.107709] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1231.112621] ? kasan_check_read+0x11/0x20 [ 1231.116749] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1231.122003] ? rcu_softirq_qs+0x20/0x20 [ 1231.125986] ? ksys_dup3+0x680/0x680 [ 1231.129700] ? find_held_lock+0x36/0x1c0 [ 1231.133758] ? kasan_check_write+0x14/0x20 [ 1231.137990] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1231.142902] ? wait_for_completion+0x8a0/0x8a0 [ 1231.147486] ? __lock_is_held+0xb5/0x140 [ 1231.151533] ? __fget_light+0x2e9/0x430 [ 1231.155496] kvm_vcpu_compat_ioctl+0x210/0x4a0 [ 1231.160076] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1231.164396] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1231.169937] ? fput+0x130/0x1a0 [ 1231.173200] ? do_fast_syscall_32+0x150/0xfb2 [ 1231.177679] ? do_fast_syscall_32+0x150/0xfb2 [ 1231.182212] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1231.186786] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1231.191093] __ia32_compat_sys_ioctl+0x20e/0x630 [ 1231.195845] do_fast_syscall_32+0x34d/0xfb2 [ 1231.200168] ? do_int80_syscall_32+0x890/0x890 [ 1231.204757] ? entry_SYSENTER_compat+0x68/0x7f [ 1231.209339] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1231.214382] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1231.219218] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1231.224073] ? trace_hardirqs_on_caller+0x310/0x310 [ 1231.229074] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1231.234123] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1231.239129] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1231.243961] entry_SYSENTER_compat+0x70/0x7f [ 1231.248352] RIP: 0023:0xf7ff6a29 [ 1231.251737] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1231.270640] RSP: 002b:00000000f5ff20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 1231.278333] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000000ae80 [ 1231.285584] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1231.292834] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1231.300101] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1231.307362] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:48:10 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e61740000000000000000000000000000000000000500", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:48:10 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)=0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x20000000000001f, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20880}, r1, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r2}}, 0x10) 14:48:10 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x18]}, 0x2c) 14:48:10 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x2ded0000}}}, 0x90) 14:48:10 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff9c]}, 0x48) 14:48:10 executing program 5 (fault-call:6 fault-nth:24): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:48:10 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6300000000000000]}, 0x48) [ 1231.524004] FAULT_INJECTION: forcing a failure. [ 1231.524004] name failslab, interval 1, probability 0, space 0, times 0 [ 1231.538043] CPU: 1 PID: 13668 Comm: syz-executor5 Not tainted 4.20.0-rc3+ #251 [ 1231.545932] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1231.555318] Call Trace: [ 1231.557942] dump_stack+0x244/0x39d [ 1231.561590] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1231.566804] ? debug_smp_processor_id+0x1c/0x20 [ 1231.571494] ? perf_trace_lock+0x14d/0x7a0 [ 1231.575751] should_fail.cold.4+0xa/0x17 [ 1231.579993] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1231.585103] ? save_stack+0xa9/0xd0 [ 1231.588732] ? kasan_kmalloc+0xc7/0xe0 [ 1231.592624] ? kasan_slab_alloc+0x12/0x20 [ 1231.596770] ? kmem_cache_alloc+0x12e/0x730 [ 1231.601093] ? mmu_topup_memory_caches+0xfb/0x470 [ 1231.605975] ? kvm_mmu_load+0x21/0x1290 [ 1231.609959] ? kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1231.615075] ? zap_class+0x640/0x640 [ 1231.618800] ? do_fast_syscall_32+0x34d/0xfb2 [ 1231.623298] ? find_held_lock+0x36/0x1c0 [ 1231.627359] ? __lock_is_held+0xb5/0x140 [ 1231.631427] ? perf_trace_sched_process_exec+0x860/0x860 [ 1231.636882] __should_failslab+0x124/0x180 [ 1231.641129] should_failslab+0x9/0x14 [ 1231.644960] kmem_cache_alloc+0x2be/0x730 [ 1231.649116] ? lock_acquire+0x1ed/0x520 [ 1231.653109] ? kvm_arch_vcpu_ioctl_run+0x30f/0x72a0 [ 1231.658124] ? mmu_topup_memory_caches+0xfb/0x470 [ 1231.662977] mmu_topup_memory_caches+0xfb/0x470 [ 1231.667656] ? kvm_inject_realmode_interrupt+0x260/0x260 [ 1231.673111] kvm_mmu_load+0x21/0x1290 [ 1231.676964] kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1231.681886] ? kvm_vcpu_ioctl+0x1e5/0x1150 [ 1231.686144] ? kvm_arch_vcpu_runnable+0x710/0x710 [ 1231.690984] ? zap_class+0x640/0x640 [ 1231.694694] ? mark_held_locks+0x130/0x130 [ 1231.698922] ? lock_is_held_type+0x210/0x210 [ 1231.703386] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1231.708920] ? check_preemption_disabled+0x48/0x280 [ 1231.713964] ? find_held_lock+0x36/0x1c0 [ 1231.718030] ? get_task_pid+0x1ea/0x3b0 [ 1231.721998] ? lock_downgrade+0x900/0x900 [ 1231.726138] ? check_preemption_disabled+0x48/0x280 [ 1231.731153] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1231.736080] ? kasan_check_read+0x11/0x20 [ 1231.740257] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1231.745542] ? rcu_softirq_qs+0x20/0x20 [ 1231.749552] ? get_task_pid+0x211/0x3b0 [ 1231.753554] ? find_get_pid+0x270/0x270 [ 1231.757592] kvm_vcpu_ioctl+0x5c8/0x1150 [ 1231.761693] ? kvm_vcpu_ioctl+0x5c8/0x1150 [ 1231.765929] ? kvm_uevent_notify_change.part.32+0x450/0x450 [ 1231.771635] ? lock_downgrade+0x900/0x900 [ 1231.775806] ? check_preemption_disabled+0x48/0x280 [ 1231.780860] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1231.785787] ? kasan_check_read+0x11/0x20 [ 1231.789931] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1231.795214] ? rcu_softirq_qs+0x20/0x20 [ 1231.799215] ? ksys_dup3+0x680/0x680 [ 1231.802923] ? find_held_lock+0x36/0x1c0 [ 1231.806987] ? kasan_check_write+0x14/0x20 [ 1231.811217] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1231.816159] ? wait_for_completion+0x8a0/0x8a0 [ 1231.820747] ? __fget_light+0x2e9/0x430 [ 1231.824724] kvm_vcpu_compat_ioctl+0x210/0x4a0 [ 1231.829305] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1231.833626] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1231.839161] ? fput+0x130/0x1a0 [ 1231.842457] ? do_fast_syscall_32+0x150/0xfb2 [ 1231.846966] ? do_fast_syscall_32+0x150/0xfb2 [ 1231.851489] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1231.856087] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1231.860420] __ia32_compat_sys_ioctl+0x20e/0x630 [ 1231.865184] do_fast_syscall_32+0x34d/0xfb2 [ 1231.869506] ? do_int80_syscall_32+0x890/0x890 [ 1231.874084] ? entry_SYSENTER_compat+0x68/0x7f [ 1231.878678] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1231.883687] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1231.888522] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1231.893362] ? trace_hardirqs_on_caller+0x310/0x310 [ 1231.898373] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1231.903387] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1231.908400] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1231.913238] entry_SYSENTER_compat+0x70/0x7f [ 1231.917638] RIP: 0023:0xf7ff6a29 [ 1231.921015] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1231.939909] RSP: 002b:00000000f5ff20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 1231.947613] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000000ae80 [ 1231.954874] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1231.962134] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1231.969396] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1231.976662] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:48:10 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1}}, 0x10) 14:48:10 executing program 5 (fault-call:6 fault-nth:25): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:48:10 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x3f00}}}, 0x90) [ 1232.094905] IPVS: ftp: loaded support on port[0] = 21 14:48:10 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x9fffffff00000000]}, 0x48) 14:48:10 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x1300000000000000]}, 0x2c) 14:48:10 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8}, 0x10) [ 1232.239547] FAULT_INJECTION: forcing a failure. [ 1232.239547] name failslab, interval 1, probability 0, space 0, times 0 [ 1232.258615] CPU: 1 PID: 13696 Comm: syz-executor5 Not tainted 4.20.0-rc3+ #251 [ 1232.266000] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1232.266007] Call Trace: [ 1232.266030] dump_stack+0x244/0x39d [ 1232.266054] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1232.266072] ? __kernel_text_address+0xd/0x40 [ 1232.266089] ? unwind_get_return_address+0x61/0xa0 [ 1232.266114] should_fail.cold.4+0xa/0x17 [ 1232.266135] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1232.266155] ? save_stack+0xa9/0xd0 [ 1232.296298] ? kasan_kmalloc+0xc7/0xe0 [ 1232.296312] ? kasan_slab_alloc+0x12/0x20 [ 1232.296339] ? kmem_cache_alloc+0x12e/0x730 [ 1232.296355] ? mmu_topup_memory_caches+0xfb/0x470 [ 1232.296373] ? kvm_mmu_load+0x21/0x1290 [ 1232.305525] ? kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1232.305541] ? zap_class+0x640/0x640 [ 1232.305556] ? do_fast_syscall_32+0x34d/0xfb2 [ 1232.305569] ? entry_SYSENTER_compat+0x70/0x7f [ 1232.305590] ? find_held_lock+0x36/0x1c0 [ 1232.305619] ? __lock_is_held+0xb5/0x140 [ 1232.313169] ? perf_trace_sched_process_exec+0x860/0x860 [ 1232.313209] __should_failslab+0x124/0x180 [ 1232.313227] should_failslab+0x9/0x14 [ 1232.313258] kmem_cache_alloc+0x2be/0x730 [ 1232.321697] ? lock_acquire+0x1ed/0x520 [ 1232.321714] ? mmu_topup_memory_caches+0xfb/0x470 [ 1232.321732] mmu_topup_memory_caches+0xfb/0x470 [ 1232.321746] ? kvm_inject_realmode_interrupt+0x260/0x260 [ 1232.321764] kvm_mmu_load+0x21/0x1290 [ 1232.330548] kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1232.330564] ? kvm_vcpu_ioctl+0x1e5/0x1150 [ 1232.330579] ? __lock_acquire+0x62f/0x4c20 [ 1232.330600] ? kvm_arch_vcpu_runnable+0x710/0x710 [ 1232.339456] ? zap_class+0x640/0x640 [ 1232.339471] ? mark_held_locks+0x130/0x130 [ 1232.339484] ? print_usage_bug+0xc0/0xc0 [ 1232.339511] ? mark_held_locks+0xc7/0x130 [ 1232.339528] ? mem_cgroup_commit_charge+0x2c1/0xa50 [ 1232.348571] ? zap_class+0x640/0x640 [ 1232.348589] ? find_held_lock+0x36/0x1c0 [ 1232.348617] ? get_task_pid+0x1ea/0x3b0 [ 1232.348633] ? lock_downgrade+0x900/0x900 [ 1232.348652] ? check_preemption_disabled+0x48/0x280 [ 1232.356736] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1232.356749] ? kasan_check_read+0x11/0x20 [ 1232.356762] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1232.356774] ? rcu_softirq_qs+0x20/0x20 [ 1232.356796] ? get_task_pid+0x211/0x3b0 [ 1232.356811] ? find_get_pid+0x270/0x270 [ 1232.366500] kvm_vcpu_ioctl+0x5c8/0x1150 [ 1232.366514] ? kvm_vcpu_ioctl+0x5c8/0x1150 [ 1232.366532] ? kvm_uevent_notify_change.part.32+0x450/0x450 [ 1232.366558] ? lock_downgrade+0x900/0x900 [ 1232.366571] ? check_preemption_disabled+0x48/0x280 [ 1232.366585] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1232.374499] ? kasan_check_read+0x11/0x20 [ 1232.374513] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1232.374526] ? rcu_softirq_qs+0x20/0x20 [ 1232.374558] ? ksys_dup3+0x680/0x680 [ 1232.374574] ? find_held_lock+0x36/0x1c0 [ 1232.383410] ? kasan_check_write+0x14/0x20 [ 1232.383441] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1232.383462] ? wait_for_completion+0x8a0/0x8a0 [ 1232.383484] ? __lock_is_held+0xb5/0x140 [ 1232.393685] ? __fget_light+0x2e9/0x430 [ 1232.393708] kvm_vcpu_compat_ioctl+0x210/0x4a0 [ 1232.393726] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1232.393746] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1232.402474] ? fput+0x130/0x1a0 [ 1232.402490] ? do_fast_syscall_32+0x150/0xfb2 [ 1232.402505] ? do_fast_syscall_32+0x150/0xfb2 [ 1232.402521] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1232.402542] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1232.411084] __ia32_compat_sys_ioctl+0x20e/0x630 [ 1232.411109] do_fast_syscall_32+0x34d/0xfb2 [ 1232.411128] ? do_int80_syscall_32+0x890/0x890 [ 1232.411145] ? entry_SYSENTER_compat+0x68/0x7f [ 1232.411165] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1232.419698] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1232.419712] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1232.419727] ? trace_hardirqs_on_caller+0x310/0x310 [ 1232.419742] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1232.419760] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1232.428027] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1232.428063] entry_SYSENTER_compat+0x70/0x7f [ 1232.428074] RIP: 0023:0xf7ff6a29 [ 1232.428088] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1232.428095] RSP: 002b:00000000f5ff20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 1232.437267] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000000ae80 [ 1232.437276] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1232.437284] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1232.437293] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1232.437302] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1232.995530] device bridge_slave_1 left promiscuous mode [ 1233.001073] bridge0: port 2(bridge_slave_1) entered disabled state [ 1233.065429] device bridge_slave_0 left promiscuous mode [ 1233.070861] bridge0: port 1(bridge_slave_0) entered disabled state [ 1233.145827] team0 (unregistering): Port device team_slave_1 removed [ 1233.156090] team0 (unregistering): Port device team_slave_0 removed [ 1233.166329] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1233.197986] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1233.292912] bond0 (unregistering): Released all slaves [ 1233.538440] bridge0: port 1(bridge_slave_0) entered blocking state [ 1233.544942] bridge0: port 1(bridge_slave_0) entered disabled state [ 1233.552251] device bridge_slave_0 entered promiscuous mode [ 1233.592783] bridge0: port 2(bridge_slave_1) entered blocking state [ 1233.600165] bridge0: port 2(bridge_slave_1) entered disabled state [ 1233.607655] device bridge_slave_1 entered promiscuous mode [ 1233.649480] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1233.690814] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1233.813301] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1233.858629] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1234.054008] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1234.061488] team0: Port device team_slave_0 added [ 1234.103226] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1234.110904] team0: Port device team_slave_1 added [ 1234.154725] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1234.203248] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1234.249475] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1234.296195] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1234.687102] bridge0: port 2(bridge_slave_1) entered blocking state [ 1234.693481] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1234.700176] bridge0: port 1(bridge_slave_0) entered blocking state [ 1234.706580] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1234.713942] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1235.434582] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1235.624027] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1235.709556] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1235.795257] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1235.801443] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1235.808882] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1235.899790] 8021q: adding VLAN 0 to HW filter on device team0 14:48:15 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x0, 0xfc00}}}, 0x90) 14:48:15 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e61740000000000000000000000000600", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:48:15 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x48) 14:48:15 executing program 5 (fault-call:6 fault-nth:26): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:48:15 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x4000000]}, 0x2c) 14:48:15 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0x100f}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, r1, 0xfff78d6f2cf722f8, 0x0, @in={0x2, 0x4e23}}}, 0xa0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x15, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r3}}, 0x10) [ 1236.438533] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1236.447640] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:48:15 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e6174000000000000000000000000000000000000ff00", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1236.511773] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1236.522087] FAULT_INJECTION: forcing a failure. [ 1236.522087] name failslab, interval 1, probability 0, space 0, times 0 [ 1236.546730] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1236.590403] CPU: 1 PID: 13973 Comm: syz-executor5 Not tainted 4.20.0-rc3+ #251 [ 1236.597812] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1236.597820] Call Trace: [ 1236.597854] dump_stack+0x244/0x39d [ 1236.597883] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1236.618626] ? debug_smp_processor_id+0x1c/0x20 [ 1236.623301] ? perf_trace_lock+0x14d/0x7a0 [ 1236.627550] should_fail.cold.4+0xa/0x17 [ 1236.631631] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1236.636745] ? save_stack+0xa9/0xd0 [ 1236.640412] ? kasan_kmalloc+0xc7/0xe0 [ 1236.644322] ? kasan_slab_alloc+0x12/0x20 [ 1236.648488] ? kmem_cache_alloc+0x12e/0x730 [ 1236.648504] ? mmu_topup_memory_caches+0xfb/0x470 [ 1236.648519] ? kvm_mmu_load+0x21/0x1290 [ 1236.648532] ? kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1236.648547] ? zap_class+0x640/0x640 [ 1236.648567] ? do_fast_syscall_32+0x34d/0xfb2 [ 1236.674953] ? find_held_lock+0x36/0x1c0 [ 1236.679078] ? __lock_is_held+0xb5/0x140 [ 1236.683155] ? bond_change_active_slave+0x2048/0x2540 [ 1236.688390] ? perf_trace_sched_process_exec+0x860/0x860 [ 1236.693861] __should_failslab+0x124/0x180 [ 1236.698115] should_failslab+0x9/0x14 [ 1236.701946] kmem_cache_alloc+0x2be/0x730 [ 1236.706094] ? lock_acquire+0x1ed/0x520 [ 1236.710084] ? kvm_arch_vcpu_ioctl_run+0x30f/0x72a0 [ 1236.715115] ? mmu_topup_memory_caches+0xfb/0x470 [ 1236.719963] mmu_topup_memory_caches+0xfb/0x470 [ 1236.724638] ? kvm_inject_realmode_interrupt+0x260/0x260 [ 1236.730113] kvm_mmu_load+0x21/0x1290 [ 1236.733926] kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1236.738865] ? kvm_vcpu_ioctl+0x1e5/0x1150 [ 1236.743117] ? __lock_acquire+0x62f/0x4c20 [ 1236.747368] ? kvm_arch_vcpu_runnable+0x710/0x710 [ 1236.752208] ? zap_class+0x640/0x640 [ 1236.755922] ? mark_held_locks+0x130/0x130 [ 1236.760155] ? print_usage_bug+0xc0/0xc0 [ 1236.764229] ? mark_held_locks+0xc7/0x130 [ 1236.768388] ? mem_cgroup_commit_charge+0x2c1/0xa50 [ 1236.773409] ? zap_class+0x640/0x640 [ 1236.777148] ? find_held_lock+0x36/0x1c0 [ 1236.781223] ? get_task_pid+0x1ea/0x3b0 [ 1236.785234] ? lock_downgrade+0x900/0x900 [ 1236.789400] ? check_preemption_disabled+0x48/0x280 [ 1236.794425] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1236.799373] ? kasan_check_read+0x11/0x20 [ 1236.803519] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1236.808797] ? rcu_softirq_qs+0x20/0x20 [ 1236.812782] ? get_task_pid+0x211/0x3b0 [ 1236.816758] ? find_get_pid+0x270/0x270 [ 1236.820744] kvm_vcpu_ioctl+0x5c8/0x1150 [ 1236.824810] ? kvm_vcpu_ioctl+0x5c8/0x1150 [ 1236.829059] ? kvm_uevent_notify_change.part.32+0x450/0x450 [ 1236.834769] ? lock_downgrade+0x900/0x900 [ 1236.838922] ? check_preemption_disabled+0x48/0x280 [ 1236.843944] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1236.848883] ? kasan_check_read+0x11/0x20 [ 1236.853034] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1236.858311] ? rcu_softirq_qs+0x20/0x20 [ 1236.862399] ? ksys_dup3+0x680/0x680 [ 1236.866111] ? find_held_lock+0x36/0x1c0 [ 1236.870182] ? kasan_check_write+0x14/0x20 [ 1236.874418] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1236.879352] ? wait_for_completion+0x8a0/0x8a0 [ 1236.883941] ? __lock_is_held+0xb5/0x140 [ 1236.888011] ? __fget_light+0x2e9/0x430 [ 1236.891996] kvm_vcpu_compat_ioctl+0x210/0x4a0 [ 1236.896587] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1236.900947] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1236.906495] ? fput+0x130/0x1a0 [ 1236.909782] ? do_fast_syscall_32+0x150/0xfb2 [ 1236.914292] ? do_fast_syscall_32+0x150/0xfb2 [ 1236.918787] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1236.923383] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1236.927707] __ia32_compat_sys_ioctl+0x20e/0x630 [ 1236.932503] do_fast_syscall_32+0x34d/0xfb2 [ 1236.936861] ? do_int80_syscall_32+0x890/0x890 [ 1236.941454] ? entry_SYSENTER_compat+0x68/0x7f [ 1236.946062] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1236.951083] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1236.955927] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1236.960772] ? trace_hardirqs_on_caller+0x310/0x310 [ 1236.965794] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1236.970838] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1236.975880] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1236.980728] entry_SYSENTER_compat+0x70/0x7f [ 1236.985133] RIP: 0023:0xf7ff6a29 [ 1236.988502] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1237.007414] RSP: 002b:00000000f5ff20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 1237.015116] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000000ae80 [ 1237.022380] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1237.029670] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 14:48:15 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7a000000]}, 0x48) 14:48:15 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x1500]}, 0x2c) 14:48:15 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x0, 0xff00}}}, 0x90) [ 1237.036935] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1237.044199] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1237.058311] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:48:15 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff85]}, 0x48) [ 1237.107591] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:48:15 executing program 5 (fault-call:6 fault-nth:27): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:48:15 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e617400000000000000000000000000000100", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:48:15 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1}}, 0x10) 14:48:15 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x1800000000000000]}, 0x2c) 14:48:16 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x0, 0xfc}}}, 0x90) [ 1237.277723] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1237.296767] FAULT_INJECTION: forcing a failure. [ 1237.296767] name failslab, interval 1, probability 0, space 0, times 0 14:48:16 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x48) 14:48:16 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r2}}, 0x10) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000000)=0xee, r2, 0x0, 0x0, 0x1}}, 0x20) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x102, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f0000000280)=""/217, &(0x7f00000000c0)=0xd9) ioctl$KDDELIO(r3, 0x4b35, 0x101) [ 1237.328153] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1237.346458] CPU: 0 PID: 14017 Comm: syz-executor5 Not tainted 4.20.0-rc3+ #251 [ 1237.353831] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1237.363195] Call Trace: [ 1237.365796] dump_stack+0x244/0x39d [ 1237.369471] ? dump_stack_print_info.cold.1+0x20/0x20 14:48:16 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e617400000000000000000000007fffffff00", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1237.374715] ? debug_smp_processor_id+0x1c/0x20 [ 1237.379392] ? perf_trace_lock+0x14d/0x7a0 [ 1237.383646] should_fail.cold.4+0xa/0x17 [ 1237.387722] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1237.392837] ? save_stack+0xa9/0xd0 [ 1237.396516] ? kasan_kmalloc+0xc7/0xe0 [ 1237.400418] ? kasan_slab_alloc+0x12/0x20 [ 1237.404603] ? kmem_cache_alloc+0x12e/0x730 [ 1237.409139] ? mmu_topup_memory_caches+0xfb/0x470 [ 1237.413990] ? kvm_mmu_load+0x21/0x1290 [ 1237.417991] ? kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1237.423094] ? zap_class+0x640/0x640 [ 1237.426813] ? do_fast_syscall_32+0x34d/0xfb2 [ 1237.431340] ? find_held_lock+0x36/0x1c0 [ 1237.435407] ? __lock_is_held+0xb5/0x140 [ 1237.439484] ? perf_trace_sched_process_exec+0x860/0x860 [ 1237.444945] __should_failslab+0x124/0x180 [ 1237.449241] should_failslab+0x9/0x14 [ 1237.453071] kmem_cache_alloc+0x2be/0x730 [ 1237.457216] ? lock_acquire+0x1ed/0x520 [ 1237.461238] ? mmu_topup_memory_caches+0xfb/0x470 [ 1237.466102] mmu_topup_memory_caches+0xfb/0x470 [ 1237.470805] ? kvm_inject_realmode_interrupt+0x260/0x260 [ 1237.476262] kvm_mmu_load+0x21/0x1290 [ 1237.480104] kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1237.485056] ? kvm_vcpu_ioctl+0x1e5/0x1150 [ 1237.489331] ? kvm_arch_vcpu_runnable+0x710/0x710 [ 1237.494184] ? zap_class+0x640/0x640 [ 1237.497900] ? mark_held_locks+0x130/0x130 [ 1237.502137] ? lock_is_held_type+0x210/0x210 [ 1237.506575] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1237.512140] ? check_preemption_disabled+0x48/0x280 [ 1237.517181] ? find_held_lock+0x36/0x1c0 [ 1237.521258] ? get_task_pid+0x1ea/0x3b0 [ 1237.525236] ? lock_downgrade+0x900/0x900 [ 1237.529386] ? check_preemption_disabled+0x48/0x280 [ 1237.534407] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1237.539340] ? kasan_check_read+0x11/0x20 [ 1237.543492] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1237.548791] ? rcu_softirq_qs+0x20/0x20 [ 1237.552781] ? get_task_pid+0x211/0x3b0 [ 1237.556755] ? find_get_pid+0x270/0x270 [ 1237.560809] kvm_vcpu_ioctl+0x5c8/0x1150 [ 1237.564885] ? kvm_vcpu_ioctl+0x5c8/0x1150 [ 1237.569130] ? kvm_uevent_notify_change.part.32+0x450/0x450 [ 1237.574853] ? lock_downgrade+0x900/0x900 [ 1237.579016] ? check_preemption_disabled+0x48/0x280 [ 1237.584041] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1237.588974] ? kasan_check_read+0x11/0x20 [ 1237.593146] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1237.598433] ? rcu_softirq_qs+0x20/0x20 [ 1237.602437] ? ksys_dup3+0x680/0x680 [ 1237.606211] ? find_held_lock+0x36/0x1c0 [ 1237.610294] ? kasan_check_write+0x14/0x20 [ 1237.614530] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1237.619462] ? wait_for_completion+0x8a0/0x8a0 [ 1237.624074] ? __fget_light+0x2e9/0x430 [ 1237.628103] kvm_vcpu_compat_ioctl+0x210/0x4a0 [ 1237.632696] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1237.637021] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1237.642560] ? fput+0x130/0x1a0 [ 1237.645878] ? do_fast_syscall_32+0x150/0xfb2 [ 1237.650370] ? do_fast_syscall_32+0x150/0xfb2 [ 1237.654871] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1237.659463] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1237.663783] __ia32_compat_sys_ioctl+0x20e/0x630 [ 1237.668549] do_fast_syscall_32+0x34d/0xfb2 [ 1237.672895] ? do_int80_syscall_32+0x890/0x890 [ 1237.677510] ? entry_SYSENTER_compat+0x68/0x7f [ 1237.682092] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1237.687118] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1237.691973] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1237.696814] ? trace_hardirqs_on_caller+0x310/0x310 [ 1237.701850] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1237.706884] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1237.711730] entry_SYSENTER_compat+0x70/0x7f [ 1237.716135] RIP: 0023:0xf7ff6a29 [ 1237.719496] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1237.738403] RSP: 002b:00000000f5ff20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 1237.746108] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000000ae80 [ 1237.753393] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1237.760689] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1237.767999] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1237.775264] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1237.801602] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:48:16 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0xc000000]}, 0x2c) 14:48:16 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1237.842808] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:48:16 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x20000000000001f, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1}}, 0x10) 14:48:16 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}, 0x48) 14:48:16 executing program 5 (fault-call:6 fault-nth:28): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:48:16 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x0, 0x500000000000000]}, 0x2c) 14:48:16 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:48:16 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x0, 0x80fe}}}, 0x90) [ 1237.985139] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:48:16 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000040)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1, r0}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1}}, 0x10) [ 1238.067409] FAULT_INJECTION: forcing a failure. [ 1238.067409] name failslab, interval 1, probability 0, space 0, times 0 [ 1238.117216] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1238.122992] CPU: 1 PID: 14072 Comm: syz-executor5 Not tainted 4.20.0-rc3+ #251 [ 1238.133001] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1238.142362] Call Trace: [ 1238.144963] dump_stack+0x244/0x39d [ 1238.148612] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1238.153822] ? __kernel_text_address+0xd/0x40 [ 1238.158330] ? unwind_get_return_address+0x61/0xa0 [ 1238.158354] should_fail.cold.4+0xa/0x17 [ 1238.158388] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1238.158414] ? save_stack+0xa9/0xd0 [ 1238.176118] ? kasan_kmalloc+0xc7/0xe0 [ 1238.180008] ? kasan_slab_alloc+0x12/0x20 [ 1238.184183] ? kmem_cache_alloc+0x12e/0x730 [ 1238.188507] ? mmu_topup_memory_caches+0xfb/0x470 [ 1238.193379] ? kvm_mmu_load+0x21/0x1290 [ 1238.197360] ? kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1238.202472] ? zap_class+0x640/0x640 [ 1238.206208] ? do_fast_syscall_32+0x34d/0xfb2 [ 1238.210754] ? entry_SYSENTER_compat+0x70/0x7f [ 1238.215366] ? find_held_lock+0x36/0x1c0 [ 1238.219456] ? __lock_is_held+0xb5/0x140 [ 1238.223561] ? perf_trace_sched_process_exec+0x860/0x860 [ 1238.229032] __should_failslab+0x124/0x180 [ 1238.233289] should_failslab+0x9/0x14 [ 1238.237125] kmem_cache_alloc+0x2be/0x730 [ 1238.241280] ? lock_acquire+0x1ed/0x520 [ 1238.245275] ? kvm_arch_vcpu_ioctl_run+0x30f/0x72a0 [ 1238.250296] ? mmu_topup_memory_caches+0xfb/0x470 [ 1238.255152] mmu_topup_memory_caches+0xfb/0x470 [ 1238.259835] ? kvm_inject_realmode_interrupt+0x260/0x260 [ 1238.265311] kvm_mmu_load+0x21/0x1290 [ 1238.269147] kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1238.274100] ? kvm_vcpu_ioctl+0x1e5/0x1150 [ 1238.278356] ? __lock_acquire+0x62f/0x4c20 [ 1238.282625] ? kvm_arch_vcpu_runnable+0x710/0x710 [ 1238.287476] ? zap_class+0x640/0x640 [ 1238.291221] ? mark_held_locks+0x130/0x130 [ 1238.295453] ? print_usage_bug+0xc0/0xc0 [ 1238.299512] ? mark_held_locks+0xc7/0x130 [ 1238.303662] ? mem_cgroup_commit_charge+0x2c1/0xa50 [ 1238.308677] ? zap_class+0x640/0x640 [ 1238.312396] ? find_held_lock+0x36/0x1c0 [ 1238.316480] ? get_task_pid+0x1ea/0x3b0 [ 1238.320454] ? lock_downgrade+0x900/0x900 [ 1238.324601] ? check_preemption_disabled+0x48/0x280 [ 1238.329630] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1238.334594] ? kasan_check_read+0x11/0x20 [ 1238.338744] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1238.344057] ? rcu_softirq_qs+0x20/0x20 [ 1238.348063] ? get_task_pid+0x211/0x3b0 [ 1238.352049] ? find_get_pid+0x270/0x270 [ 1238.356039] kvm_vcpu_ioctl+0x5c8/0x1150 [ 1238.360109] ? kvm_vcpu_ioctl+0x5c8/0x1150 [ 1238.364381] ? kvm_uevent_notify_change.part.32+0x450/0x450 [ 1238.370109] ? lock_downgrade+0x900/0x900 [ 1238.374272] ? check_preemption_disabled+0x48/0x280 [ 1238.379307] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1238.384269] ? kasan_check_read+0x11/0x20 [ 1238.388463] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1238.393770] ? rcu_softirq_qs+0x20/0x20 [ 1238.397773] ? ksys_dup3+0x680/0x680 [ 1238.401485] ? find_held_lock+0x36/0x1c0 [ 1238.405552] ? kasan_check_write+0x14/0x20 [ 1238.409937] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1238.414889] ? wait_for_completion+0x8a0/0x8a0 [ 1238.419479] ? __lock_is_held+0xb5/0x140 [ 1238.423564] ? __fget_light+0x2e9/0x430 [ 1238.427549] kvm_vcpu_compat_ioctl+0x210/0x4a0 [ 1238.432136] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1238.436457] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1238.441993] ? fput+0x130/0x1a0 [ 1238.445274] ? do_fast_syscall_32+0x150/0xfb2 [ 1238.449768] ? do_fast_syscall_32+0x150/0xfb2 [ 1238.454280] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1238.458895] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1238.463219] __ia32_compat_sys_ioctl+0x20e/0x630 [ 1238.467998] do_fast_syscall_32+0x34d/0xfb2 [ 1238.472324] ? do_int80_syscall_32+0x890/0x890 [ 1238.476930] ? entry_SYSENTER_compat+0x68/0x7f [ 1238.481548] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1238.486564] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1238.491403] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1238.496278] ? trace_hardirqs_on_caller+0x310/0x310 [ 1238.501326] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1238.506345] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1238.511370] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1238.516253] entry_SYSENTER_compat+0x70/0x7f [ 1238.520660] RIP: 0023:0xf7ff6a29 [ 1238.524022] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1238.543419] RSP: 002b:00000000f5ff20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 1238.551156] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000000ae80 [ 1238.558439] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 14:48:16 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e6174000000000000000000000000ff00", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:48:17 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x9fffffff]}, 0x48) [ 1238.565753] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1238.573018] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1238.580286] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:48:17 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x0, 0x3000000]}, 0x2c) 14:48:17 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x200, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r1, 0x80045300, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r2}}, 0x10) 14:48:17 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e617400000000000000000000000400", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:48:17 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}, 0x48) [ 1238.637081] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1238.660816] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:48:17 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x0, 0xfec0000000000000}}}, 0x90) 14:48:17 executing program 5 (fault-call:6 fault-nth:29): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:48:17 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x85ffffff]}, 0x48) [ 1238.800671] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:48:17 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:48:17 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1, 0x4}}, 0x10) [ 1238.860278] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:48:17 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x0, 0x3f000000}}}, 0x90) 14:48:17 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x0, 0x4]}, 0x2c) [ 1238.900686] FAULT_INJECTION: forcing a failure. [ 1238.900686] name failslab, interval 1, probability 0, space 0, times 0 [ 1238.964286] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1238.976857] CPU: 0 PID: 14134 Comm: syz-executor5 Not tainted 4.20.0-rc3+ #251 [ 1238.984242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1238.993607] Call Trace: [ 1238.996221] dump_stack+0x244/0x39d [ 1238.999876] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1239.005132] ? __kernel_text_address+0xd/0x40 [ 1239.009656] ? unwind_get_return_address+0x61/0xa0 [ 1239.014618] should_fail.cold.4+0xa/0x17 [ 1239.018701] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1239.023831] ? save_stack+0xa9/0xd0 [ 1239.027486] ? kasan_kmalloc+0xc7/0xe0 [ 1239.031372] ? kasan_slab_alloc+0x12/0x20 [ 1239.035546] ? kmem_cache_alloc+0x12e/0x730 [ 1239.039873] ? mmu_topup_memory_caches+0xfb/0x470 [ 1239.044712] ? kvm_mmu_load+0x21/0x1290 [ 1239.048685] ? kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1239.053792] ? zap_class+0x640/0x640 [ 1239.057512] ? do_fast_syscall_32+0x34d/0xfb2 [ 1239.062031] ? entry_SYSENTER_compat+0x70/0x7f [ 1239.066681] ? find_held_lock+0x36/0x1c0 [ 1239.070758] ? __lock_is_held+0xb5/0x140 [ 1239.074854] ? perf_trace_sched_process_exec+0x860/0x860 [ 1239.080330] __should_failslab+0x124/0x180 [ 1239.084577] should_failslab+0x9/0x14 [ 1239.088412] kmem_cache_alloc+0x2be/0x730 [ 1239.092563] ? lock_acquire+0x1ed/0x520 [ 1239.096543] ? mmu_topup_memory_caches+0xfb/0x470 [ 1239.101393] mmu_topup_memory_caches+0xfb/0x470 [ 1239.106068] ? kvm_inject_realmode_interrupt+0x260/0x260 [ 1239.111529] kvm_mmu_load+0x21/0x1290 [ 1239.115346] kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1239.120281] ? kvm_vcpu_ioctl+0x1e5/0x1150 [ 1239.124521] ? __lock_acquire+0x62f/0x4c20 [ 1239.128774] ? kvm_arch_vcpu_runnable+0x710/0x710 [ 1239.133617] ? zap_class+0x640/0x640 [ 1239.137332] ? mark_held_locks+0x130/0x130 [ 1239.141567] ? print_usage_bug+0xc0/0xc0 [ 1239.145649] ? mark_held_locks+0xc7/0x130 [ 1239.149803] ? mem_cgroup_commit_charge+0x2c1/0xa50 [ 1239.154825] ? zap_class+0x640/0x640 [ 1239.158554] ? find_held_lock+0x36/0x1c0 [ 1239.162625] ? get_task_pid+0x1ea/0x3b0 [ 1239.166603] ? lock_downgrade+0x900/0x900 [ 1239.170787] ? check_preemption_disabled+0x48/0x280 [ 1239.175809] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1239.180739] ? kasan_check_read+0x11/0x20 [ 1239.184923] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1239.190207] ? rcu_softirq_qs+0x20/0x20 [ 1239.194198] ? get_task_pid+0x211/0x3b0 [ 1239.198177] ? find_get_pid+0x270/0x270 [ 1239.202168] kvm_vcpu_ioctl+0x5c8/0x1150 [ 1239.206253] ? kvm_vcpu_ioctl+0x5c8/0x1150 [ 1239.210500] ? kvm_uevent_notify_change.part.32+0x450/0x450 [ 1239.216219] ? lock_downgrade+0x900/0x900 [ 1239.220376] ? check_preemption_disabled+0x48/0x280 [ 1239.225413] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1239.230343] ? kasan_check_read+0x11/0x20 [ 1239.234497] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1239.239777] ? rcu_softirq_qs+0x20/0x20 [ 1239.243779] ? ksys_dup3+0x680/0x680 [ 1239.247491] ? find_held_lock+0x36/0x1c0 [ 1239.251573] ? kasan_check_write+0x14/0x20 [ 1239.255812] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1239.260752] ? wait_for_completion+0x8a0/0x8a0 [ 1239.265373] ? __lock_is_held+0xb5/0x140 [ 1239.269462] ? __fget_light+0x2e9/0x430 [ 1239.273450] kvm_vcpu_compat_ioctl+0x210/0x4a0 [ 1239.278041] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1239.282370] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1239.287927] ? fput+0x130/0x1a0 [ 1239.291214] ? do_fast_syscall_32+0x150/0xfb2 [ 1239.295716] ? do_fast_syscall_32+0x150/0xfb2 [ 1239.300218] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1239.304814] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1239.309151] __ia32_compat_sys_ioctl+0x20e/0x630 [ 1239.313923] do_fast_syscall_32+0x34d/0xfb2 [ 1239.318251] ? do_int80_syscall_32+0x890/0x890 [ 1239.322832] ? entry_SYSENTER_compat+0x68/0x7f [ 1239.327421] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1239.332460] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1239.337301] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1239.342144] ? trace_hardirqs_on_caller+0x310/0x310 [ 