------------[ cut here ]------------ Illegal XDP return value 4294967274, expect packet loss! WARNING: CPU: 1 PID: 6533 at net/core/filter.c:8186 bpf_warn_invalid_xdp_action net/core/filter.c:8186 [inline] WARNING: CPU: 1 PID: 6533 at net/core/filter.c:8186 bpf_warn_invalid_xdp_action+0x6f/0x80 net/core/filter.c:8182 Modules linked in: CPU: 1 PID: 6533 Comm: syz-executor913 Not tainted 5.15.0-rc5-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:bpf_warn_invalid_xdp_action net/core/filter.c:8186 [inline] RIP: 0010:bpf_warn_invalid_xdp_action+0x6f/0x80 net/core/filter.c:8182 Code: 20 da 8c 8a 41 83 fc 04 48 c7 c6 60 da 8c 8a 48 0f 46 ee e8 e3 82 4c fa 44 89 e2 48 c7 c7 a0 da 8c 8a 48 89 ee e8 f8 ae cb 01 <0f> 0b 5b 5d 41 5c e9 c6 82 4c fa 66 0f 1f 44 00 00 41 57 41 56 49 RSP: 0018:ffffc90000dc0a58 EFLAGS: 00010282 RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 RDX: ffff88801adf0000 RSI: ffffffff815e9628 RDI: fffff520001b813d RBP: ffffffff8a8cda20 R08: 0000000000000000 R09: 0000000000000000 R10: ffffffff815e33ce R11: 0000000000000000 R12: 00000000ffffffea R13: 00000000ffffffea R14: 00000000ffffffea R15: 00000000ffffff8e FS: 0000000000000000(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fa145ad5e08 CR3: 000000006ee57000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: netif_receive_generic_xdp net/core/dev.c:4811 [inline] do_xdp_generic.part.0+0x80b/0xa00 net/core/dev.c:4859 do_xdp_generic net/core/dev.c:4854 [inline] __netif_receive_skb_core+0x11b0/0x3640 net/core/dev.c:5267 __netif_receive_skb_one_core+0xae/0x180 net/core/dev.c:5442 __netif_receive_skb+0x24/0x1b0 net/core/dev.c:5558 process_backlog+0x2a5/0x6c0 net/core/dev.c:6434 __napi_poll+0xaf/0x440 net/core/dev.c:6999 napi_poll net/core/dev.c:7066 [inline] net_rx_action+0x801/0xb40 net/core/dev.c:7153 __do_softirq+0x29b/0x9c2 kernel/softirq.c:558 invoke_softirq kernel/softirq.c:432 [inline] __irq_exit_rcu+0x123/0x180 kernel/softirq.c:636 irq_exit_rcu+0x5/0x20 kernel/softirq.c:648 sysvec_apic_timer_interrupt+0x93/0xc0 arch/x86/kernel/apic/apic.c:1097 asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:638 RIP: 0010:__raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:161 [inline] RIP: 0010:_raw_spin_unlock_irqrestore+0x38/0x70 kernel/locking/spinlock.c:194 Code: 74 24 10 e8 ba 93 20 f8 48 89 ef e8 02 0a 21 f8 81 e3 00 02 00 00 75 25 9c 58 f6 c4 02 75 2d 48 85 db 74 01 fb bf 01 00 00 00 43 f5 13 f8 65 8b 05 3c 4c c6 76 85 c0 74 0a 5b 5d c3 e8 50 6b RSP: 0018:ffffc90002baf8d8 EFLAGS: 00000206 RAX: 0000000000000002 RBX: 0000000000000200 RCX: 1ffffffff1fa4f32 RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000001 RBP: ffff888010c7d050 R08: 0000000000000001 R09: ffffffff8fd0ea27 R10: 0000000000000001 R11: 0000000000000000 R12: dffffc0000000000 R13: 000000000000000f R14: ffff8880b9d2cd90 R15: ffff888010c7d000 spin_unlock_irqrestore include/linux/spinlock.h:418 [inline] unlock_page_lruvec_irqrestore include/linux/memcontrol.h:1516 [inline] pagevec_lru_move_fn+0x39c/0x610 mm/swap.c:202 activate_page mm/swap.c:338 [inline] mark_page_accessed+0x1594/0x19d0 mm/swap.c:422 zap_pte_range mm/memory.c:1359 [inline] zap_pmd_range mm/memory.c:1481 [inline] zap_pud_range mm/memory.c:1510 [inline] zap_p4d_range mm/memory.c:1531 [inline] unmap_page_range+0xd45/0x2a10 mm/memory.c:1552 unmap_single_vma+0x198/0x310 mm/memory.c:1597 unmap_vmas+0x16d/0x2f0 mm/memory.c:1629 exit_mmap+0x1d0/0x630 mm/mmap.c:3171 __mmput+0x122/0x4b0 kernel/fork.c:1115 mmput+0x58/0x60 kernel/fork.c:1136 exit_mm kernel/exit.c:501 [inline] do_exit+0xabc/0x2a30 kernel/exit.c:812 do_group_exit+0x125/0x310 kernel/exit.c:922 __do_sys_exit_group kernel/exit.c:933 [inline] __se_sys_exit_group kernel/exit.c:931 [inline] __x64_sys_exit_group+0x3a/0x50 kernel/exit.c:931 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7fa145a92ab9 Code: Unable to access opcode bytes at RIP 0x7fa145a92a8f. RSP: 002b:00007ffc79edc418 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 RAX: ffffffffffffffda RBX: 00007fa145b073f0 RCX: 00007fa145a92ab9 RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000001 RBP: 0000000000000001 R08: ffffffffffffffc0 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa145b073f0 R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000001 ---------------- Code disassembly (best guess): 0: 74 24 je 0x26 2: 10 e8 adc %ch,%al 4: ba 93 20 f8 48 mov $0x48f82093,%edx 9: 89 ef mov %ebp,%edi b: e8 02 0a 21 f8 callq 0xf8210a12 10: 81 e3 00 02 00 00 and $0x200,%ebx 16: 75 25 jne 0x3d 18: 9c pushfq 19: 58 pop %rax 1a: f6 c4 02 test $0x2,%ah 1d: 75 2d jne 0x4c 1f: 48 85 db test %rbx,%rbx 22: 74 01 je 0x25 24: fb sti 25: bf 01 00 00 00 mov $0x1,%edi * 2a: e8 43 f5 13 f8 callq 0xf813f572 <-- trapping instruction 2f: 65 8b 05 3c 4c c6 76 mov %gs:0x76c64c3c(%rip),%eax # 0x76c64c72 36: 85 c0 test %eax,%eax 38: 74 0a je 0x44 3a: 5b pop %rbx 3b: 5d pop %rbp 3c: c3 retq 3d: e8 .byte 0xe8 3e: 50 push %rax 3f: 6b .byte 0x6b