jump_label: Fatal kernel bug, unexpected op at ipt_do_table+0x3ed/0x1aa0 net/ipv4/netfilter/ip_tables.c:263 [ffffffff897b086d] (e9 ce 0b 00 00 != 0f 1f 44 00 00)) size:5 type:1 ------------[ cut here ]------------ kernel BUG at arch/x86/kernel/jump_label.c:73! Oops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN NOPTI CPU: 1 PID: 6603 Comm: syz.3.316 Not tainted 6.10.0-syzkaller-11185-g2c9b3512402e #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 RIP: 0010:__jump_label_patch+0x378/0x400 arch/x86/kernel/jump_label.c:73 Code: 48 c7 c3 60 e0 ef 92 e8 e6 a2 5a 00 45 89 e1 49 89 d8 4c 89 f1 41 55 4c 89 f2 4c 89 f6 48 c7 c7 a0 38 26 8b e8 89 01 3b 00 90 <0f> 0b e8 c1 a2 5a 00 90 0f 0b e8 b9 a2 5a 00 90 0f 0b 48 c7 c7 b0 RSP: 0018:ffffc9000b107708 EFLAGS: 00010286 RAX: 000000000000008d RBX: ffffffff8b266f2a RCX: ffffffff816c0a39 RDX: 0000000000000000 RSI: ffffffff816c9e16 RDI: 0000000000000005 RBP: ffffc9000b107750 R08: 0000000000000005 R09: 0000000000000000 R10: 0000000080000000 R11: 0000000000000000 R12: 0000000000000005 R13: 0000000000000001 R14: ffffffff897b086d R15: 00000000000000da FS: 00007f36fc1206c0(0000) GS:ffff8880b9300000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f3f076b4290 CR3: 000000002ce62000 CR4: 0000000000350ef0 Call Trace: arch_jump_label_transform_queue+0x7e/0x120 arch/x86/kernel/jump_label.c:137 __jump_label_update+0x125/0x420 kernel/jump_label.c:493 jump_label_update+0x1d7/0x400 kernel/jump_label.c:900 __static_key_slow_dec_cpuslocked.part.0+0x4e/0x90 kernel/jump_label.c:293 __static_key_slow_dec_cpuslocked kernel/jump_label.c:288 [inline] __static_key_slow_dec kernel/jump_label.c:301 [inline] static_key_slow_dec+0x7c/0xc0 kernel/jump_label.c:316 cleanup_entry+0x299/0x3a0 net/ipv6/netfilter/ip6_tables.c:669 translate_table+0xddd/0x17b0 net/ipv6/netfilter/ip6_tables.c:744 do_replace net/ipv6/netfilter/ip6_tables.c:1154 [inline] do_ip6t_set_ctl+0x605/0xc40 net/ipv6/netfilter/ip6_tables.c:1644 nf_setsockopt+0x8d/0xf0 net/netfilter/nf_sockopt.c:101 ipv6_setsockopt+0x133/0x1a0 net/ipv6/ipv6_sockglue.c:998 udpv6_setsockopt+0x7d/0xd0 net/ipv6/udp.c:1702 do_sock_setsockopt+0x225/0x480 net/socket.c:2324 __sys_setsockopt+0x1a4/0x270 net/socket.c:2347 __do_sys_setsockopt net/socket.c:2356 [inline] __se_sys_setsockopt net/socket.c:2353 [inline] __x64_sys_setsockopt+0xbd/0x160 net/socket.c:2353 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f36fb375b59 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f36fc120048 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffda RBX: 00007f36fb506038 RCX: 00007f36fb375b59 RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000003 RBP: 00007f36fb3e4e5d R08: 0000000000000420 R09: 0000000000000000 R10: 0000000020000440 R11: 0000000000000246 R12: 0000000000000000 R13: 000000000000006e R14: 00007f36fb506038 R15: 00007ffefc36c008 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:__jump_label_patch+0x378/0x400 arch/x86/kernel/jump_label.c:73 Code: 48 c7 c3 60 e0 ef 92 e8 e6 a2 5a 00 45 89 e1 49 89 d8 4c 89 f1 41 55 4c 89 f2 4c 89 f6 48 c7 c7 a0 38 26 8b e8 89 01 3b 00 90 <0f> 0b e8 c1 a2 5a 00 90 0f 0b e8 b9 a2 5a 00 90 0f 0b 48 c7 c7 b0 RSP: 0018:ffffc9000b107708 EFLAGS: 00010286 RAX: 000000000000008d RBX: ffffffff8b266f2a RCX: ffffffff816c0a39 RDX: 0000000000000000 RSI: ffffffff816c9e16 RDI: 0000000000000005 RBP: ffffc9000b107750 R08: 0000000000000005 R09: 0000000000000000 R10: 0000000080000000 R11: 0000000000000000 R12: 0000000000000005 R13: 0000000000000001 R14: ffffffff897b086d R15: 00000000000000da FS: 00007f36fc1206c0(0000) GS:ffff8880b9200000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f73cd3020b0 CR3: 000000002ce62000 CR4: 0000000000350ef0