1239.347190] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1239.352264] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1239.357306] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1239.362203] entry_SYSENTER_compat+0x70/0x7f [ 1239.366701] RIP: 0023:0xf7ff6a29 [ 1239.370068] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1239.388978] RSP: 002b:00000000f5ff20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 1239.396682] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000000ae80 [ 1239.403960] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 14:48:18 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1810000000000000]}, 0x48) 14:48:18 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e61740000000000000000000000000000000000000600", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1239.411473] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1239.418739] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1239.426024] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1239.444348] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:48:18 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x0, 0x2ded0000}}}, 0x90) 14:48:18 executing program 5 (fault-call:6 fault-nth:30): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1239.542609] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:48:18 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x0, 0x6]}, 0x2c) 14:48:18 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}, 0x48) 14:48:18 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x400000, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x3, 0x14, 0x5, "af2eb7b2723e9d1d7cc9f7638724145101b75bd5a530cb56e08a8825fae1cf56c69a99ddddc581a5c57fc426479a98363694344f492087a48c12175a737a576f", "e70ea0860a87bdf5f79c6055514e7dfbc7c6a4cfa787840ddcddc416949db6371634f3b8401870091b84241046fc170ee411343e8902618e70ae3f24f088fd29", "b25fb4a69d4f30c66eaa2e98671c4251084a360b6974d9a4884807b76bdf91ed", [0x9, 0x6]}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000280), &(0x7f00000002c0)=0x4) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r2}}, 0x10) 14:48:18 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1239.663558] FAULT_INJECTION: forcing a failure. [ 1239.663558] name failslab, interval 1, probability 0, space 0, times 0 [ 1239.700940] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1239.701596] CPU: 0 PID: 14180 Comm: syz-executor5 Not tainted 4.20.0-rc3+ #251 [ 1239.716782] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1239.726135] Call Trace: [ 1239.728743] dump_stack+0x244/0x39d [ 1239.730252] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1239.732392] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1239.732408] ? __kernel_text_address+0xd/0x40 [ 1239.732428] ? unwind_get_return_address+0x61/0xa0 [ 1239.746036] should_fail.cold.4+0xa/0x17 [ 1239.746055] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1239.746072] ? save_stack+0xa9/0xd0 [ 1239.746089] ? kasan_kmalloc+0xc7/0xe0 [ 1239.755528] ? kasan_slab_alloc+0x12/0x20 [ 1239.755541] ? kmem_cache_alloc+0x12e/0x730 [ 1239.755556] ? mmu_topup_memory_caches+0xfb/0x470 [ 1239.755590] ? kvm_mmu_load+0x21/0x1290 [ 1239.789497] ? kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1239.794597] ? zap_class+0x640/0x640 [ 1239.798306] ? do_fast_syscall_32+0x34d/0xfb2 [ 1239.802793] ? entry_SYSENTER_compat+0x70/0x7f [ 1239.807375] ? find_held_lock+0x36/0x1c0 [ 1239.811452] ? __lock_is_held+0xb5/0x140 [ 1239.815574] ? perf_trace_sched_process_exec+0x860/0x860 [ 1239.821049] __should_failslab+0x124/0x180 [ 1239.825309] should_failslab+0x9/0x14 [ 1239.829106] kmem_cache_alloc+0x2be/0x730 [ 1239.833256] ? mmu_topup_memory_caches+0xfb/0x470 [ 1239.838097] mmu_topup_memory_caches+0xfb/0x470 [ 1239.842799] ? kvm_inject_realmode_interrupt+0x260/0x260 [ 1239.848287] kvm_mmu_load+0x21/0x1290 [ 1239.852103] kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1239.857034] ? kvm_vcpu_ioctl+0x1e5/0x1150 [ 1239.861279] ? __lock_acquire+0x62f/0x4c20 [ 1239.865517] ? kvm_arch_vcpu_runnable+0x710/0x710 [ 1239.870358] ? zap_class+0x640/0x640 [ 1239.874083] ? mark_held_locks+0x130/0x130 [ 1239.878362] ? print_usage_bug+0xc0/0xc0 [ 1239.882445] ? mark_held_locks+0xc7/0x130 [ 1239.886586] ? mem_cgroup_commit_charge+0x2c1/0xa50 [ 1239.891627] ? zap_class+0x640/0x640 [ 1239.895341] ? find_held_lock+0x36/0x1c0 [ 1239.899415] ? get_task_pid+0x1ea/0x3b0 [ 1239.903398] ? lock_downgrade+0x900/0x900 [ 1239.907543] ? check_preemption_disabled+0x48/0x280 [ 1239.912556] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1239.917500] ? kasan_check_read+0x11/0x20 [ 1239.921670] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1239.926944] ? rcu_softirq_qs+0x20/0x20 [ 1239.930926] ? get_task_pid+0x211/0x3b0 [ 1239.934900] ? find_get_pid+0x270/0x270 [ 1239.938886] kvm_vcpu_ioctl+0x5c8/0x1150 [ 1239.942972] ? kvm_vcpu_ioctl+0x5c8/0x1150 [ 1239.947208] ? kvm_uevent_notify_change.part.32+0x450/0x450 [ 1239.952923] ? lock_downgrade+0x900/0x900 [ 1239.957068] ? check_preemption_disabled+0x48/0x280 [ 1239.962085] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1239.967017] ? kasan_check_read+0x11/0x20 [ 1239.971160] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1239.976446] ? rcu_softirq_qs+0x20/0x20 [ 1239.980458] ? ksys_dup3+0x680/0x680 [ 1239.984161] ? find_held_lock+0x36/0x1c0 [ 1239.988218] ? kasan_check_write+0x14/0x20 [ 1239.992490] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1239.997481] ? wait_for_completion+0x8a0/0x8a0 [ 1240.002069] ? __lock_is_held+0xb5/0x140 [ 1240.006152] ? __fget_light+0x2e9/0x430 [ 1240.010153] kvm_vcpu_compat_ioctl+0x210/0x4a0 [ 1240.014746] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1240.019080] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1240.024613] ? fput+0x130/0x1a0 [ 1240.027911] ? do_fast_syscall_32+0x150/0xfb2 [ 1240.032422] ? do_fast_syscall_32+0x150/0xfb2 [ 1240.036947] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1240.041544] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1240.045868] __ia32_compat_sys_ioctl+0x20e/0x630 [ 1240.050633] do_fast_syscall_32+0x34d/0xfb2 [ 1240.054958] ? do_int80_syscall_32+0x890/0x890 [ 1240.059538] ? entry_SYSENTER_compat+0x68/0x7f [ 1240.064129] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1240.069188] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1240.074046] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1240.078902] ? trace_hardirqs_on_caller+0x310/0x310 [ 1240.083930] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1240.088942] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1240.093955] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1240.098797] entry_SYSENTER_compat+0x70/0x7f [ 1240.103202] RIP: 0023:0xf7ff6a29 [ 1240.106579] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1240.125486] RSP: 002b:00000000f5ff20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 1240.133188] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000000ae80 [ 1240.140468] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1240.147761] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1240.155055] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 14:48:18 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}, 0x48) 14:48:18 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e617400000000000000000000000000000500", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1240.162331] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:48:18 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e617400000000000000000000000500", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1240.201442] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1240.212038] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:48:18 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x0, 0xfc000000}}}, 0x90) 14:48:18 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:48:18 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}, 0x48) [ 1240.241801] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1240.266088] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:48:19 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x0, 0x4000000000000000]}, 0x2c) 14:48:19 executing program 5 (fault-call:6 fault-nth:31): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:48:19 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1}}, 0x10) 14:48:19 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e617400000000000000000000000000000300", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1240.373753] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:48:19 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x0, 0x2}}}, 0x90) 14:48:19 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}, 0x48) 14:48:19 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x0, 0x100000000000000]}, 0x2c) 14:48:19 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000000)={0x5, 0x10, 0xfa00, {&(0x7f0000000480), r1, 0x2}}, 0x18) [ 1240.540067] FAULT_INJECTION: forcing a failure. [ 1240.540067] name failslab, interval 1, probability 0, space 0, times 0 [ 1240.563600] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1240.572764] CPU: 1 PID: 14250 Comm: syz-executor5 Not tainted 4.20.0-rc3+ #251 [ 1240.580172] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1240.589539] Call Trace: [ 1240.592138] dump_stack+0x244/0x39d [ 1240.595779] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1240.600980] ? debug_smp_processor_id+0x1c/0x20 [ 1240.605654] ? perf_trace_lock+0x14d/0x7a0 [ 1240.609904] should_fail.cold.4+0xa/0x17 [ 1240.613974] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1240.619091] ? save_stack+0xa9/0xd0 [ 1240.622727] ? kasan_kmalloc+0xc7/0xe0 [ 1240.626615] ? kasan_slab_alloc+0x12/0x20 [ 1240.630771] ? kmem_cache_alloc+0x12e/0x730 [ 1240.635111] ? mmu_topup_memory_caches+0xfb/0x470 [ 1240.639960] ? kvm_mmu_load+0x21/0x1290 [ 1240.643934] ? kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1240.649033] ? zap_class+0x640/0x640 [ 1240.652745] ? do_fast_syscall_32+0x34d/0xfb2 [ 1240.657246] ? find_held_lock+0x36/0x1c0 [ 1240.661307] ? __lock_is_held+0xb5/0x140 [ 1240.665381] ? perf_trace_sched_process_exec+0x860/0x860 [ 1240.670861] __should_failslab+0x124/0x180 [ 1240.675098] should_failslab+0x9/0x14 [ 1240.678894] kmem_cache_alloc+0x2be/0x730 [ 1240.683038] ? lock_acquire+0x1ed/0x520 [ 1240.687007] ? kvm_arch_vcpu_ioctl_run+0x30f/0x72a0 [ 1240.692021] ? mmu_topup_memory_caches+0xfb/0x470 [ 1240.696867] mmu_topup_memory_caches+0xfb/0x470 [ 1240.701579] ? kvm_inject_realmode_interrupt+0x260/0x260 [ 1240.707052] kvm_mmu_load+0x21/0x1290 [ 1240.710866] kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1240.715810] ? kvm_vcpu_ioctl+0x1e5/0x1150 [ 1240.720053] ? kvm_arch_vcpu_runnable+0x710/0x710 [ 1240.724889] ? zap_class+0x640/0x640 [ 1240.728644] ? mark_held_locks+0x130/0x130 [ 1240.732879] ? lock_is_held_type+0x210/0x210 [ 1240.737303] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1240.742857] ? check_preemption_disabled+0x48/0x280 [ 1240.747878] ? find_held_lock+0x36/0x1c0 [ 1240.751941] ? get_task_pid+0x1ea/0x3b0 [ 1240.755912] ? lock_downgrade+0x900/0x900 [ 1240.760072] ? check_preemption_disabled+0x48/0x280 [ 1240.765091] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1240.770061] ? kasan_check_read+0x11/0x20 [ 1240.774215] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1240.779490] ? rcu_softirq_qs+0x20/0x20 [ 1240.783482] ? get_task_pid+0x211/0x3b0 [ 1240.787471] ? find_get_pid+0x270/0x270 [ 1240.791455] kvm_vcpu_ioctl+0x5c8/0x1150 [ 1240.795513] ? kvm_vcpu_ioctl+0x5c8/0x1150 [ 1240.799751] ? kvm_uevent_notify_change.part.32+0x450/0x450 [ 1240.805473] ? lock_downgrade+0x900/0x900 [ 1240.809626] ? check_preemption_disabled+0x48/0x280 [ 1240.814643] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1240.819566] ? kasan_check_read+0x11/0x20 [ 1240.823708] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1240.828980] ? rcu_softirq_qs+0x20/0x20 [ 1240.832998] ? ksys_dup3+0x680/0x680 [ 1240.836721] ? find_held_lock+0x36/0x1c0 [ 1240.840798] ? kasan_check_write+0x14/0x20 [ 1240.845082] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1240.850028] ? wait_for_completion+0x8a0/0x8a0 [ 1240.854666] ? __fget_light+0x2e9/0x430 [ 1240.858643] kvm_vcpu_compat_ioctl+0x210/0x4a0 [ 1240.863222] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1240.867537] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1240.873068] ? fput+0x130/0x1a0 [ 1240.876369] ? do_fast_syscall_32+0x150/0xfb2 [ 1240.880864] ? do_fast_syscall_32+0x150/0xfb2 [ 1240.885371] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1240.889951] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1240.894266] __ia32_compat_sys_ioctl+0x20e/0x630 [ 1240.899024] do_fast_syscall_32+0x34d/0xfb2 [ 1240.903347] ? do_int80_syscall_32+0x890/0x890 [ 1240.907939] ? entry_SYSENTER_compat+0x68/0x7f [ 1240.912517] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1240.917533] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1240.922366] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1240.927203] ? trace_hardirqs_on_caller+0x310/0x310 [ 1240.932215] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1240.937247] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1240.942327] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1240.947202] entry_SYSENTER_compat+0x70/0x7f [ 1240.951602] RIP: 0023:0xf7ff6a29 [ 1240.954966] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1240.973864] RSP: 002b:00000000f5fd10cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 1240.981566] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000000ae80 14:48:19 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1240.988842] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1240.996109] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1241.003410] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1241.010679] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:48:19 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x0, 0x2ded000000000000}}}, 0x90) 14:48:19 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x0, 0xf000000]}, 0x2c) 14:48:19 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7a]}, 0x48) 14:48:19 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1}}, 0x10) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x101401, 0x0) ioctl$TIOCLINUX7(r2, 0x541c, &(0x7f0000000040)={0x7, 0x1}) 14:48:19 executing program 5 (fault-call:6 fault-nth:32): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1241.202633] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:48:19 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e617400000000000000000000000600", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:48:19 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x0, 0xfec00000}}}, 0x90) 14:48:20 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x0, 0xe00]}, 0x2c) [ 1241.282325] FAULT_INJECTION: forcing a failure. [ 1241.282325] name failslab, interval 1, probability 0, space 0, times 0 [ 1241.319839] CPU: 1 PID: 14286 Comm: syz-executor5 Not tainted 4.20.0-rc3+ #251 [ 1241.327255] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1241.336628] Call Trace: [ 1241.339221] dump_stack+0x244/0x39d [ 1241.342867] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1241.348060] ? __kernel_text_address+0xd/0x40 [ 1241.352572] ? unwind_get_return_address+0x61/0xa0 [ 1241.357501] should_fail.cold.4+0xa/0x17 [ 1241.361558] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1241.366657] ? save_stack+0xa9/0xd0 [ 1241.370283] ? kasan_kmalloc+0xc7/0xe0 [ 1241.374166] ? kasan_slab_alloc+0x12/0x20 [ 1241.378309] ? kmem_cache_alloc+0x12e/0x730 [ 1241.382631] ? mmu_topup_memory_caches+0xfb/0x470 [ 1241.387472] ? kvm_mmu_load+0x21/0x1290 [ 1241.391458] ? kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1241.396565] ? zap_class+0x640/0x640 [ 1241.400277] ? do_fast_syscall_32+0x34d/0xfb2 [ 1241.404769] ? entry_SYSENTER_compat+0x70/0x7f [ 1241.409357] ? find_held_lock+0x36/0x1c0 [ 1241.413432] ? __lock_is_held+0xb5/0x140 [ 1241.417504] ? perf_trace_sched_process_exec+0x860/0x860 [ 1241.422981] __should_failslab+0x124/0x180 [ 1241.427219] should_failslab+0x9/0x14 [ 1241.431024] kmem_cache_alloc+0x2be/0x730 [ 1241.435173] ? mmu_topup_memory_caches+0xfb/0x470 [ 1241.440012] mmu_topup_memory_caches+0xfb/0x470 [ 1241.444679] ? kvm_inject_realmode_interrupt+0x260/0x260 [ 1241.450130] kvm_mmu_load+0x21/0x1290 [ 1241.453967] kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1241.458908] ? kvm_vcpu_ioctl+0x1e5/0x1150 [ 1241.463170] ? kvm_arch_vcpu_runnable+0x710/0x710 [ 1241.468008] ? zap_class+0x640/0x640 [ 1241.471718] ? mark_held_locks+0x130/0x130 [ 1241.475964] ? lock_is_held_type+0x210/0x210 [ 1241.480377] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1241.485929] ? check_preemption_disabled+0x48/0x280 [ 1241.490943] ? find_held_lock+0x36/0x1c0 [ 1241.495006] ? get_task_pid+0x1ea/0x3b0 [ 1241.498991] ? lock_downgrade+0x900/0x900 [ 1241.503163] ? check_preemption_disabled+0x48/0x280 [ 1241.508204] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1241.513146] ? kasan_check_read+0x11/0x20 [ 1241.517321] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1241.522628] ? rcu_softirq_qs+0x20/0x20 [ 1241.526609] ? get_task_pid+0x211/0x3b0 [ 1241.530613] ? find_get_pid+0x270/0x270 [ 1241.534613] kvm_vcpu_ioctl+0x5c8/0x1150 [ 1241.538677] ? kvm_vcpu_ioctl+0x5c8/0x1150 [ 1241.543408] ? kvm_uevent_notify_change.part.32+0x450/0x450 [ 1241.549133] ? lock_downgrade+0x900/0x900 [ 1241.553281] ? check_preemption_disabled+0x48/0x280 [ 1241.558298] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1241.563221] ? kasan_check_read+0x11/0x20 [ 1241.567381] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1241.572673] ? rcu_softirq_qs+0x20/0x20 [ 1241.576669] ? ksys_dup3+0x680/0x680 [ 1241.580380] ? find_held_lock+0x36/0x1c0 [ 1241.584444] ? kasan_check_write+0x14/0x20 [ 1241.588696] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1241.593633] ? wait_for_completion+0x8a0/0x8a0 [ 1241.598254] ? __fget_light+0x2e9/0x430 [ 1241.602275] kvm_vcpu_compat_ioctl+0x210/0x4a0 [ 1241.606880] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1241.611201] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1241.616736] ? fput+0x130/0x1a0 [ 1241.620012] ? do_fast_syscall_32+0x150/0xfb2 [ 1241.624551] ? do_fast_syscall_32+0x150/0xfb2 [ 1241.629060] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1241.633650] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1241.637971] __ia32_compat_sys_ioctl+0x20e/0x630 [ 1241.642733] do_fast_syscall_32+0x34d/0xfb2 [ 1241.647057] ? do_int80_syscall_32+0x890/0x890 [ 1241.651638] ? entry_SYSENTER_compat+0x68/0x7f [ 1241.656259] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1241.661288] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1241.666145] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1241.671006] ? trace_hardirqs_on_caller+0x310/0x310 [ 1241.676059] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1241.681089] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1241.686108] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1241.690967] entry_SYSENTER_compat+0x70/0x7f [ 1241.695366] RIP: 0023:0xf7ff6a29 [ 1241.698781] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1241.717689] RSP: 002b:00000000f5ff20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 1241.725398] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000000ae80 [ 1241.732656] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1241.739915] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1241.747194] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1241.754589] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:48:20 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/raw6\x00') getpeername$unix(r2, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1}}, 0x10) 14:48:20 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e61740000000000000000000000000000007fffffff00", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1241.791470] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:48:20 executing program 5 (fault-call:6 fault-nth:33): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:48:20 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x0, 0x1100]}, 0x2c) 14:48:20 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x35040000]}, 0x48) 14:48:20 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x0, 0x2000000}}}, 0x90) 14:48:20 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e61740000000000000000000000000000000000000200", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1241.885959] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1241.909226] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:48:20 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x10000, 0x0) write$binfmt_aout(r0, &(0x7f0000000280)={{0x10f, 0x0, 0x100000001, 0x20b, 0x356, 0x80000000, 0x365, 0x1}, "c96645a22c3816c925255d8d35bc6cfa647149a50dae2d785c4249ef463983413795ddd1dcb9b16c3c98eddaef7a479d9d66c1315c898efd4734cc298c40b8d66658169dec035b92369c25d0ca25fa646abd918b3b603f65e594d19537803867bfe5251417b17f875b49057bebf80b3b6c07f9037cf0754a131063abcecadc339ca1bc40d2e31f48c9d77293553c9eaa0464b8f1423cf82a1a95e3736946feec0019cd4e5f6ccc9d889c3bd687e1422f", [[], [], [], [], []]}, 0x5d0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0xa) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r2}}, 0x10) 14:48:20 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4800000000000000]}, 0x48) [ 1242.021086] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1242.030592] FAULT_INJECTION: forcing a failure. [ 1242.030592] name failslab, interval 1, probability 0, space 0, times 0 [ 1242.046746] CPU: 1 PID: 14321 Comm: syz-executor5 Not tainted 4.20.0-rc3+ #251 [ 1242.054119] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1242.063489] Call Trace: [ 1242.066093] dump_stack+0x244/0x39d [ 1242.069741] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1242.071430] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1242.074946] ? debug_smp_processor_id+0x1c/0x20 [ 1242.074962] ? perf_trace_lock+0x14d/0x7a0 [ 1242.074982] should_fail.cold.4+0xa/0x17 [ 1242.075000] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1242.075022] ? save_stack+0xa9/0xd0 [ 1242.088068] ? kasan_kmalloc+0xc7/0xe0 [ 1242.096335] ? kasan_slab_alloc+0x12/0x20 [ 1242.096346] ? kmem_cache_alloc+0x12e/0x730 [ 1242.096360] ? mmu_topup_memory_caches+0xfb/0x470 [ 1242.096372] ? kvm_mmu_load+0x21/0x1290 [ 1242.096383] ? kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1242.096398] ? zap_class+0x640/0x640 [ 1242.135263] ? do_fast_syscall_32+0x34d/0xfb2 [ 1242.139821] ? find_held_lock+0x36/0x1c0 [ 1242.143896] ? __lock_is_held+0xb5/0x140 [ 1242.147970] ? perf_trace_sched_process_exec+0x860/0x860 [ 1242.153441] __should_failslab+0x124/0x180 [ 1242.157678] should_failslab+0x9/0x14 [ 1242.161474] kmem_cache_alloc+0x2be/0x730 [ 1242.165654] ? lock_acquire+0x1ed/0x520 [ 1242.169653] ? kvm_arch_vcpu_ioctl_run+0x30f/0x72a0 [ 1242.174698] ? mmu_topup_memory_caches+0xfb/0x470 [ 1242.179539] mmu_topup_memory_caches+0xfb/0x470 [ 1242.184203] ? kvm_inject_realmode_interrupt+0x260/0x260 [ 1242.189670] kvm_mmu_load+0x21/0x1290 [ 1242.193506] kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1242.198451] ? kvm_vcpu_ioctl+0x1e5/0x1150 [ 1242.202726] ? kvm_arch_vcpu_runnable+0x710/0x710 [ 1242.207598] ? zap_class+0x640/0x640 [ 1242.211332] ? mark_held_locks+0x130/0x130 [ 1242.215601] ? lock_is_held_type+0x210/0x210 [ 1242.220027] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1242.225565] ? check_preemption_disabled+0x48/0x280 [ 1242.230583] ? find_held_lock+0x36/0x1c0 [ 1242.234656] ? get_task_pid+0x1ea/0x3b0 [ 1242.238647] ? lock_downgrade+0x900/0x900 [ 1242.242811] ? check_preemption_disabled+0x48/0x280 [ 1242.247866] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1242.252802] ? kasan_check_read+0x11/0x20 [ 1242.256951] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1242.262235] ? rcu_softirq_qs+0x20/0x20 [ 1242.266224] ? get_task_pid+0x211/0x3b0 [ 1242.270199] ? find_get_pid+0x270/0x270 [ 1242.274185] kvm_vcpu_ioctl+0x5c8/0x1150 [ 1242.278248] ? kvm_vcpu_ioctl+0x5c8/0x1150 [ 1242.282493] ? kvm_uevent_notify_change.part.32+0x450/0x450 [ 1242.288207] ? lock_downgrade+0x900/0x900 [ 1242.292360] ? check_preemption_disabled+0x48/0x280 [ 1242.297381] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1242.302322] ? kasan_check_read+0x11/0x20 [ 1242.306560] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1242.311862] ? rcu_softirq_qs+0x20/0x20 [ 1242.315875] ? ksys_dup3+0x680/0x680 [ 1242.319590] ? find_held_lock+0x36/0x1c0 [ 1242.323660] ? kasan_check_write+0x14/0x20 [ 1242.327899] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1242.332834] ? wait_for_completion+0x8a0/0x8a0 [ 1242.337446] ? __fget_light+0x2e9/0x430 [ 1242.341433] kvm_vcpu_compat_ioctl+0x210/0x4a0 [ 1242.346026] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1242.350363] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1242.355904] ? fput+0x130/0x1a0 [ 1242.359198] ? do_fast_syscall_32+0x150/0xfb2 [ 1242.363694] ? do_fast_syscall_32+0x150/0xfb2 [ 1242.368226] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1242.372819] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1242.377150] __ia32_compat_sys_ioctl+0x20e/0x630 [ 1242.381925] do_fast_syscall_32+0x34d/0xfb2 [ 1242.386256] ? do_int80_syscall_32+0x890/0x890 [ 1242.390862] ? entry_SYSENTER_compat+0x68/0x7f [ 1242.395464] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1242.400484] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1242.405331] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1242.410332] ? trace_hardirqs_on_caller+0x310/0x310 [ 1242.415354] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1242.420377] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1242.425401] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1242.430296] entry_SYSENTER_compat+0x70/0x7f [ 1242.434725] RIP: 0023:0xf7ff6a29 [ 1242.438088] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1242.456982] RSP: 002b:00000000f5ff20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 1242.464687] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000000ae80 14:48:21 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e61740000000000000000000000000000000000000400", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1242.471954] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1242.479217] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1242.486489] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1242.493764] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:48:21 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x0, 0xff000000}}}, 0x90) 14:48:21 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3504]}, 0x48) [ 1242.548088] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:48:21 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x0, 0xa]}, 0x2c) 14:48:21 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:48:21 executing program 5 (fault-call:6 fault-nth:34): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1242.599377] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:48:21 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) socket$nl_generic(0x10, 0x3, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1}}, 0x10) 14:48:21 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:48:21 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4c000000]}, 0x48) [ 1242.704341] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:48:21 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x0, 0xfe800000}}}, 0x90) [ 1242.783173] FAULT_INJECTION: forcing a failure. [ 1242.783173] name failslab, interval 1, probability 0, space 0, times 0 [ 1242.813716] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1242.828617] CPU: 1 PID: 14369 Comm: syz-executor5 Not tainted 4.20.0-rc3+ #251 [ 1242.835998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1242.845355] Call Trace: [ 1242.847957] dump_stack+0x244/0x39d [ 1242.851626] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1242.856823] ? __kernel_text_address+0xd/0x40 [ 1242.861331] ? unwind_get_return_address+0x61/0xa0 [ 1242.866303] should_fail.cold.4+0xa/0x17 [ 1242.870409] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1242.875518] ? save_stack+0xa9/0xd0 [ 1242.879149] ? kasan_kmalloc+0xc7/0xe0 [ 1242.883035] ? kasan_slab_alloc+0x12/0x20 [ 1242.887179] ? kmem_cache_alloc+0x12e/0x730 [ 1242.891497] ? mmu_topup_memory_caches+0xfb/0x470 [ 1242.896334] ? kvm_mmu_load+0x21/0x1290 [ 1242.900341] ? kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1242.905454] ? zap_class+0x640/0x640 [ 1242.909164] ? do_fast_syscall_32+0x34d/0xfb2 [ 1242.913651] ? entry_SYSENTER_compat+0x70/0x7f [ 1242.918238] ? find_held_lock+0x36/0x1c0 [ 1242.922300] ? __lock_is_held+0xb5/0x140 [ 1242.926371] ? perf_trace_sched_process_exec+0x860/0x860 [ 1242.931826] __should_failslab+0x124/0x180 [ 1242.936067] should_failslab+0x9/0x14 [ 1242.939882] kmem_cache_alloc+0x2be/0x730 [ 1242.944043] ? mmu_topup_memory_caches+0xfb/0x470 [ 1242.948890] mmu_topup_memory_caches+0xfb/0x470 [ 1242.953558] ? kvm_inject_realmode_interrupt+0x260/0x260 [ 1242.959023] kvm_mmu_load+0x21/0x1290 [ 1242.962823] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1242.968385] ? check_preemption_disabled+0x48/0x280 [ 1242.973426] kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1242.978424] ? kvm_arch_vcpu_runnable+0x710/0x710 [ 1242.983261] ? zap_class+0x640/0x640 [ 1242.986974] ? mark_held_locks+0x130/0x130 [ 1242.991203] ? print_usage_bug+0xc0/0xc0 [ 1242.995271] ? mark_held_locks+0xc7/0x130 [ 1242.999436] ? mem_cgroup_commit_charge+0x2c1/0xa50 [ 1243.004508] ? zap_class+0x640/0x640 [ 1243.008237] ? find_held_lock+0x36/0x1c0 [ 1243.012296] ? get_task_pid+0x1ea/0x3b0 [ 1243.016268] ? lock_downgrade+0x900/0x900 [ 1243.020413] ? check_preemption_disabled+0x48/0x280 [ 1243.025428] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1243.030350] ? kasan_check_read+0x11/0x20 [ 1243.034568] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1243.039864] ? rcu_softirq_qs+0x20/0x20 [ 1243.043882] ? get_task_pid+0x211/0x3b0 [ 1243.047878] ? find_get_pid+0x270/0x270 [ 1243.051869] kvm_vcpu_ioctl+0x5c8/0x1150 [ 1243.055932] ? kvm_vcpu_ioctl+0x5c8/0x1150 [ 1243.060171] ? kvm_uevent_notify_change.part.32+0x450/0x450 [ 1243.065889] ? lock_downgrade+0x900/0x900 [ 1243.070054] ? check_preemption_disabled+0x48/0x280 [ 1243.075104] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1243.080050] ? kasan_check_read+0x11/0x20 [ 1243.084194] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1243.089480] ? rcu_softirq_qs+0x20/0x20 [ 1243.093466] ? ksys_dup3+0x680/0x680 [ 1243.097193] ? find_held_lock+0x36/0x1c0 [ 1243.101277] ? kasan_check_write+0x14/0x20 [ 1243.105546] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1243.110477] ? wait_for_completion+0x8a0/0x8a0 [ 1243.115074] ? __lock_is_held+0xb5/0x140 [ 1243.119147] ? __fget_light+0x2e9/0x430 [ 1243.123156] kvm_vcpu_compat_ioctl+0x210/0x4a0 [ 1243.127790] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1243.132121] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1243.137654] ? fput+0x130/0x1a0 [ 1243.140929] ? do_fast_syscall_32+0x150/0xfb2 [ 1243.145438] ? do_fast_syscall_32+0x150/0xfb2 [ 1243.149934] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1243.154520] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1243.158841] __ia32_compat_sys_ioctl+0x20e/0x630 [ 1243.163617] do_fast_syscall_32+0x34d/0xfb2 [ 1243.167955] ? do_int80_syscall_32+0x890/0x890 [ 1243.172540] ? entry_SYSENTER_compat+0x68/0x7f [ 1243.177124] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1243.182144] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1243.186992] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1243.191839] ? trace_hardirqs_on_caller+0x310/0x310 [ 1243.196875] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1243.201897] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1243.206918] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1243.211802] entry_SYSENTER_compat+0x70/0x7f [ 1243.216221] RIP: 0023:0xf7ff6a29 14:48:21 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x0, 0x14]}, 0x2c) [ 1243.219628] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1243.238561] RSP: 002b:00000000f5ff20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 1243.246264] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000000ae80 [ 1243.253523] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1243.260785] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1243.268056] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1243.275320] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:48:22 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e617400000000000000000000000300", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:48:22 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) madvise(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x13) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1}}, 0x10) [ 1243.296794] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:48:22 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e61740000000000000000000000000000000000000300", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:48:22 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6c000000]}, 0x48) [ 1243.360133] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:48:22 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x0, 0xfe80}}}, 0x90) 14:48:22 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x0, 0x4000000000000]}, 0x2c) 14:48:22 executing program 5 (fault-call:6 fault-nth:35): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:48:22 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000280)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000000380)=0xe8) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x0, 0x100f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x0, @local, 0xfffffffffffffffc}, {0xa, 0x4e21, 0x8b8, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}, 0x8}, r2, 0x1000}}, 0x48) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname$packet(r0, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000400)=0x14) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r3}}, 0x10) [ 1243.447300] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:48:22 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e61740000000000000000000000000000ff00", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:48:22 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, 0x48) [ 1243.514281] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1243.591258] FAULT_INJECTION: forcing a failure. [ 1243.591258] name failslab, interval 1, probability 0, space 0, times 0 [ 1243.615071] CPU: 1 PID: 14421 Comm: syz-executor5 Not tainted 4.20.0-rc3+ #251 [ 1243.622474] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1243.631843] Call Trace: [ 1243.634487] dump_stack+0x244/0x39d [ 1243.638136] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1243.643358] ? __kernel_text_address+0xd/0x40 [ 1243.647882] ? unwind_get_return_address+0x61/0xa0 [ 1243.652840] should_fail.cold.4+0xa/0x17 [ 1243.656958] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1243.662084] ? save_stack+0xa9/0xd0 [ 1243.662151] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1243.665728] ? kasan_kmalloc+0xc7/0xe0 [ 1243.665745] ? kasan_slab_alloc+0x12/0x20 [ 1243.665761] ? kmem_cache_alloc+0x12e/0x730 [ 1243.665780] ? mmu_topup_memory_caches+0xfb/0x470 14:48:22 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e61740000000000000000000000000300", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1243.665796] ? kvm_mmu_load+0x21/0x1290 [ 1243.665810] ? kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1243.665828] ? zap_class+0x640/0x640 [ 1243.665861] ? do_fast_syscall_32+0x34d/0xfb2 [ 1243.679377] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1243.682298] ? entry_SYSENTER_compat+0x70/0x7f [ 1243.682327] ? find_held_lock+0x36/0x1c0 [ 1243.682351] ? __lock_is_held+0xb5/0x140 [ 1243.682384] ? perf_trace_sched_process_exec+0x860/0x860 [ 1243.717297] __should_failslab+0x124/0x180 [ 1243.717319] should_failslab+0x9/0x14 [ 1243.717334] kmem_cache_alloc+0x2be/0x730 [ 1243.717371] ? mmu_topup_memory_caches+0xfb/0x470 [ 1243.717391] mmu_topup_memory_caches+0xfb/0x470 [ 1243.717423] ? kvm_inject_realmode_interrupt+0x260/0x260 [ 1243.717443] kvm_mmu_load+0x21/0x1290 [ 1243.726083] kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1243.726103] ? kvm_vcpu_ioctl+0x1e5/0x1150 [ 1243.726120] ? __lock_acquire+0x62f/0x4c20 [ 1243.726147] ? kvm_arch_vcpu_runnable+0x710/0x710 [ 1243.726165] ? zap_class+0x640/0x640 14:48:22 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4400]}, 0x48) [ 1243.788474] ? mark_held_locks+0x130/0x130 [ 1243.792715] ? print_usage_bug+0xc0/0xc0 [ 1243.796782] ? mark_held_locks+0xc7/0x130 [ 1243.800955] ? mem_cgroup_commit_charge+0x2c1/0xa50 [ 1243.805998] ? zap_class+0x640/0x640 [ 1243.809717] ? find_held_lock+0x36/0x1c0 [ 1243.813791] ? get_task_pid+0x1ea/0x3b0 [ 1243.817774] ? lock_downgrade+0x900/0x900 [ 1243.821960] ? check_preemption_disabled+0x48/0x280 [ 1243.827026] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1243.827040] ? kasan_check_read+0x11/0x20 [ 1243.827054] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1243.827069] ? rcu_softirq_qs+0x20/0x20 [ 1243.827095] ? get_task_pid+0x211/0x3b0 [ 1243.827109] ? find_get_pid+0x270/0x270 [ 1243.827134] kvm_vcpu_ioctl+0x5c8/0x1150 [ 1243.827152] ? kvm_vcpu_ioctl+0x5c8/0x1150 [ 1243.861748] ? kvm_uevent_notify_change.part.32+0x450/0x450 [ 1243.867521] ? lock_downgrade+0x900/0x900 [ 1243.871694] ? check_preemption_disabled+0x48/0x280 [ 1243.876743] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1243.881694] ? kasan_check_read+0x11/0x20 [ 1243.885860] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1243.891142] ? rcu_softirq_qs+0x20/0x20 [ 1243.895140] ? ksys_dup3+0x680/0x680 [ 1243.898881] ? find_held_lock+0x36/0x1c0 [ 1243.902946] ? kasan_check_write+0x14/0x20 [ 1243.907181] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1243.912123] ? wait_for_completion+0x8a0/0x8a0 [ 1243.916719] ? __lock_is_held+0xb5/0x140 [ 1243.920781] ? __fget_light+0x2e9/0x430 [ 1243.924805] kvm_vcpu_compat_ioctl+0x210/0x4a0 [ 1243.929413] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1243.933741] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1243.939295] ? fput+0x130/0x1a0 [ 1243.942574] ? do_fast_syscall_32+0x150/0xfb2 [ 1243.947067] ? do_fast_syscall_32+0x150/0xfb2 [ 1243.951557] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1243.956158] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1243.960494] __ia32_compat_sys_ioctl+0x20e/0x630 [ 1243.965296] do_fast_syscall_32+0x34d/0xfb2 [ 1243.969640] ? do_int80_syscall_32+0x890/0x890 [ 1243.974235] ? entry_SYSENTER_compat+0x68/0x7f [ 1243.978821] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1243.983882] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1243.988763] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1243.993647] ? trace_hardirqs_on_caller+0x310/0x310 [ 1243.998676] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1244.003693] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1244.008715] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1244.013559] entry_SYSENTER_compat+0x70/0x7f [ 1244.017993] RIP: 0023:0xf7ff6a29 [ 1244.021353] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 14:48:22 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x0, 0xed2d}}}, 0x90) [ 1244.040264] RSP: 002b:00000000f5ff20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 1244.047969] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000000ae80 [ 1244.055250] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1244.062513] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1244.069873] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1244.077143] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:48:22 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x0, 0x2000000]}, 0x2c) 14:48:22 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x74000000]}, 0x48) 14:48:22 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x48000000]}, 0x48) 14:48:23 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x80000) ioctl$KVM_CHECK_EXTENSION(r1, 0xae03, 0x3) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r2}}, 0x10) 14:48:23 executing program 5 (fault-call:6 fault-nth:36): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:48:23 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x0, 0x13000000]}, 0x2c) 14:48:23 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, 0x48) 14:48:23 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x0, 0xc0fe}}}, 0x90) [ 1244.488361] FAULT_INJECTION: forcing a failure. [ 1244.488361] name failslab, interval 1, probability 0, space 0, times 0 [ 1244.521308] CPU: 0 PID: 14474 Comm: syz-executor5 Not tainted 4.20.0-rc3+ #251 [ 1244.528679] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1244.538024] Call Trace: [ 1244.540710] dump_stack+0x244/0x39d [ 1244.544389] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1244.549590] ? debug_smp_processor_id+0x1c/0x20 [ 1244.554303] ? perf_trace_lock+0x14d/0x7a0 [ 1244.558555] should_fail.cold.4+0xa/0x17 [ 1244.562661] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1244.567795] ? save_stack+0xa9/0xd0 [ 1244.571422] ? kasan_kmalloc+0xc7/0xe0 [ 1244.575305] ? kasan_slab_alloc+0x12/0x20 [ 1244.579447] ? kmem_cache_alloc+0x12e/0x730 [ 1244.583769] ? mmu_topup_memory_caches+0xfb/0x470 [ 1244.588610] ? kvm_mmu_load+0x21/0x1290 [ 1244.592580] ? kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1244.597681] ? zap_class+0x640/0x640 [ 1244.601399] ? do_fast_syscall_32+0x34d/0xfb2 [ 1244.605922] ? find_held_lock+0x36/0x1c0 [ 1244.609992] ? __lock_is_held+0xb5/0x140 [ 1244.614070] ? perf_trace_sched_process_exec+0x860/0x860 [ 1244.619533] __should_failslab+0x124/0x180 [ 1244.623786] should_failslab+0x9/0x14 [ 1244.627621] kmem_cache_alloc+0x2be/0x730 [ 1244.631769] ? lock_acquire+0x1ed/0x520 [ 1244.635751] ? kvm_arch_vcpu_ioctl_run+0x30f/0x72a0 [ 1244.640794] ? mmu_topup_memory_caches+0xfb/0x470 [ 1244.645639] mmu_topup_memory_caches+0xfb/0x470 [ 1244.650312] ? kvm_inject_realmode_interrupt+0x260/0x260 [ 1244.655768] kvm_mmu_load+0x21/0x1290 [ 1244.659584] kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1244.664520] ? kvm_vcpu_ioctl+0x1e5/0x1150 [ 1244.668769] ? kvm_arch_vcpu_runnable+0x710/0x710 [ 1244.673611] ? zap_class+0x640/0x640 [ 1244.677324] ? mark_held_locks+0x130/0x130 [ 1244.681555] ? lock_is_held_type+0x210/0x210 [ 1244.685995] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1244.691537] ? check_preemption_disabled+0x48/0x280 [ 1244.696559] ? find_held_lock+0x36/0x1c0 [ 1244.700626] ? get_task_pid+0x1ea/0x3b0 [ 1244.704601] ? lock_downgrade+0x900/0x900 [ 1244.708748] ? check_preemption_disabled+0x48/0x280 [ 1244.713759] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1244.718696] ? kasan_check_read+0x11/0x20 [ 1244.722840] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1244.728141] ? rcu_softirq_qs+0x20/0x20 [ 1244.732129] ? get_task_pid+0x211/0x3b0 [ 1244.736100] ? find_get_pid+0x270/0x270 [ 1244.740112] kvm_vcpu_ioctl+0x5c8/0x1150 [ 1244.744189] ? kvm_vcpu_ioctl+0x5c8/0x1150 [ 1244.748440] ? kvm_uevent_notify_change.part.32+0x450/0x450 [ 1244.754194] ? lock_downgrade+0x900/0x900 [ 1244.758340] ? check_preemption_disabled+0x48/0x280 [ 1244.763355] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1244.768297] ? kasan_check_read+0x11/0x20 [ 1244.772442] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1244.777712] ? rcu_softirq_qs+0x20/0x20 [ 1244.781721] ? ksys_dup3+0x680/0x680 [ 1244.785428] ? find_held_lock+0x36/0x1c0 [ 1244.789503] ? kasan_check_write+0x14/0x20 [ 1244.793735] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1244.798670] ? wait_for_completion+0x8a0/0x8a0 [ 1244.803282] ? __fget_light+0x2e9/0x430 [ 1244.807271] kvm_vcpu_compat_ioctl+0x210/0x4a0 [ 1244.811891] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1244.816213] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1244.821779] ? fput+0x130/0x1a0 [ 1244.825070] ? do_fast_syscall_32+0x150/0xfb2 [ 1244.829573] ? do_fast_syscall_32+0x150/0xfb2 [ 1244.834062] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1244.838651] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1244.842982] __ia32_compat_sys_ioctl+0x20e/0x630 [ 1244.847796] do_fast_syscall_32+0x34d/0xfb2 [ 1244.852155] ? do_int80_syscall_32+0x890/0x890 [ 1244.856764] ? entry_SYSENTER_compat+0x68/0x7f [ 1244.861354] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1244.866366] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1244.871200] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1244.876060] ? trace_hardirqs_on_caller+0x310/0x310 [ 1244.881084] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1244.886117] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1244.891171] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1244.896016] entry_SYSENTER_compat+0x70/0x7f [ 1244.900434] RIP: 0023:0xf7ff6a29 [ 1244.903794] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1244.922703] RSP: 002b:00000000f5ff20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 1244.930424] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000000ae80 14:48:23 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x0, 0x1200000000000000]}, 0x2c) [ 1244.937684] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1244.944947] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1244.952209] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1244.959470] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:48:23 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e617400000000000000000000000200", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:48:23 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1}}, 0x10) clock_adjtime(0x6, &(0x7f0000000000)={0x4, 0x2, 0x100, 0x5, 0x4, 0x7f, 0x0, 0x1, 0x3f, 0x3, 0x80000001, 0x5, 0x0, 0x1, 0x4, 0x80000001, 0x2, 0x8, 0xe6c, 0x8, 0x500, 0xfffffffffffffff7, 0x3, 0x4, 0xffffffffffff99ef, 0x8}) 14:48:23 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x71000000]}, 0x48) 14:48:23 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x0, 0x3f00000000000000}}}, 0x90) 14:48:23 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x0, 0x1500000000000000]}, 0x2c) 14:48:23 executing program 5 (fault-call:6 fault-nth:37): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:48:23 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}, 0x48) [ 1245.311375] FAULT_INJECTION: forcing a failure. [ 1245.311375] name failslab, interval 1, probability 0, space 0, times 0 [ 1245.333906] CPU: 0 PID: 14503 Comm: syz-executor5 Not tainted 4.20.0-rc3+ #251 [ 1245.341314] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1245.350680] Call Trace: [ 1245.353296] dump_stack+0x244/0x39d [ 1245.356945] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1245.362163] ? debug_smp_processor_id+0x1c/0x20 [ 1245.366835] ? perf_trace_lock+0x14d/0x7a0 [ 1245.371086] should_fail.cold.4+0xa/0x17 [ 1245.375179] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1245.380289] ? save_stack+0xa9/0xd0 [ 1245.383922] ? kasan_kmalloc+0xc7/0xe0 [ 1245.387880] ? kasan_slab_alloc+0x12/0x20 [ 1245.392031] ? kmem_cache_alloc+0x12e/0x730 [ 1245.396391] ? mmu_topup_memory_caches+0xfb/0x470 [ 1245.401252] ? kvm_mmu_load+0x21/0x1290 [ 1245.405235] ? kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1245.410533] ? zap_class+0x640/0x640 [ 1245.414263] ? do_fast_syscall_32+0x34d/0xfb2 [ 1245.415670] IPVS: ftp: loaded support on port[0] = 21 [ 1245.418789] ? find_held_lock+0x36/0x1c0 [ 1245.418811] ? __lock_is_held+0xb5/0x140 [ 1245.418844] ? perf_trace_sched_process_exec+0x860/0x860 [ 1245.432163] __should_failslab+0x124/0x180 [ 1245.432185] should_failslab+0x9/0x14 [ 1245.432201] kmem_cache_alloc+0x2be/0x730 [ 1245.432222] ? mmu_topup_memory_caches+0xfb/0x470 [ 1245.441893] mmu_topup_memory_caches+0xfb/0x470 [ 1245.441910] ? kvm_inject_realmode_interrupt+0x260/0x260 [ 1245.441932] kvm_mmu_load+0x21/0x1290 [ 1245.441957] kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1245.449888] ? kvm_vcpu_ioctl+0x1e5/0x1150 [ 1245.449920] ? kvm_arch_vcpu_runnable+0x710/0x710 [ 1245.449935] ? zap_class+0x640/0x640 [ 1245.449954] ? mark_held_locks+0x130/0x130 [ 1245.459478] ? lock_is_held_type+0x210/0x210 [ 1245.459518] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1245.459536] ? check_preemption_disabled+0x48/0x280 [ 1245.459558] ? find_held_lock+0x36/0x1c0 [ 1245.468795] ? get_task_pid+0x1ea/0x3b0 [ 1245.468813] ? lock_downgrade+0x900/0x900 [ 1245.468829] ? check_preemption_disabled+0x48/0x280 [ 1245.468861] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1245.477999] ? kasan_check_read+0x11/0x20 [ 1245.478012] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1245.478025] ? rcu_softirq_qs+0x20/0x20 [ 1245.478049] ? get_task_pid+0x211/0x3b0 [ 1245.478063] ? find_get_pid+0x270/0x270 [ 1245.478102] kvm_vcpu_ioctl+0x5c8/0x1150 [ 1245.486657] ? kvm_vcpu_ioctl+0x5c8/0x1150 14:48:24 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x0, 0xfe80000000000000}}}, 0x90) [ 1245.495285] ? kvm_uevent_notify_change.part.32+0x450/0x450 [ 1245.495300] ? lock_downgrade+0x900/0x900 [ 1245.495314] ? check_preemption_disabled+0x48/0x280 [ 1245.495330] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1245.495342] ? kasan_check_read+0x11/0x20 [ 1245.495354] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1245.495368] ? rcu_softirq_qs+0x20/0x20 [ 1245.505955] ? ksys_dup3+0x680/0x680 [ 1245.505969] ? find_held_lock+0x36/0x1c0 [ 1245.505987] ? kasan_check_write+0x14/0x20 [ 1245.506003] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1245.506025] ? wait_for_completion+0x8a0/0x8a0 [ 1245.514061] ? __fget_light+0x2e9/0x430 [ 1245.514083] kvm_vcpu_compat_ioctl+0x210/0x4a0 [ 1245.514101] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1245.514118] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1245.523247] ? fput+0x130/0x1a0 [ 1245.523276] ? do_fast_syscall_32+0x150/0xfb2 [ 1245.523290] ? do_fast_syscall_32+0x150/0xfb2 [ 1245.523305] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1245.523325] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1245.532370] __ia32_compat_sys_ioctl+0x20e/0x630 [ 1245.532394] do_fast_syscall_32+0x34d/0xfb2 [ 1245.532412] ? do_int80_syscall_32+0x890/0x890 [ 1245.532431] ? entry_SYSENTER_compat+0x68/0x7f [ 1245.541659] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1245.541674] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1245.541688] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1245.541703] ? trace_hardirqs_on_caller+0x310/0x310 [ 1245.541721] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1245.549642] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1245.549662] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1245.549682] entry_SYSENTER_compat+0x70/0x7f [ 1245.549694] RIP: 0023:0xf7ff6a29 [ 1245.549709] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1245.557968] RSP: 002b:00000000f5ff20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 1245.557982] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000000ae80 [ 1245.557990] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1245.557998] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 14:48:24 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x0, 0x3f00]}, 0x2c) 14:48:24 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}, 0x48) 14:48:24 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000080)="c4c1c72a0efb660fdbd9f3f7630df30f51c9a5f266651ec4c2794629c4e289a8cec4c1f929ee") write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1}}, 0x10) fstat(r0, &(0x7f0000000000)) [ 1245.558006] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1245.558014] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:48:24 executing program 5 (fault-call:6 fault-nth:38): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:48:24 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x0, 0xfec0}}}, 0x90) [ 1245.975892] FAULT_INJECTION: forcing a failure. [ 1245.975892] name failslab, interval 1, probability 0, space 0, times 0 [ 1245.987755] CPU: 0 PID: 14536 Comm: syz-executor5 Not tainted 4.20.0-rc3+ #251 [ 1245.995141] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1245.995148] Call Trace: [ 1245.995189] dump_stack+0x244/0x39d [ 1245.995211] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1245.995233] ? debug_smp_processor_id+0x1c/0x20 [ 1245.995279] ? perf_trace_lock+0x14d/0x7a0 [ 1245.995302] should_fail.cold.4+0xa/0x17 [ 1245.995357] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1246.016147] ? save_stack+0xa9/0xd0 [ 1246.016164] ? kasan_kmalloc+0xc7/0xe0 [ 1246.016178] ? kasan_slab_alloc+0x12/0x20 [ 1246.016190] ? kmem_cache_alloc+0x12e/0x730 [ 1246.016205] ? mmu_topup_memory_caches+0xfb/0x470 [ 1246.016219] ? kvm_mmu_load+0x21/0x1290 [ 1246.016250] ? kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1246.029170] ? zap_class+0x640/0x640 [ 1246.029185] ? do_fast_syscall_32+0x34d/0xfb2 [ 1246.029206] ? find_held_lock+0x36/0x1c0 [ 1246.029223] ? __lock_is_held+0xb5/0x140 [ 1246.037934] ? perf_trace_sched_process_exec+0x860/0x860 [ 1246.037959] __should_failslab+0x124/0x180 [ 1246.037977] should_failslab+0x9/0x14 [ 1246.046020] kmem_cache_alloc+0x2be/0x730 [ 1246.046052] ? lock_acquire+0x1ed/0x520 [ 1246.046081] ? kvm_arch_vcpu_ioctl_run+0x30f/0x72a0 [ 1246.046112] ? mmu_topup_memory_caches+0xfb/0x470 [ 1246.046153] mmu_topup_memory_caches+0xfb/0x470 [ 1246.055283] ? kvm_inject_realmode_interrupt+0x260/0x260 [ 1246.055303] kvm_mmu_load+0x21/0x1290 [ 1246.055326] kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1246.055342] ? kvm_vcpu_ioctl+0x1e5/0x1150 [ 1246.055366] ? kvm_arch_vcpu_runnable+0x710/0x710 [ 1246.064412] ? zap_class+0x640/0x640 [ 1246.064429] ? mark_held_locks+0x130/0x130 [ 1246.064444] ? lock_is_held_type+0x210/0x210 [ 1246.064469] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1246.064490] ? check_preemption_disabled+0x48/0x280 [ 1246.072673] ? find_held_lock+0x36/0x1c0 [ 1246.072697] ? get_task_pid+0x1ea/0x3b0 [ 1246.072713] ? lock_downgrade+0x900/0x900 [ 1246.072761] ? check_preemption_disabled+0x48/0x280 [ 1246.080878] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1246.080892] ? kasan_check_read+0x11/0x20 [ 1246.080905] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1246.080937] ? rcu_softirq_qs+0x20/0x20 [ 1246.090630] ? get_task_pid+0x211/0x3b0 [ 1246.090644] ? find_get_pid+0x270/0x270 [ 1246.090666] kvm_vcpu_ioctl+0x5c8/0x1150 [ 1246.090681] ? kvm_vcpu_ioctl+0x5c8/0x1150 [ 1246.098598] ? kvm_uevent_notify_change.part.32+0x450/0x450 [ 1246.098612] ? lock_downgrade+0x900/0x900 [ 1246.098625] ? check_preemption_disabled+0x48/0x280 [ 1246.098643] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1246.107644] ? kasan_check_read+0x11/0x20 [ 1246.107673] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1246.107700] ? rcu_softirq_qs+0x20/0x20 [ 1246.107732] ? ksys_dup3+0x680/0x680 [ 1246.107748] ? find_held_lock+0x36/0x1c0 [ 1246.117254] ? kasan_check_write+0x14/0x20 [ 1246.117286] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1246.117304] ? wait_for_completion+0x8a0/0x8a0 [ 1246.117327] ? __fget_light+0x2e9/0x430 [ 1246.126568] kvm_vcpu_compat_ioctl+0x210/0x4a0 [ 1246.126587] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1246.126617] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1246.126631] ? fput+0x130/0x1a0 [ 1246.126652] ? do_fast_syscall_32+0x150/0xfb2 [ 1246.135781] ? do_fast_syscall_32+0x150/0xfb2 [ 1246.135796] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1246.135816] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1246.135832] __ia32_compat_sys_ioctl+0x20e/0x630 [ 1246.144392] do_fast_syscall_32+0x34d/0xfb2 [ 1246.144410] ? do_int80_syscall_32+0x890/0x890 [ 1246.144427] ? entry_SYSENTER_compat+0x68/0x7f [ 1246.153059] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1246.153075] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1246.153089] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1246.153107] ? trace_hardirqs_on_caller+0x310/0x310 [ 1246.163631] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1246.163648] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1246.163668] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1246.163686] entry_SYSENTER_compat+0x70/0x7f [ 1246.171700] RIP: 0023:0xf7ff6a29 [ 1246.171715] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1246.171723] RSP: 002b:00000000f5ff20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 1246.171736] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000000ae80 [ 1246.171749] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1246.180880] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1246.180888] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1246.180896] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1246.595824] device bridge_slave_1 left promiscuous mode [ 1246.601338] bridge0: port 2(bridge_slave_1) entered disabled state [ 1246.635204] device bridge_slave_0 left promiscuous mode [ 1246.640630] bridge0: port 1(bridge_slave_0) entered disabled state [ 1246.735706] team0 (unregistering): Port device team_slave_1 removed [ 1246.746077] team0 (unregistering): Port device team_slave_0 removed [ 1246.758018] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1246.797984] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1246.853113] bond0 (unregistering): Released all slaves [ 1247.084288] bridge0: port 1(bridge_slave_0) entered blocking state [ 1247.090972] bridge0: port 1(bridge_slave_0) entered disabled state [ 1247.099299] device bridge_slave_0 entered promiscuous mode [ 1247.143770] bridge0: port 2(bridge_slave_1) entered blocking state [ 1247.150273] bridge0: port 2(bridge_slave_1) entered disabled state [ 1247.157692] device bridge_slave_1 entered promiscuous mode [ 1247.199052] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1247.241135] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1247.369479] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1247.416719] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1247.617606] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1247.625299] team0: Port device team_slave_0 added [ 1247.665745] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1247.673047] team0: Port device team_slave_1 added [ 1247.713205] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1247.759341] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1247.802392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1247.848769] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1248.246719] bridge0: port 2(bridge_slave_1) entered blocking state [ 1248.253098] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1248.259875] bridge0: port 1(bridge_slave_0) entered blocking state [ 1248.266278] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1248.274214] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1248.954603] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1249.183048] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1249.266946] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1249.354888] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1249.361005] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1249.369243] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1249.460626] 8021q: adding VLAN 0 to HW filter on device team0 14:48:28 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:48:28 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x9cffffff]}, 0x48) 14:48:28 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x262, 0xfa00, {r1}}, 0x10) 14:48:28 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x0, 0x1800000000000000]}, 0x2c) 14:48:28 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x0, 0x3f00}}}, 0x90) 14:48:28 executing program 5 (fault-call:6 fault-nth:39): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1250.051313] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1250.061417] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1250.105761] FAULT_INJECTION: forcing a failure. [ 1250.105761] name failslab, interval 1, probability 0, space 0, times 0 [ 1250.139107] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1250.147673] CPU: 1 PID: 14805 Comm: syz-executor5 Not tainted 4.20.0-rc3+ #251 [ 1250.147685] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1250.147692] Call Trace: [ 1250.147742] dump_stack+0x244/0x39d [ 1250.147767] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1250.147787] ? __kernel_text_address+0xd/0x40 [ 1250.147804] ? unwind_get_return_address+0x61/0xa0 [ 1250.147851] should_fail.cold.4+0xa/0x17 [ 1250.189438] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1250.194585] ? save_stack+0xa9/0xd0 [ 1250.198223] ? kasan_kmalloc+0xc7/0xe0 [ 1250.202115] ? kasan_slab_alloc+0x12/0x20 [ 1250.206286] ? kmem_cache_alloc+0x12e/0x730 [ 1250.210791] ? mmu_topup_memory_caches+0xfb/0x470 [ 1250.215676] ? kvm_mmu_load+0x21/0x1290 [ 1250.219658] ? kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1250.224772] ? zap_class+0x640/0x640 [ 1250.228498] ? do_fast_syscall_32+0x34d/0xfb2 [ 1250.233003] ? entry_SYSENTER_compat+0x70/0x7f [ 1250.237609] ? find_held_lock+0x36/0x1c0 [ 1250.241688] ? __lock_is_held+0xb5/0x140 [ 1250.245790] ? perf_trace_sched_process_exec+0x860/0x860 [ 1250.251262] __should_failslab+0x124/0x180 [ 1250.255513] should_failslab+0x9/0x14 [ 1250.259335] kmem_cache_alloc+0x2be/0x730 [ 1250.263506] ? lock_acquire+0x1ed/0x520 [ 1250.267486] ? kvm_arch_vcpu_ioctl_run+0x30f/0x72a0 [ 1250.272513] ? mmu_topup_memory_caches+0xfb/0x470 [ 1250.277373] mmu_topup_memory_caches+0xfb/0x470 [ 1250.282053] ? kvm_inject_realmode_interrupt+0x260/0x260 [ 1250.287520] kvm_mmu_load+0x21/0x1290 [ 1250.291341] kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1250.296297] ? kvm_vcpu_ioctl+0x1e5/0x1150 [ 1250.300542] ? __lock_acquire+0x62f/0x4c20 [ 1250.304815] ? kvm_arch_vcpu_runnable+0x710/0x710 [ 1250.309678] ? zap_class+0x640/0x640 [ 1250.313404] ? mark_held_locks+0x130/0x130 [ 1250.317677] ? print_usage_bug+0xc0/0xc0 [ 1250.321760] ? mark_held_locks+0xc7/0x130 [ 1250.325922] ? mem_cgroup_commit_charge+0x2c1/0xa50 [ 1250.330946] ? zap_class+0x640/0x640 [ 1250.334675] ? find_held_lock+0x36/0x1c0 [ 1250.338759] ? get_task_pid+0x1ea/0x3b0 [ 1250.342742] ? lock_downgrade+0x900/0x900 [ 1250.346927] ? check_preemption_disabled+0x48/0x280 [ 1250.351953] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1250.356892] ? kasan_check_read+0x11/0x20 [ 1250.361045] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1250.366326] ? rcu_softirq_qs+0x20/0x20 [ 1250.370326] ? get_task_pid+0x211/0x3b0 [ 1250.374321] ? find_get_pid+0x270/0x270 [ 1250.378329] kvm_vcpu_ioctl+0x5c8/0x1150 [ 1250.382393] ? kvm_vcpu_ioctl+0x5c8/0x1150 [ 1250.386642] ? kvm_uevent_notify_change.part.32+0x450/0x450 [ 1250.392360] ? lock_downgrade+0x900/0x900 [ 1250.396515] ? check_preemption_disabled+0x48/0x280 [ 1250.401541] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1250.406477] ? kasan_check_read+0x11/0x20 [ 1250.410802] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1250.416088] ? rcu_softirq_qs+0x20/0x20 [ 1250.420097] ? ksys_dup3+0x680/0x680 [ 1250.423816] ? find_held_lock+0x36/0x1c0 [ 1250.427912] ? kasan_check_write+0x14/0x20 [ 1250.432171] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1250.437116] ? wait_for_completion+0x8a0/0x8a0 [ 1250.441712] ? __lock_is_held+0xb5/0x140 [ 1250.445791] ? __fget_light+0x2e9/0x430 [ 1250.449782] kvm_vcpu_compat_ioctl+0x210/0x4a0 [ 1250.454391] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1250.458719] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1250.464263] ? fput+0x130/0x1a0 [ 1250.467552] ? do_fast_syscall_32+0x150/0xfb2 [ 1250.472081] ? do_fast_syscall_32+0x150/0xfb2 [ 1250.476584] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1250.481185] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1250.485511] __ia32_compat_sys_ioctl+0x20e/0x630 [ 1250.490285] do_fast_syscall_32+0x34d/0xfb2 [ 1250.494688] ? do_int80_syscall_32+0x890/0x890 [ 1250.499298] ? entry_SYSENTER_compat+0x68/0x7f [ 1250.503910] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1250.508933] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1250.513798] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1250.518652] ? trace_hardirqs_on_caller+0x310/0x310 [ 1250.523677] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1250.528703] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1250.533739] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1250.538599] entry_SYSENTER_compat+0x70/0x7f [ 1250.543525] RIP: 0023:0xf7ff6a29 [ 1250.546917] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1250.565840] RSP: 002b:00000000f5ff20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 1250.573565] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000000ae80 [ 1250.580845] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1250.588143] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1250.595432] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 14:48:29 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e61740000000000000000000000000300", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1250.602721] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:48:29 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1018]}, 0x48) 14:48:29 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x0, 0xc000000]}, 0x2c) 14:48:29 executing program 4: r0 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f00000000c0)={'team_slave_0\x00', {0x2, 0x4e21, @local}}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x82000, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80041272, &(0x7f0000000040)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(0xffffffffffffffff, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1}}, 0x10) 14:48:29 executing program 5 (fault-call:6 fault-nth:40): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:48:29 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1250.707124] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1250.727870] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1250.860698] FAULT_INJECTION: forcing a failure. [ 1250.860698] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1250.870934] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1250.882219] CPU: 0 PID: 14838 Comm: syz-executor5 Not tainted 4.20.0-rc3+ #251 [ 1250.889603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1250.898962] Call Trace: [ 1250.898991] dump_stack+0x244/0x39d [ 1250.899021] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1250.899042] ? perf_trace_lock+0x14d/0x7a0 [ 1250.899080] should_fail.cold.4+0xa/0x17 [ 1250.910462] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1250.910479] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1250.910496] ? zap_class+0x640/0x640 [ 1250.910514] ? rcu_softirq_qs+0x20/0x20 [ 1250.936935] ? zap_class+0x640/0x640 [ 1250.940686] ? __lock_is_held+0xb5/0x140 [ 1250.940780] ? vmw_binding_state_commit+0x1c0/0x5a0 [ 1250.940809] ? lock_release+0xa00/0xa00 [ 1250.953875] ? perf_trace_sched_process_exec+0x860/0x860 [ 1250.959339] ? save_stack+0xa9/0xd0 [ 1250.959359] ? save_stack+0x43/0xd0 [ 1250.959375] ? kasan_kmalloc+0xc7/0xe0 [ 1250.959397] ? __might_sleep+0x95/0x190 [ 1250.966255] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1250.966664] __alloc_pages_nodemask+0x366/0xea0 [ 1250.966698] ? lock_downgrade+0x900/0x900 [ 1250.966719] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 1250.982964] ? zap_class+0x640/0x640 [ 1250.982980] ? rcu_softirq_qs+0x20/0x20 [ 1250.983006] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 14:48:29 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) r2 = accept4(0xffffffffffffff9c, &(0x7f0000000000)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000080)=0x80, 0x800) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f00000000c0)=[{0x6, 0x4, 0x20, 0x101}, {0x5, 0x9, 0xffffffff, 0x67d3aab}, {0x6, 0x1, 0x1000, 0xb5d6}]}, 0x8) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1}}, 0x10) 14:48:29 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00000000000000]}, 0x48) 14:48:29 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x0, 0xc00]}, 0x2c) [ 1250.991807] ? check_preemption_disabled+0x48/0x280 [ 1250.991836] ? __lock_is_held+0xb5/0x140 [ 1250.991876] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1251.024768] alloc_pages_current+0x173/0x350 [ 1251.029203] __get_free_pages+0xc/0x40 [ 1251.033136] mmu_topup_memory_caches+0x217/0x470 [ 1251.037916] ? kvm_inject_realmode_interrupt+0x260/0x260 [ 1251.043386] kvm_mmu_load+0x21/0x1290 [ 1251.047226] kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1251.052190] ? kvm_vcpu_ioctl+0x1e5/0x1150 [ 1251.056488] ? kvm_arch_vcpu_runnable+0x710/0x710 [ 1251.061350] ? zap_class+0x640/0x640 [ 1251.065082] ? mark_held_locks+0x130/0x130 [ 1251.069333] ? lock_is_held_type+0x210/0x210 [ 1251.073769] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1251.079330] ? check_preemption_disabled+0x48/0x280 [ 1251.084370] ? find_held_lock+0x36/0x1c0 [ 1251.088473] ? get_task_pid+0x1ea/0x3b0 [ 1251.092465] ? lock_downgrade+0x900/0x900 [ 1251.096627] ? check_preemption_disabled+0x48/0x280 [ 1251.101668] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1251.106627] ? kasan_check_read+0x11/0x20 [ 1251.110817] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1251.116107] ? rcu_softirq_qs+0x20/0x20 [ 1251.120117] ? get_task_pid+0x211/0x3b0 [ 1251.124118] ? find_get_pid+0x270/0x270 [ 1251.128125] kvm_vcpu_ioctl+0x5c8/0x1150 [ 1251.132202] ? kvm_vcpu_ioctl+0x5c8/0x1150 [ 1251.136452] ? kvm_uevent_notify_change.part.32+0x450/0x450 [ 1251.142174] ? lock_downgrade+0x900/0x900 [ 1251.146336] ? check_preemption_disabled+0x48/0x280 [ 1251.151366] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1251.156303] ? kasan_check_read+0x11/0x20 [ 1251.160457] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1251.165743] ? rcu_softirq_qs+0x20/0x20 [ 1251.169759] ? ksys_dup3+0x680/0x680 [ 1251.173507] ? find_held_lock+0x36/0x1c0 [ 1251.177583] ? kasan_check_write+0x14/0x20 [ 1251.181826] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1251.186778] ? wait_for_completion+0x8a0/0x8a0 [ 1251.191392] ? __fget_light+0x2e9/0x430 [ 1251.195389] kvm_vcpu_compat_ioctl+0x210/0x4a0 [ 1251.199990] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1251.204319] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1251.209886] ? fput+0x130/0x1a0 [ 1251.213175] ? do_fast_syscall_32+0x150/0xfb2 [ 1251.217694] ? do_fast_syscall_32+0x150/0xfb2 [ 1251.222201] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1251.226803] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1251.231152] __ia32_compat_sys_ioctl+0x20e/0x630 [ 1251.235928] do_fast_syscall_32+0x34d/0xfb2 [ 1251.240266] ? do_int80_syscall_32+0x890/0x890 [ 1251.244884] ? entry_SYSENTER_compat+0x68/0x7f [ 1251.249478] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1251.254499] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1251.259349] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1251.264201] ? trace_hardirqs_on_caller+0x310/0x310 [ 1251.269226] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1251.274256] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1251.279293] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1251.284161] entry_SYSENTER_compat+0x70/0x7f [ 1251.288583] RIP: 0023:0xf7ff6a29 [ 1251.291961] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 14:48:30 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e6174000000000000000000000000000000000000000100", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1251.310881] RSP: 002b:00000000f5ff20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 1251.318615] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000000ae80 [ 1251.325894] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1251.333171] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1251.340443] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1251.347718] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1251.388212] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1251.407369] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:48:30 executing program 5 (fault-call:6 fault-nth:41): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:48:30 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e617400000000000000000000000000ff00", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:48:30 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x0, 0x200000000000000}}}, 0x90) 14:48:30 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000]}, 0x48) 14:48:30 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2) ioctl$VT_WAITACTIVE(r1, 0x5607) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r2}}, 0x10) openat$cgroup(r1, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) 14:48:30 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x0, 0x18000000]}, 0x2c) [ 1251.563579] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1251.593658] FAULT_INJECTION: forcing a failure. [ 1251.593658] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1251.615235] CPU: 0 PID: 14883 Comm: syz-executor5 Not tainted 4.20.0-rc3+ #251 [ 1251.622619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1251.631977] Call Trace: [ 1251.634591] dump_stack+0x244/0x39d [ 1251.638240] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1251.643454] ? zap_class+0x640/0x640 [ 1251.647196] should_fail.cold.4+0xa/0x17 [ 1251.651268] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1251.656559] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1251.661677] ? zap_class+0x640/0x640 [ 1251.665409] ? zap_class+0x640/0x640 [ 1251.669152] ? percpu_ref_put_many+0x11c/0x260 [ 1251.673759] ? lock_downgrade+0x900/0x900 [ 1251.677916] ? check_preemption_disabled+0x48/0x280 [ 1251.682980] ? __lock_is_held+0xb5/0x140 [ 1251.687061] ? check_preemption_disabled+0x48/0x280 [ 1251.692087] ? lock_release+0xa00/0xa00 [ 1251.696071] ? perf_trace_sched_process_exec+0x860/0x860 [ 1251.701530] ? __lock_is_held+0xb5/0x140 [ 1251.705607] ? __might_sleep+0x95/0x190 [ 1251.709596] __alloc_pages_nodemask+0x366/0xea0 [ 1251.714276] ? lock_downgrade+0x900/0x900 [ 1251.718440] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 1251.723495] ? zap_class+0x640/0x640 [ 1251.727217] ? rcu_softirq_qs+0x20/0x20 [ 1251.731209] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1251.736754] ? check_preemption_disabled+0x48/0x280 [ 1251.741815] ? __lock_is_held+0xb5/0x140 [ 1251.745908] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1251.751481] alloc_pages_current+0x173/0x350 [ 1251.755916] __get_free_pages+0xc/0x40 [ 1251.759830] mmu_topup_memory_caches+0x217/0x470 [ 1251.764615] ? kvm_inject_realmode_interrupt+0x260/0x260 [ 1251.770099] kvm_mmu_load+0x21/0x1290 [ 1251.773929] kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1251.778877] ? kvm_vcpu_ioctl+0x1e5/0x1150 [ 1251.783121] ? __lock_acquire+0x62f/0x4c20 [ 1251.787405] ? kvm_arch_vcpu_runnable+0x710/0x710 [ 1251.792253] ? zap_class+0x640/0x640 [ 1251.795975] ? mark_held_locks+0x130/0x130 [ 1251.800217] ? print_usage_bug+0xc0/0xc0 [ 1251.804283] ? mark_held_locks+0xc7/0x130 [ 1251.808457] ? mem_cgroup_commit_charge+0x2c1/0xa50 [ 1251.813497] ? zap_class+0x640/0x640 [ 1251.817242] ? find_held_lock+0x36/0x1c0 [ 1251.821326] ? get_task_pid+0x1ea/0x3b0 [ 1251.825311] ? lock_downgrade+0x900/0x900 [ 1251.829465] ? check_preemption_disabled+0x48/0x280 [ 1251.834491] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1251.839444] ? kasan_check_read+0x11/0x20 [ 1251.843596] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1251.848883] ? rcu_softirq_qs+0x20/0x20 [ 1251.852903] ? get_task_pid+0x211/0x3b0 [ 1251.856889] ? find_get_pid+0x270/0x270 [ 1251.860893] kvm_vcpu_ioctl+0x5c8/0x1150 [ 1251.864962] ? kvm_vcpu_ioctl+0x5c8/0x1150 [ 1251.869209] ? kvm_uevent_notify_change.part.32+0x450/0x450 [ 1251.874925] ? lock_downgrade+0x900/0x900 [ 1251.879082] ? check_preemption_disabled+0x48/0x280 [ 1251.884148] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1251.889086] ? kasan_check_read+0x11/0x20 [ 1251.893241] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1251.898524] ? rcu_softirq_qs+0x20/0x20 [ 1251.902538] ? ksys_dup3+0x680/0x680 [ 1251.906270] ? find_held_lock+0x36/0x1c0 [ 1251.910347] ? kasan_check_write+0x14/0x20 [ 1251.914595] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1251.919556] ? wait_for_completion+0x8a0/0x8a0 [ 1251.924169] ? __lock_is_held+0xb5/0x140 [ 1251.928250] ? __fget_light+0x2e9/0x430 [ 1251.932242] kvm_vcpu_compat_ioctl+0x210/0x4a0 [ 1251.936851] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1251.941195] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1251.946743] ? fput+0x130/0x1a0 [ 1251.950029] ? do_fast_syscall_32+0x150/0xfb2 [ 1251.954546] ? do_fast_syscall_32+0x150/0xfb2 [ 1251.959049] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1251.963652] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1251.967988] __ia32_compat_sys_ioctl+0x20e/0x630 [ 1251.972770] do_fast_syscall_32+0x34d/0xfb2 [ 1251.977110] ? do_int80_syscall_32+0x890/0x890 [ 1251.981706] ? entry_SYSENTER_compat+0x68/0x7f [ 1251.986303] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1251.991328] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1251.996188] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1252.001043] ? trace_hardirqs_on_caller+0x310/0x310 [ 1252.006075] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1252.011104] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1252.016151] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1252.021012] entry_SYSENTER_compat+0x70/0x7f [ 1252.025424] RIP: 0023:0xf7ff6a29 [ 1252.028800] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1252.047709] RSP: 002b:00000000f5ff20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 1252.055423] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000000ae80 [ 1252.062717] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1252.069996] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1252.077271] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1252.084542] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:48:30 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6800000000000000]}, 0x48) 14:48:30 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e6174000000000000000000000000000300", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1252.108724] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:48:30 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x0, 0xfc00000000000000}}}, 0x90) 14:48:30 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x0, 0x5]}, 0x2c) 14:48:30 executing program 5 (fault-call:6 fault-nth:42): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:48:31 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e61740000000000000000000000000200", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:48:31 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}, 0x48) [ 1252.267953] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1252.291779] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:48:31 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x0, 0x8]}, 0x2c) [ 1252.348635] FAULT_INJECTION: forcing a failure. [ 1252.348635] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1252.402470] CPU: 0 PID: 14916 Comm: syz-executor5 Not tainted 4.20.0-rc3+ #251 [ 1252.410090] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1252.419450] Call Trace: [ 1252.422080] dump_stack+0x244/0x39d [ 1252.425743] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1252.430943] ? perf_trace_lock+0x14d/0x7a0 [ 1252.435199] should_fail.cold.4+0xa/0x17 [ 1252.439306] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1252.444590] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1252.449697] ? zap_class+0x640/0x640 [ 1252.453438] ? zap_class+0x640/0x640 [ 1252.457167] ? lock_downgrade+0x900/0x900 [ 1252.461322] ? check_preemption_disabled+0x48/0x280 [ 1252.466356] ? __lock_is_held+0xb5/0x140 [ 1252.470491] ? pci_vpd_find_info_keyword+0xc0/0x200 [ 1252.475541] ? check_preemption_disabled+0x48/0x280 [ 1252.480595] ? lock_release+0xa00/0xa00 [ 1252.484571] ? perf_trace_sched_process_exec+0x860/0x860 [ 1252.490027] ? __lock_is_held+0xb5/0x140 [ 1252.494110] ? __might_sleep+0x95/0x190 [ 1252.498138] __alloc_pages_nodemask+0x366/0xea0 [ 1252.502831] ? lock_downgrade+0x900/0x900 [ 1252.506998] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 1252.512021] ? zap_class+0x640/0x640 [ 1252.515739] ? rcu_softirq_qs+0x20/0x20 [ 1252.519738] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1252.525284] ? check_preemption_disabled+0x48/0x280 [ 1252.530320] ? __lock_is_held+0xb5/0x140 [ 1252.534401] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1252.540118] alloc_pages_current+0x173/0x350 [ 1252.544545] __get_free_pages+0xc/0x40 [ 1252.548440] mmu_topup_memory_caches+0x217/0x470 [ 1252.553205] ? kvm_inject_realmode_interrupt+0x260/0x260 [ 1252.558671] kvm_mmu_load+0x21/0x1290 [ 1252.562489] kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1252.567427] ? kvm_vcpu_ioctl+0x1e5/0x1150 [ 1252.571685] ? kvm_arch_vcpu_runnable+0x710/0x710 [ 1252.576533] ? zap_class+0x640/0x640 [ 1252.580250] ? mark_held_locks+0x130/0x130 [ 1252.584518] ? lock_is_held_type+0x210/0x210 [ 1252.588941] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1252.594494] ? check_preemption_disabled+0x48/0x280 [ 1252.599534] ? find_held_lock+0x36/0x1c0 [ 1252.603625] ? get_task_pid+0x1ea/0x3b0 [ 1252.607625] ? lock_downgrade+0x900/0x900 [ 1252.611787] ? check_preemption_disabled+0x48/0x280 [ 1252.616815] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1252.621750] ? kasan_check_read+0x11/0x20 [ 1252.625901] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1252.631179] ? rcu_softirq_qs+0x20/0x20 [ 1252.635191] ? get_task_pid+0x211/0x3b0 [ 1252.639173] ? find_get_pid+0x270/0x270 [ 1252.643170] kvm_vcpu_ioctl+0x5c8/0x1150 [ 1252.647237] ? kvm_vcpu_ioctl+0x5c8/0x1150 [ 1252.651478] ? kvm_uevent_notify_change.part.32+0x450/0x450 [ 1252.657195] ? lock_downgrade+0x900/0x900 [ 1252.661386] ? check_preemption_disabled+0x48/0x280 [ 1252.666427] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1252.671359] ? kasan_check_read+0x11/0x20 [ 1252.675526] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1252.680805] ? rcu_softirq_qs+0x20/0x20 [ 1252.684818] ? ksys_dup3+0x680/0x680 [ 1252.688528] ? find_held_lock+0x36/0x1c0 [ 1252.692593] ? kasan_check_write+0x14/0x20 [ 1252.696830] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1252.701778] ? wait_for_completion+0x8a0/0x8a0 [ 1252.706387] ? __fget_light+0x2e9/0x430 [ 1252.710381] kvm_vcpu_compat_ioctl+0x210/0x4a0 [ 1252.714972] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1252.719295] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1252.724833] ? fput+0x130/0x1a0 [ 1252.728142] ? do_fast_syscall_32+0x150/0xfb2 [ 1252.732681] ? do_fast_syscall_32+0x150/0xfb2 [ 1252.737186] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1252.741784] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1252.746138] __ia32_compat_sys_ioctl+0x20e/0x630 [ 1252.750922] do_fast_syscall_32+0x34d/0xfb2 [ 1252.755252] ? do_int80_syscall_32+0x890/0x890 [ 1252.759840] ? entry_SYSENTER_compat+0x68/0x7f [ 1252.764446] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1252.769483] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1252.774330] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1252.779183] ? trace_hardirqs_on_caller+0x310/0x310 [ 1252.784221] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1252.789244] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1252.794288] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1252.799168] entry_SYSENTER_compat+0x70/0x7f [ 1252.803586] RIP: 0023:0xf7ff6a29 [ 1252.806963] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1252.825886] RSP: 002b:00000000f5ff20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 1252.833593] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000000ae80 [ 1252.840902] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 14:48:31 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x0, 0xff00000000000000}}}, 0x90) [ 1252.848205] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1252.855480] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1252.862757] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:48:31 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}, 0x48) [ 1252.907478] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:48:31 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x80, 0x8000) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f00000002c0), &(0x7f0000000300)=0x4) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r2}}, 0x10) r3 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x2, 0x2) connect$inet(r3, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x880, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r4, 0x84, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) 14:48:31 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e6174000000000000000000000000000000007fffffff00", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:48:31 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x0, 0x400000000000000]}, 0x2c) 14:48:31 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}, 0x48) 14:48:31 executing program 5 (fault-call:6 fault-nth:43): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1253.062061] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:48:31 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x0, 0x2ded}}}, 0x90) 14:48:31 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1253.108836] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:48:31 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x2000, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x440, 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SG_SCSI_RESET(r1, 0x2284, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x803, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r3}}, 0x10) [ 1253.178772] FAULT_INJECTION: forcing a failure. [ 1253.178772] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1253.205024] CPU: 1 PID: 14962 Comm: syz-executor5 Not tainted 4.20.0-rc3+ #251 [ 1253.212406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1253.221764] Call Trace: [ 1253.224365] dump_stack+0x244/0x39d [ 1253.228019] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1253.233229] ? perf_trace_lock+0x14d/0x7a0 [ 1253.233349] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1253.237511] should_fail.cold.4+0xa/0x17 [ 1253.237527] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1253.237545] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1253.237567] ? zap_class+0x640/0x640 [ 1253.249542] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1253.250055] ? zap_class+0x640/0x640 [ 1253.276258] ? lock_downgrade+0x900/0x900 [ 1253.276276] ? check_preemption_disabled+0x48/0x280 [ 1253.276299] ? __lock_is_held+0xb5/0x140 [ 1253.285447] ? check_preemption_disabled+0x48/0x280 [ 1253.285466] ? lock_release+0xa00/0xa00 [ 1253.285482] ? perf_trace_sched_process_exec+0x860/0x860 [ 1253.285498] ? __lock_is_held+0xb5/0x140 [ 1253.285518] ? __might_sleep+0x95/0x190 [ 1253.285538] __alloc_pages_nodemask+0x366/0xea0 [ 1253.294604] ? lock_downgrade+0x900/0x900 [ 1253.294646] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 1253.294663] ? zap_class+0x640/0x640 [ 1253.294691] ? rcu_softirq_qs+0x20/0x20 [ 1253.294710] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1253.294743] ? check_preemption_disabled+0x48/0x280 [ 1253.304183] ? __lock_is_held+0xb5/0x140 [ 1253.304241] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1253.304267] alloc_pages_current+0x173/0x350 [ 1253.358429] __get_free_pages+0xc/0x40 [ 1253.362334] mmu_topup_memory_caches+0x217/0x470 [ 1253.367108] ? kvm_inject_realmode_interrupt+0x260/0x260 [ 1253.372566] kvm_mmu_load+0x21/0x1290 [ 1253.376381] kvm_arch_vcpu_ioctl_run+0x287f/0x72a0 [ 1253.381332] ? kvm_vcpu_ioctl+0x1e5/0x1150 [ 1253.385595] ? kvm_arch_vcpu_runnable+0x710/0x710 [ 1253.390463] ? zap_class+0x640/0x640 [ 1253.394177] ? mark_held_locks+0x130/0x130 [ 1253.398416] ? lock_is_held_type+0x210/0x210 [ 1253.402836] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1253.408390] ? check_preemption_disabled+0x48/0x280 [ 1253.413411] ? find_held_lock+0x36/0x1c0 [ 1253.417481] ? get_task_pid+0x1ea/0x3b0 [ 1253.421456] ? lock_downgrade+0x900/0x900 [ 1253.425604] ? check_preemption_disabled+0x48/0x280 [ 1253.430646] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1253.435580] ? kasan_check_read+0x11/0x20 [ 1253.439727] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1253.445001] ? rcu_softirq_qs+0x20/0x20 [ 1253.449015] ? get_task_pid+0x211/0x3b0 [ 1253.452989] ? find_get_pid+0x270/0x270 [ 1253.456977] kvm_vcpu_ioctl+0x5c8/0x1150 [ 1253.461069] ? kvm_vcpu_ioctl+0x5c8/0x1150 [ 1253.465312] ? kvm_uevent_notify_change.part.32+0x450/0x450 [ 1253.471026] ? lock_downgrade+0x900/0x900 [ 1253.475175] ? check_preemption_disabled+0x48/0x280 [ 1253.480211] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1253.485142] ? kasan_check_read+0x11/0x20 [ 1253.489315] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1253.494590] ? rcu_softirq_qs+0x20/0x20 [ 1253.498587] ? ksys_dup3+0x680/0x680 [ 1253.502300] ? find_held_lock+0x36/0x1c0 [ 1253.506391] ? kasan_check_write+0x14/0x20 [ 1253.510634] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1253.515591] ? wait_for_completion+0x8a0/0x8a0 [ 1253.520234] ? __fget_light+0x2e9/0x430 [ 1253.524216] kvm_vcpu_compat_ioctl+0x210/0x4a0 [ 1253.528805] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1253.533129] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1253.538681] ? fput+0x130/0x1a0 [ 1253.542463] ? do_fast_syscall_32+0x150/0xfb2 [ 1253.546957] ? do_fast_syscall_32+0x150/0xfb2 [ 1253.551485] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1253.556070] ? kvm_vcpu_ioctl+0x1150/0x1150 [ 1253.560390] __ia32_compat_sys_ioctl+0x20e/0x630 [ 1253.565151] do_fast_syscall_32+0x34d/0xfb2 [ 1253.569479] ? do_int80_syscall_32+0x890/0x890 [ 1253.574100] ? entry_SYSENTER_compat+0x68/0x7f [ 1253.578688] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1253.583704] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1253.588549] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1253.593391] ? trace_hardirqs_on_caller+0x310/0x310 [ 1253.598411] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1253.603428] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1253.608457] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1253.613313] entry_SYSENTER_compat+0x70/0x7f [ 1253.617717] RIP: 0023:0xf7ff6a29 [ 1253.621084] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1253.640026] RSP: 002b:00000000f5ff20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 1253.647735] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000000ae80 [ 1253.654999] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1253.662268] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1253.669553] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 14:48:32 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:48:32 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7300]}, 0x48) 14:48:32 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e6174000000000000000000000000000000000000000300", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:48:32 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0xed2d]}}}}, 0x90) [ 1253.676818] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1253.692985] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:48:32 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x0, 0xb000000]}, 0x2c) 14:48:32 executing program 5 (fault-call:6 fault-nth:44): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:48:32 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x71]}, 0x48) 14:48:32 executing program 4: prctl$PR_CAP_AMBIENT(0x2f, 0x6, 0x1) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x400000, 0x0) ioctl$VIDIOC_G_JPEGCOMP(r0, 0x808c563d, &(0x7f0000000040)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0xfffffffffffffff9, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r2}}, 0x10) [ 1253.800106] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:48:32 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e61740000000000000000000000000000000600", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1253.863753] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:48:32 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0xfc00]}}}}, 0x90) 14:48:32 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x63000000]}, 0x48) 14:48:32 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x0, 0x40000000]}, 0x2c) 14:48:32 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) [ 1253.953116] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:48:32 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x88000, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) ioctl$TUNGETFILTER(r1, 0x800854db, &(0x7f0000000340)=""/122) rt_sigtimedwait(&(0x7f00000000c0)={0x7ff}, &(0x7f0000000100), &(0x7f0000000280), 0x8) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8}, 0x10) 14:48:32 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:48:32 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e6174000000000000000000000000000000000000000500", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:48:32 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}, 0x48) 14:48:32 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x0, 0x900]}, 0x2c) 14:48:32 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0xff00]}}}}, 0x90) 14:48:32 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x55381c0000000000]}, 0x48) 14:48:32 executing program 4: syz_open_dev$usbmon(&(0x7f0000003400)='/dev/usbmon#\x00', 0x7, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x9, 0x10002) sendmmsg$inet_sctp(r1, &(0x7f0000003580)=[{&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x9, @empty, 0x200}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000480)="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", 0xff}, {&(0x7f0000000580)="5e726f067d3b95388504d10dcf47ace1d54908338a48f83629938fc9db14f5e3727cd94f7d8fb99b10f766804da6b90feb0cb4f343ec83af1d85e02604f8336973ba35945c037243751a392016b92e968dbacf145020b83d7ef73d643c83f14a9315a9a9d3245c6a5e27a70b6bc99b1d5a74b24b815dc4379b2d1fcf837953a8d92bca250b0003649d146b51e71e0adb16fed3e8f61b6f21b69256e04d189af96a1b10bfd5b1c9dc711a389be934c065056ef48e1dc8548339b61d36b53164d9b1f12557f94865a7e63e862122334c32bc804cb6f3d2f91dcf9acb1f65018161fa357c90ec84603ed340181ae4ef50e97d", 0xf1}, {&(0x7f0000000680)="3f07a06f845639d5e35872d2bb38e9a571903d065a6c7f90fb7905cacc6570819881cdfaafaa93cf6a2f53c81085b1aa234f57fbf00c743a37496542daaf8e15ee4ec233d3350eadced50b7f837546f698dec71be6c9c21271365e0dd14b3b81fc47a59b0773f2f01ff5039764f1c5d29ecefed959296dfa9b5b90637829e8610ad4179f031796d1378efcd64bebedd0b1c9ec6baaaf706438b37a239b3c92b3b8f102ac6e92777d1030fd5bd86cc70a7b80d8e4e483ab9e6173eb7a373a48c1f7992054287a50", 0xc7}, {&(0x7f0000000780)="092f1d7ca5cc1858a593b40f25b7127092a17b29645d8c5a4d7a63cde00a36ec5e0ab2c7019d1fc78ef25f2065646b7048907f2edb95253fb11dd71cb04f4d862b3ce47ba53dec54a053725d640111ff969bee890b322aec8a21e437321996eda480e8089d63dbf12798753b924f3d9d4cde2af83265285e729a22aad4a43d6257362eaf4afd95c2b5e3cef1d499d2a2580761216d68761e2c31acbc3dd7556b27bd804152b9bc91802ba0d981c138ccd6d8e16c25501a9605286de8f3490e913e02df527966f1c37027976a97e477f09de8e3ff", 0xd4}, {&(0x7f0000000880)="347909f08ad6755d6b1deeded1d0eeb62b3477c7a7b38d373fc78a16a781172b34bd57db22e7e72153bd7e8fe1e41be654047e7ccf86bb6141f163a3d0c72729dc8f41c0d4dfa83165196ccd454e705e8fbfeb8ecf1ec72941c7740986aff7b88ee84584b500b27d0569b2ac8feeb047ee1b23370fb799830eec30abd90ac30641d7d90a9093193375d8478d13e1057a8f9370606a59554de21f610134bf9135d40ef733405bf850bffe4614a7881fea899d46db3ac4b9938e4cd48a", 0xbc}, {&(0x7f0000000940)="0535323a3908c6b8f24574143f4ac6def8b324869e2c4d38505a36f422f0c2eb3a8a8c2fd533a8ecf08b95e65e921749a07291f534e2232b9273d319b26d6767b5b3f7435da61766b98370215d2af5770f844f5fd3b29c47acbb79ef3a1953cd365cc63cebb998d3823ad62b7cdb7a1fe6290e1781491c8342b2b635a87742eef0fdf4089512a1bd4a5e", 0x8a}, {&(0x7f0000000a00)="91a079f0154739f03139175cac89b5a860f90761603c2e7d054c2ef7269ca0e1d0902b779173cdc82f546226687fa0edf551e54a6743439e87a75e6e8c3d09ac50a5221babd48ce93048a689c6175471f2716e60c809f63e40758f41abecd22802d1de58c3c76e1798a5c66998507d75ef3cad5e9ba674628b8a123fbfca304f2f3d64dea589a5979d09d8b788e1639e4b7df0ca82d409bed046e325f5db1efdc0539edc6223016a6883e6893d6abfde91f840a7120db39f0986618ee9aa02c8fd6bfc2a6a96c634323fea08128ad242cb926c953cb6fc1b108af2b3d479f9308cd20f5fb68767156d7ad0a05913b797a22b95b5eb517b0075922a1581b5968722de33b260258c722cf719aee746fc3c2ec25dad6a1f38c4c6a796837a9a6786794faf3296d803d63193836dbeb1b34762e8bb5f35e94ff0b01775b5e3e70e82d110373a4ee5bf132443089f5ff0e1d97477cfffabec9560c8d9790ba332e49abf62cffd1fb398c55c079fd10920f658d8fa8a6d41084b23184b23cbd24bfc0d63a0849c7abfde8319250d202bf075095af243a5b67f93362bb73d4e90d06e777f51f87f5df33574172693c54556dd52bd528873eb5a5642c660d4a588837f6667b0e3c94558e8ee64c21aefdabd3401408770325da5d0cefbea312f7d27ca1d09aa8a1fbac354296949da4de9c99ce9f3770d9aebe55c9bbe596b5c353f714aafebcb0747e1855e23a0249ee89a6704ef8a93e6aaa383328a93b09d1f09a42732a6d2e2fdc9f2eb610e5352fc69d480d947850cf9d3c4bd6e0516be44e92e8ec281cfe46e4c6a980d3459276c199086c4c001342f577bd2b5e28d66b89c40737aed68e447e5dcc79adf35259558db4593c6c4303a4d319e128bfec56ea901c7e803721ce10fd17b777a718b4a7338f15e49eaebdfbe5d662b77939a5e359dc6af7c0eee7a4368c37ed1410365e44160e9edb1c089543175e9a7683fb2187fe0249caa4c3a5972efe78cc96df506f86fa3140e7f70b9ba73787602d9ba0a0d633ea46616bb023c6ed8d4a2ba10e1c6159afa740df4c381256f4c6ecf2907c65c3c915470bded50c41ea4e3a8c6f51e0243ef93de14fb818ee4842e0e48ea636470ebb4fd7d70d8b571759cc327f24c6fb99e3c0e98fae5037553c128cbf59a6153e9a63b9360e831383fa56fd1fc80d0ba5737bb36ea4cdf2b3849dbdd03a1b264f772615abbc9a7c9cf9175adb5d86e35d79bd20480a9a26e3063b0c0fcdf549442f95b083e23623196f9bc7721f163afa463a70530008293ed30557359f50a02958339d19fd181aa3317f38b3f0e113d7e7cb9da0fa4309cf7dde4354a7e01c3b9ebd173221a8e7c8879715fa97057daaf09ec55867d8a3a0a589cb8f2135c0f27b1883e4f3dd49886972ec930146756824a1d954f3867251522328b7f584566927ad2012937994b0212b426065a83afc5043fca142f1625f2496c2c455b85b326b9d836fde9e551fe7409cc7deca3ece11e11a34e3fd49fa3a519ebf10f551a44bef6d1ec234e4c50a1aaf167df8dd960839121f0fba78ba39bdbaf42472fbc865e7e9cbb48708050d732754407903cf7de1d05dded543b7a6cb17e52dc0b1508ba989bf76b0bb0c2825f19957db89b194ff22eccfb926848543da5a5b0b3e47f89d1f46fc80db7ec159c6e03e0baca03cab2904c718764379ad08fcbb289ffa663c39eb6d63e10d21d723c108f11c888e9261fa5c02d1a7a4ee81b6070595a4ccbeafc2602f405ab96a210f1e471a5f91291469bb5684c2c20f56366f6c4e46470c460fe13b73866188717cde0413318520427339f2141b341c5cca5e77e1f59123f993c0317a3ef603f7225b4ff9ac1a52992f170625c53d72e13d9e02b4752f7da14dfbc18a8415eb6fab107a9508e51b3ba5312939bbb20cbb2b7c41c1f2dd0417e71b51a4b6f4c62d1ce458a1f4f65737a1e4a2df4af5e201dd8a9787cf1f55c8dde925fcad73e93a3cac295a95117529380fae15f72ea4d55b4f6d0a24155e35317fe33d10eb8253a26766b0b1c3abfbb414ff44500c7f2a010b644b23d65246d5af43b56f5ad4885683ae8619a7868434859456e7382de6f1c652354c1e4f1644308f1c31337c5090dc31ffdbef4d01bfca995e2360009fc06fbe7072933e331181d5f9c641fac3472783443601d4ad4042eb0af164b4ed296cea3fa1fe9c62642c11baabb25a16e3cfdc12d294667c516c73e22fb8c18318681c4264c4ae478cfc609e8f381a05f284137ad91708d294d47e22dcb74e93553f76e3cca6153dcf2ed5d95ad6f46d20c3b73e2236d9b55ae88db0d95db78a72c54f8b1d8289b7064049c2b69b82a9d097b95599b0398aacdb332036ff12985b220dcda6748e83fb7cf4731001ddbb43441d03026d376d34fbe89d76cea6768815632f2699ad77b04b1cf441c333d36a8a1f33c915b6b025bae2fb5c3a62b9a62734ff11b33145faf530a07f0d29c73ecd4013da4b412be5fd5703a1751dd6bbac1a89f878fe840e4096082f7d36f0ddcc0c6ead1dbc330a3a081973635af77e7fb77daa624bb01ab423e82cc88885f61a8972ce445096be66fdc96f9a34101df96580df814428ec70bcdeab99e9c0a15f826be39de917f2e37133509e9e50755ed269b1d56d08b3d047f4846528cb615942b868ece89867b132f11d7733bebb98b5bcdf46206d759c62bca6dd44e9e5c2cefba5701ba8de1c660ef0397cc047e35c3e85175177867e55b746125ecdb8c5c706b2c1a023c514a6a0251cbcf93795060fd016752e888690af924cebb36ae0c758257dd15f5c631a67ea23d5015e0201ee431ede84995bb7806f4564af55cf81ca0086dc7955990b27cf13e28506abc77439287082abc93a67ef23d8b03e125ccc4d9474b2a8fd84f604aea7380c321730450f6491d24def777447fbb17b1d05c12530e67045bf0b1b205aaf7a4c485fd5910d6a94c73d832efcdbead4ec5fe941601c92f3e375ced03eac39aa305fdff4ff11d0fa99d8ed37855b51e577f8a3087b8682ad5baedb3969495252285b98f4a7055f4cb4897beea3778e278e97ab985135c281c9f97e826568606d41f21523b043b7a8954eaaf5471a4f6f446b5e25558de9f65bf4a1327e94b5b3fd2fb983acd7ff7f429afe01871979ddccfec32846b9cbd017063779fd49c76e88aa7bd4eaaf34d79fa625d0f36cdda5a917679b9e8ca98b6fcc7bee8f71ddcfd1539d284e9f0ad7e64a0c2b299ccf35c923aed9d16085a57e8466b136859a60c5a1317365fb0c24fdc5e1c6c9487211b21b75d045fbbf9a5cc5394ba1d701a1d8a00c17746676d175765f7a185a11ee479c5c2a10e23940921e4124a41aa2967106d9e1ba5ea09144797dee5d65ad07764cce7d12bb54db24a1f260aad042d0553f765d6ab746ad517f96f7f1e1cf487cb1de5739079c1db3a242db78d787ac10e4188b19a55eaef276c81a1c4f3901ccc46df8c1a95bba9c16720b93d56ab4ce16c5000ab296adc693f935a7a750271d4fd8127095605730858c0b78bad8357672bb927e7727416c79c2ee474233bd3147961145064802e3f5a5260a702d2588f555eca2e0042009c583c1f0ee3f8695986a4fe9feb2dffc8cea3137e69606cadf338ef0569f0e3c1f23f8fe124905519d0956f1374a6898183dcbfa9e49d013b3f9b8ff248058e604559881067657715a7a1c9e50dfcc7a709e2e9e0adf288a1f0085529164d519dc7630488ccae0b8ddc327762f11598ec97f829cf49da9498d7d038c875d2719141966a8a681bded6af09b8e51378c5c6c9ab742a16c0b90cc976f5493ac535b36c14fb753bc73fc0a357897bca94224c156f6c655f979619cc96d0aa293f583795df756f5bae2ad712f30869d6fe25c91cd527ef9f98872a6448f27dfd214e0ac643f7306e266dd121b0cd830f8f13aeb0c2856b7af75bf467b56550cbeed519efafc4049ef7180d72aab7a9ce65014aaf7f266a6923cb64f2c0717d97e056aea8e715ab1c462f58e077a38bc26a61473992142c580c1afcd61e406261eda0ecde93138c833e2e77b4f984598afe01561e2e51a6ed647bb0e82c8aba928c606869bc7cb6d30984c28f8e1f5d836e369708dacc5e2ed9081ea51392282541f1f608038cb0f064fc4bf5db30f4c11a9fc525fbb4daa485a6df9827501f532ad02bbd6a301649fb397fcf6a8419de43e719c5b755a59fa2d7ad5ebefd7484dedcba2bfa45c735d6fb63019dc286f7dc8a775e9f8d799c6101223ce99f7dd3ab161e399cf343e42664a510d7d86c3ed85c72387dd170ab2f35ae59d34a226effb77f2f528779fb97c4a1d3f3d0fb0b74af3d39a8ed1bb0ebd9855d7356e013aace40dd09f99b6ddaf7c9e61ac9c8830be8af6f6073c22f73ae5a12075f15ffd932fd761d0637672b20945deb6ea5e3902dfb3e3e3a165fdcce83d67f28849c8b9a5a923e3c359e56be0254e6cc76e792542f0c7d3be5163fb777fa7e93894e673029d798bcf0ee84f2d9b4142706cfafc275d3c7ad714df1a03ce784ce78f94f7be51fad0c1b401b9b4d81610c5e1b1bd2d90da74bde08d19c2a8824949b662fe1af7cca3f2154aa30b4e0d521ee891dcb73b354c98fa2ca6ed33439663859696dcb0ec829f5947b38b12bf4cfb2f69972dfcaaec70a049d322d1b06211231748cc98633f30c37eaefd805e34e15b6904cccee9cb7e61092b09038a49df93b64ac441daf1748c9dbc2eb7966dd2cdf3873eb1504f99934f5055b11d898c7ead116aef26791e1e99c45cf0bdf8b6fa41287e3bffb89812fc21f874ac33c3993b8aa1cab0243d90d78e9412e8d28f6e99dd54adab8a9a5586abbb1c2c66464563e40fd162129582c469897ef9e0956f4afaf69bbebc414fc0980c9f7f47689f46f9ba008e75430b07c6854356bde5977fba599137053f980bccb837a0b1c9fea7c843b96895d1ee88d942bb8a781170a9dc7ea8a49286efb5dc9d5c872fe472f7b14d3774005baf39e1564af642e2753f82e92c6c2a3ce7b3b5ad0d87c1322ddc6c42f4afbc410053d1d0298a01fff56198d5180dcd992af0e984d970258d2f3924a78c73463edbd0bf5b22efa2a95d6c5db0ae4aa28b4aacbfdffd519e4b0d8f557ad870948debf989a1633ea44d6a046444e2cc4d73c101e4a9fa25602f96e5c92b63547748418f364f37b1abf47ae43f5e4c5981df3c4e7fd47b4846e3ba0b8deb354d35416804f33a1cb8c8ee76f3fedaf5e89e358cbdaa0aa9f4eb4093026ac2587c2232c401c9ddeb565995919216bd9df42fdb30c7e003fd35ef07ae4125538d84fa6f2503fbe206a478103313fac90b9d16f735d9f058fa94c31d07f3ac69f82463917f2ee367eeaef79cdf6f2f0e89b24b153ab94dbfce87ddd2776cedd4e40d3dee4e91689db32e4da2f3eafa0d2d795d9cde2a268a5262c3c862f37c80a1bc0fe2e3ddfc37823b9f1e2f0be06fdcd91c305b72bdf29ec943283ff4391ead30e9fbd2fe27c29f3a4ccda4a4ad4215b4e144c7cf2c6b61c54fc764b2d10cb821fd00e27fff65083f06bb989bb288152ed2e8517c9849c981914faab5a871293dce1e7ce87d377ae91b14d7414a3f4b84e6c890b86ab4579635478b985ede017ef6bccf511a9ac8a2abe591cb7096c21104352ee5fa4e7a1f19f2d12c43e16dc221c0b2bf6bf2fccfc54d917ba5c2ff181f5fe5d0bf081e7ceabd842713cc3b1e2299bb9f637f42db3a3257f2fa3828a475b352073b72d7360", 0x1000}], 0x7, 0x0, 0x0, 0x40000}, {&(0x7f0000000100)=@in={0x2, 0x4e24, @multicast2}, 0x10, &(0x7f0000002d40)=[{&(0x7f0000001a00)="1c68f1bf94cd5fa1b49a03e74e84c4acc2eb365b34b3c15b76cd214ca8444623f722", 0x22}, {&(0x7f0000001a40)="2ef98b07b58beb2100215e04927d3dd24bb7a3cd8f8e8d1abb857c2ed657ac76dc1af889b254a507c6a9a00f7a1e1c1f5f1a8a99f45e573c54538fd87e90a75cb27f1dc0", 0x44}, {&(0x7f0000001ac0)="dbc35f4bd433efb5b6daeb910c7bb296c3aeeac087646cbcbc918bb2cc86a89092428942ccc12bfe002c2c22a59cde2fbd3af5bffed419a4ee2c7beb40b04c028c232cb5af6e3fb396955b4553531f0160384d", 0x53}, {&(0x7f0000001b40)="03aef916e1f3293e74b33b37f592f66db1034597754d91acbc0e75b61a1730219b4d953bf5755aa0d643e2bdd34b2c542a44ad739b52bd516c930dba928fa86b723bcda361e0cf53bc6f5840ba677854404065871d9e60d5044a6952b5035853a408cba711606006776d7e78c480e996a5998c5b21e7c1859f7a64eef7134eec2ea1ef25f64b7fca780b6b4132545a7c172b8a5bc5318165e4398037055941e151b3f5ed41bcf23e", 0xa8}, {&(0x7f0000001c00)="c2848b57e39a51a68bef5fe038714745beb31e52d1018079bb921670366747c946ad2e5171387b5c79c06e2ff57a4c5c6d8dd417ed1c79124ca81ee85bb9322c348522cfc9573975fd547be191333c6d45ade8dd30c12ce11bac24caefeb38155be4a7f81a3be090e0e568c6a0ec066589ac0a36ea26ff70cfa3fcf8d6262063ee70a00510398bb86231071f062b01013bd98b", 0x93}, {&(0x7f0000001cc0)="3b870062fbf6a5f35e333acc56cebf489557d9cf589ffe20b8c3325875c4a846c23563e4298fe2bcd3f6419427401b0487326661079754332b11a3f8f3246b21ecf4c27b949feff800f3d22c89a647bb1ef650f50b3490323ee1c0644fbc4b3bacf8e9fc7acc854c33bd44e3c744773d8567b748b88a", 0x76}, {&(0x7f0000001d40)="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", 0x1000}], 0x7, &(0x7f0000002d80)=[@authinfo={0x10, 0x84, 0x6, {0x6}}], 0x10, 0x40}, {&(0x7f0000002dc0)=@in={0x2, 0x4e22, @loopback}, 0x10, &(0x7f0000003100)=[{&(0x7f0000002e00)="d5473944a76bf4deaae0a4b73466987f0a0ade6ca44138010eb68725476534c65a103df8f2edc518c936708626c37b499e9ffb7a710fb3dab69de3c83546fd2007638694186503f70bc9b05cc42d6394bda4c360adb238f7", 0x58}, {&(0x7f0000002e80)="730d9d53e04a8aa544d0b3813170d006b408bc64f62b3602ff6fe757e379864b63b189bcd4e378b8868e97bbc1afa444cede7508c19b6122e96f6f3753bf5f2eef84789eea86db6ee258477a1e33f25041cc5e139b3701c67eb8493076ce5421472c390b5249f2179232d478d655adec49f41f28f05e7a95d9993a878aadc4250e0ef47bad2204d967dfe908030e588c88a9fcbc0cc9d1137c31efd06a2dfce57bc6febdf97e0c9445bd6bbca952ddb40af514b21405851d89506a49180ec34151d677e526190345686ec5c67b7ac77ecd07ba8b95a6a62d9dc2c74d9cd8815ce9a33b6ed68a2d7ee77837eeb763690f30f0", 0xf2}, {&(0x7f0000002f80)="b50b6c1272210f1cb1307cee33f52b820c7b1952b2853b1d61a5e683453ab76ecb53f18efd47fa9bc1cfbbd4a27e98f5fb25e287a2c0bde6f44ac28bbcc903914e93ebe8cee8b43c1bf4798395770202384b1dfb03407a8031a6d78bf78e7e3497c1989bfa8f20869690833598c904cee7c2d366db4bc5d690368c0555485bd1234f0c422970ac3e768d0055be91de8afa0ff3cb79152358c3a828e13e60d7b6bb4987fb", 0xa4}, {&(0x7f0000003040)="ba73035a2292b316b0da230f2ca15bcfb8477d2eb95fa437874178874908e55b95ce541478eb51cd3fcceb79992f74988297d1198c80b3da0c3d50b2e1548830e4ee966c8e85009c547f2f782428a2dff74cebea7781d8265d28e1bc0d0be97afc6a22594eaf9c58acebee4f137d6600bafd55e8b155cb75358ceae8bd94ea8749d4e9ca2de87901127f084be47cc260c4d23255e1971dc73794f6a05397559a7383d813f8d1baea0bf4d428044dd2e0c006", 0xb2}], 0x4, &(0x7f0000003140)=[@init={0x14, 0x84, 0x0, {0xfffffffffffffffc, 0x3ff, 0x4}}, @dstaddrv6={0x1c, 0x84, 0x8, @loopback}], 0x30, 0x1}, {&(0x7f0000003180)=@in6={0xa, 0x4e23, 0x40, @loopback, 0x7}, 0x1c, &(0x7f0000003540)=[{&(0x7f00000031c0)="9ad9e5325ce2bb5cdecac7527aec1cf8633ab069e3b7f298ac59dc4a5d912a2bdf431eaae6adc3442681a64f4eb2a0a2c775d1d29e0d69c55bf36bf78179590bba1e80bcb043bb9d099814412bb961c512d4b6ff4646bcdf2881fb61fc1117b891cb5d8c3f3c7b1e168b410d662692aca914f80c0cf33266b0763fd1a569bc267a78c792ccd91f2c4f6362b15e3109779f7ec77f0e7e3ea6be283bf28e39d15357835a65011052b6d2e8740fa7b8ada60eabca5e39452e1bf81d06f4526513de198b850cfedc930803f9a75e9f1660e69a255cee91", 0xd5}, {&(0x7f00000032c0)="8433dc7b193bc04f5d50e95999e2ffa85f1fe0b93a1cb0cb03b04917825f1271e70b8bf2bc55e77164020a1923891f67560793a36bd335c4a4838e224e505b3ef256cdc98bc50918fba4b5319a898f7d8f3bd810e21f29c6256f63a5407731f9dcf08574371185077d133ba763d4996f1ba34e3d1bd0859b352bcabe323e43105c9b769f3c3aad2c3e28f70fc2ee6e9e1d8958b11d4698135c1d7e17ff42979db1caa2f2e88a35be4d05e4b0548a22ebc655aec6131ef1062f60d3", 0xbb}, {&(0x7f0000003380)="ee9818a030a17d4aaba2a714174916df97cb267202472fdfebb3a7dfb43e5498", 0x20}, {&(0x7f00000033c0)="d384c88ed630d2ceb08ac2ab242fa59dd043631c342120e9020581772036e2b8a051534a8e667464012616ebe6d9341050a8120804247de347d832", 0x3b}, {&(0x7f0000003400)}, {&(0x7f0000003440)="20f33843679448c6100de9b4b5f40905d2c287b3f63a09ba9d7d9dfc9c173810f29e9840fb391176634f281aa199f0ec628d708771d4c637dcf249bfa374a6daaaa2cf1e269214a130f4fdddbcbdebdab1b57a21d4c754b0427a043f6ed7ff2cc08e87f7a620741a5d26a1ee9b22db23eef08b59331067ef91dac7b4871bf8fad4b643477278567bc765c5c286be1f5719f0a4892cfd331fd882bebd4f7ddf314d2f3f6c29ab24b01d84a01cbdf8302de25c5adf0fbd775e135d90d3bfc04c22d3ff5947987d7f046cf37acfb7936b7de1ebee2183dae6c6", 0xd8}], 0x6, 0x0, 0x0, 0x800}], 0x4, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000240)={0x4, 0x34d, 0xfa00, {r2, 0x2}}, 0xffffffffffffff1d) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000000)={0x13, 0x10, 0xfa00, {&(0x7f0000000280), r2, 0x1}}, 0x18) [ 1254.258292] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:48:33 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) socketpair(0x11, 0x800, 0x3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={0xffffffffffffff9c, 0x10, &(0x7f00000001c0)={&(0x7f0000000140)=""/89, 0x59, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000280)={r3, 0x10, &(0x7f0000000240)={&(0x7f00000000c0)=""/67, 0x43, r4}}, 0x10) 14:48:33 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e6174000000000000000000000000000000000000000600", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:48:33 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0xfec0]}}}}, 0x90) [ 1254.337523] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:48:33 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}, 0x48) 14:48:33 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x0, 0x1300]}, 0x2c) 14:48:33 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000), 0x113, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1}}, 0x10) [ 1254.487009] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:48:33 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={"6e617400000000000000000000000000000000000000ff00", 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:48:33 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x339dd96a, 'syz1\x00'}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x3, 0x0) ioctl$KVM_SET_DEBUGREGS(r2, 0x4080aea2, &(0x7f00000000c0)={[0x6001, 0x3002, 0x7000, 0x7000], 0x1000, 0x2, 0x5}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000300)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 14:48:33 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1810]}, 0x48) [ 1254.527913] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:48:33 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x2000000]}}}}, 0x90) 14:48:33 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x4, 0x4, 0x9, 0x0, r0, 0x0, [0x305f, 0xa, 0x0, 0x0, 0x4000]}, 0x2c) 14:48:33 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r1, 0x3}}, 0x10) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf5f, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffb, 0x7, 0x169}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = gettid() ioctl$int_out(r2, 0x5462, &(0x7f0000000040)) r4 = syz_open_procfs(r3, &(0x7f0000000000)='net/dev_snmp6\x00') ioctl$EVIOCGBITKEY(r4, 0x80404521, &(0x7f0000000280)=""/240) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r5}}, 0x10) [ 1254.674900] kernel msg: ebtables bug: please report to author: Hook order must be followed 14:48:33 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x7d) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x19, 0x1, 0xc0, [0x20000100, 0x0, 0x0, 0x20000190, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}, 0x110) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0xffffffffffffffff, 0x0) 14:48:33 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0xffffff85, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0x436, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00]}, 0x48) [ 1254.807906] ================================================================== [ 1254.815547] BUG: KASAN: slab-out-of-bounds in __list_add_valid+0x8f/0xac [ 1254.822410] Read of size 8 at addr ffff888191e3e1e0 by task syz-executor4/15133 [ 1254.829873] [ 1254.831509] CPU: 1 PID: 15133 Comm: syz-executor4 Not tainted 4.20.0-rc3+ #251 [ 1254.838913] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1254.848266] Call Trace: [ 1254.850928] dump_stack+0x244/0x39d [ 1254.854570] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1254.859778] ? printk+0xa7/0xcf [ 1254.863070] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 1254.867833] ? kasan_check_read+0x11/0x20 [ 1254.871997] print_address_description.cold.7+0x9/0x1ff [ 1254.877388] kasan_report.cold.8+0x242/0x309 [ 1254.881803] ? __list_add_valid+0x8f/0xac [ 1254.885957] __asan_report_load8_noabort+0x14/0x20 [ 1254.890892] __list_add_valid+0x8f/0xac [ 1254.894887] rdma_listen+0x6dc/0x990 [ 1254.898613] ? rdma_resolve_addr+0x2870/0x2870 [ 1254.903214] ucma_listen+0x1a4/0x260 [ 1254.906937] ? ucma_notify+0x210/0x210 [ 1254.910844] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1254.916391] ? _copy_from_user+0xdf/0x150 [ 1254.920541] ? ucma_notify+0x210/0x210 [ 1254.924450] ucma_write+0x365/0x460 [ 1254.928095] ? ucma_open+0x3f0/0x3f0 [ 1254.931824] ? find_held_lock+0x36/0x1c0 [ 1254.935906] __vfs_write+0x119/0x9f0 [ 1254.939634] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 1254.944567] ? ucma_open+0x3f0/0x3f0 [ 1254.948286] ? kernel_read+0x120/0x120 [ 1254.952180] ? apparmor_path_rmdir+0x30/0x30 [ 1254.956590] ? trace_hardirqs_off_caller+0x310/0x310 [ 1254.961703] ? apparmor_file_permission+0x24/0x30 [ 1254.966552] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1254.972092] ? security_file_permission+0x1c2/0x220 [ 1254.977115] ? rw_verify_area+0x118/0x360 [ 1254.981268] vfs_write+0x1fc/0x560 [ 1254.984826] ksys_write+0x101/0x260 [ 1254.988466] ? __ia32_sys_read+0xb0/0xb0 [ 1254.992533] ? trace_hardirqs_off_caller+0x310/0x310 [ 1254.997650] __ia32_sys_write+0x71/0xb0 [ 1255.001637] do_fast_syscall_32+0x34d/0xfb2 [ 1255.005968] ? do_int80_syscall_32+0x890/0x890 [ 1255.010555] ? entry_SYSENTER_compat+0x68/0x7f [ 1255.015148] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1255.020170] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1255.025016] ? trace_hardirqs_on_caller+0x310/0x310 [ 1255.030039] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1255.035059] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 1255.041726] ? __switch_to_asm+0x40/0x70 [ 1255.045802] ? __switch_to_asm+0x34/0x70 [ 1255.049881] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1255.054769] entry_SYSENTER_compat+0x70/0x7f [ 1255.059176] RIP: 0023:0xf7fefa29 [ 1255.062579] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1255.081480] RSP: 002b:00000000f5feb0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 1255.089187] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000100 [ 1255.096455] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 0000000000000000 [ 1255.103733] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1255.110998] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1255.118279] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1255.125558] [ 1255.127181] Allocated by task 14003: [ 1255.130903] save_stack+0x43/0xd0 [ 1255.134355] kasan_kmalloc+0xc7/0xe0 [ 1255.138074] kasan_slab_alloc+0x12/0x20 [ 1255.142061] kmem_cache_alloc+0x12e/0x730 [ 1255.146210] getname_flags+0xd0/0x590 [ 1255.150010] user_path_at_empty+0x2d/0x50 [ 1255.154156] vfs_statx+0x129/0x210 [ 1255.157697] __do_sys_newstat+0x8f/0x110 [ 1255.161769] __x64_sys_newstat+0x54/0x80 [ 1255.165848] do_syscall_64+0x1b9/0x820 [ 1255.169761] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1255.174940] [ 1255.176566] Freed by task 14003: [ 1255.179935] save_stack+0x43/0xd0 [ 1255.183389] __kasan_slab_free+0x102/0x150 [ 1255.187655] kasan_slab_free+0xe/0x10 [ 1255.191491] kmem_cache_free+0x83/0x290 [ 1255.195478] putname+0xf2/0x130 [ 1255.198787] filename_lookup+0x39a/0x520 [ 1255.202852] user_path_at_empty+0x40/0x50 [ 1255.207013] vfs_statx+0x129/0x210 [ 1255.210571] __do_sys_newstat+0x8f/0x110 [ 1255.214638] __x64_sys_newstat+0x54/0x80 [ 1255.218701] do_syscall_64+0x1b9/0x820 [ 1255.222589] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1255.227769] [ 1255.229397] The buggy address belongs to the object at ffff888191e3e240 [ 1255.229397] which belongs to the cache names_cache of size 4096 [ 1255.244055] The buggy address is located 96 bytes to the left of [ 1255.244055] 4096-byte region [ffff888191e3e240, ffff888191e3f240) [ 1255.256360] The buggy address belongs to the page: [ 1255.261292] page:ffffea0006478f80 count:1 mapcount:0 mapping:ffff8881da980e00 index:0x0 compound_mapcount: 0 [ 1255.271275] flags: 0x2fffc0000010200(slab|head) [ 1255.275976] raw: 02fffc0000010200 ffffea000634f188 ffffea000629ee08 ffff8881da980e00 [ 1255.283867] raw: 0000000000000000 ffff888191e3e240 0000000100000001 0000000000000000 [ 1255.291744] page dumped because: kasan: bad access detected [ 1255.297445] [ 1255.299068] Memory state around the buggy address: 14:48:34 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x2ded0000]}}}}, 0x90) [ 1255.303994] ffff888191e3e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1255.311352] ffff888191e3e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1255.318715] >ffff888191e3e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1255.326070] ^ [ 1255.332559] ffff888191e3e200: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 1255.339919] ffff888191e3e280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1255.347334] ================================================================== [ 1255.354687] Disabling lock debugging due to kernel taint [ 1255.378440] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1255.409296] kernel msg: ebtables bug: please report to author: Hook order must be followed [ 1255.413178] Kernel panic - not syncing: panic_on_warn set ... [ 1255.423621] CPU: 1 PID: 15133 Comm: syz-executor4 Tainted: G B 4.20.0-rc3+ #251 [ 1255.432378] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1255.441727] Call Trace: [ 1255.444320] dump_stack+0x244/0x39d [ 1255.447954] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1255.453153] panic+0x2ad/0x55c [ 1255.456345] ? add_taint.cold.5+0x16/0x16 [ 1255.460553] ? preempt_schedule+0x4d/0x60 [ 1255.464707] ? ___preempt_schedule+0x16/0x18 [ 1255.469145] ? trace_hardirqs_on+0xb4/0x310 [ 1255.473470] kasan_end_report+0x47/0x4f [ 1255.477447] kasan_report.cold.8+0x76/0x309 [ 1255.481768] ? __list_add_valid+0x8f/0xac [ 1255.485933] __asan_report_load8_noabort+0x14/0x20 [ 1255.490977] __list_add_valid+0x8f/0xac [ 1255.494953] rdma_listen+0x6dc/0x990 [ 1255.498673] ? rdma_resolve_addr+0x2870/0x2870 [ 1255.503259] ucma_listen+0x1a4/0x260 [ 1255.506991] ? ucma_notify+0x210/0x210 [ 1255.510907] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1255.516452] ? _copy_from_user+0xdf/0x150 [ 1255.520617] ? ucma_notify+0x210/0x210 [ 1255.524514] ucma_write+0x365/0x460 [ 1255.528144] ? ucma_open+0x3f0/0x3f0 [ 1255.531855] ? find_held_lock+0x36/0x1c0 [ 1255.535932] __vfs_write+0x119/0x9f0 [ 1255.540123] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 1255.545056] ? ucma_open+0x3f0/0x3f0 [ 1255.548770] ? kernel_read+0x120/0x120 [ 1255.552675] ? apparmor_path_rmdir+0x30/0x30 [ 1255.557087] ? trace_hardirqs_off_caller+0x310/0x310 [ 1255.562199] ? apparmor_file_permission+0x24/0x30 [ 1255.567044] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1255.572602] ? security_file_permission+0x1c2/0x220 [ 1255.577641] ? rw_verify_area+0x118/0x360 [ 1255.581793] vfs_write+0x1fc/0x560 [ 1255.585340] ksys_write+0x101/0x260 [ 1255.588969] ? __ia32_sys_read+0xb0/0xb0 [ 1255.593057] ? trace_hardirqs_off_caller+0x310/0x310 [ 1255.598167] __ia32_sys_write+0x71/0xb0 [ 1255.602194] do_fast_syscall_32+0x34d/0xfb2 [ 1255.606545] ? do_int80_syscall_32+0x890/0x890 [ 1255.611127] ? entry_SYSENTER_compat+0x68/0x7f [ 1255.615708] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1255.620722] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1255.625566] ? trace_hardirqs_on_caller+0x310/0x310 [ 1255.630581] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1255.635599] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 1255.642268] ? __switch_to_asm+0x40/0x70 [ 1255.646329] ? __switch_to_asm+0x34/0x70 [ 1255.650395] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1255.655244] entry_SYSENTER_compat+0x70/0x7f [ 1255.659651] RIP: 0023:0xf7fefa29 [ 1255.663033] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1255.681932] RSP: 002b:00000000f5feb0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 1255.689642] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000100 [ 1255.696907] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 0000000000000000 [ 1255.704173] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1255.711435] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1255.718720] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1255.727093] Kernel Offset: disabled [ 1255.730722] Rebooting in 86400 seconds..