------------[ cut here ]------------
Illegal XDP return value 4294967274, expect packet loss!
WARNING: CPU: 1 PID: 6533 at net/core/filter.c:8186 bpf_warn_invalid_xdp_action net/core/filter.c:8186 [inline]
WARNING: CPU: 1 PID: 6533 at net/core/filter.c:8186 bpf_warn_invalid_xdp_action+0x6f/0x80 net/core/filter.c:8182
Modules linked in:
CPU: 1 PID: 6533 Comm: syz-executor913 Not tainted 5.15.0-rc5-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:bpf_warn_invalid_xdp_action net/core/filter.c:8186 [inline]
RIP: 0010:bpf_warn_invalid_xdp_action+0x6f/0x80 net/core/filter.c:8182
Code: 20 da 8c 8a 41 83 fc 04 48 c7 c6 60 da 8c 8a 48 0f 46 ee e8 e3 82 4c fa 44 89 e2 48 c7 c7 a0 da 8c 8a 48 89 ee e8 f8 ae cb 01 <0f> 0b 5b 5d 41 5c e9 c6 82 4c fa 66 0f 1f 44 00 00 41 57 41 56 49
RSP: 0018:ffffc90000dc0a58 EFLAGS: 00010282
RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000
RDX: ffff88801adf0000 RSI: ffffffff815e9628 RDI: fffff520001b813d
RBP: ffffffff8a8cda20 R08: 0000000000000000 R09: 0000000000000000
R10: ffffffff815e33ce R11: 0000000000000000 R12: 00000000ffffffea
R13: 00000000ffffffea R14: 00000000ffffffea R15: 00000000ffffff8e
FS: 0000000000000000(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fa145ad5e08 CR3: 000000006ee57000 CR4: 00000000003506e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
netif_receive_generic_xdp net/core/dev.c:4811 [inline]
do_xdp_generic.part.0+0x80b/0xa00 net/core/dev.c:4859
do_xdp_generic net/core/dev.c:4854 [inline]
__netif_receive_skb_core+0x11b0/0x3640 net/core/dev.c:5267
__netif_receive_skb_one_core+0xae/0x180 net/core/dev.c:5442
__netif_receive_skb+0x24/0x1b0 net/core/dev.c:5558
process_backlog+0x2a5/0x6c0 net/core/dev.c:6434
__napi_poll+0xaf/0x440 net/core/dev.c:6999
napi_poll net/core/dev.c:7066 [inline]
net_rx_action+0x801/0xb40 net/core/dev.c:7153
__do_softirq+0x29b/0x9c2 kernel/softirq.c:558
invoke_softirq kernel/softirq.c:432 [inline]
__irq_exit_rcu+0x123/0x180 kernel/softirq.c:636
irq_exit_rcu+0x5/0x20 kernel/softirq.c:648
sysvec_apic_timer_interrupt+0x93/0xc0 arch/x86/kernel/apic/apic.c:1097
asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:638
RIP: 0010:__raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:161 [inline]
RIP: 0010:_raw_spin_unlock_irqrestore+0x38/0x70 kernel/locking/spinlock.c:194
Code: 74 24 10 e8 ba 93 20 f8 48 89 ef e8 02 0a 21 f8 81 e3 00 02 00 00 75 25 9c 58 f6 c4 02 75 2d 48 85 db 74 01 fb bf 01 00 00 00 43 f5 13 f8 65 8b 05 3c 4c c6 76 85 c0 74 0a 5b 5d c3 e8 50 6b
RSP: 0018:ffffc90002baf8d8 EFLAGS: 00000206
RAX: 0000000000000002 RBX: 0000000000000200 RCX: 1ffffffff1fa4f32
RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000001
RBP: ffff888010c7d050 R08: 0000000000000001 R09: ffffffff8fd0ea27
R10: 0000000000000001 R11: 0000000000000000 R12: dffffc0000000000
R13: 000000000000000f R14: ffff8880b9d2cd90 R15: ffff888010c7d000
spin_unlock_irqrestore include/linux/spinlock.h:418 [inline]
unlock_page_lruvec_irqrestore include/linux/memcontrol.h:1516 [inline]
pagevec_lru_move_fn+0x39c/0x610 mm/swap.c:202
activate_page mm/swap.c:338 [inline]
mark_page_accessed+0x1594/0x19d0 mm/swap.c:422
zap_pte_range mm/memory.c:1359 [inline]
zap_pmd_range mm/memory.c:1481 [inline]
zap_pud_range mm/memory.c:1510 [inline]
zap_p4d_range mm/memory.c:1531 [inline]
unmap_page_range+0xd45/0x2a10 mm/memory.c:1552
unmap_single_vma+0x198/0x310 mm/memory.c:1597
unmap_vmas+0x16d/0x2f0 mm/memory.c:1629
exit_mmap+0x1d0/0x630 mm/mmap.c:3171
__mmput+0x122/0x4b0 kernel/fork.c:1115
mmput+0x58/0x60 kernel/fork.c:1136
exit_mm kernel/exit.c:501 [inline]
do_exit+0xabc/0x2a30 kernel/exit.c:812
do_group_exit+0x125/0x310 kernel/exit.c:922
__do_sys_exit_group kernel/exit.c:933 [inline]
__se_sys_exit_group kernel/exit.c:931 [inline]
__x64_sys_exit_group+0x3a/0x50 kernel/exit.c:931
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7fa145a92ab9
Code: Unable to access opcode bytes at RIP 0x7fa145a92a8f.
RSP: 002b:00007ffc79edc418 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
RAX: ffffffffffffffda RBX: 00007fa145b073f0 RCX: 00007fa145a92ab9
RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000001
RBP: 0000000000000001 R08: ffffffffffffffc0 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa145b073f0
R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000001
----------------
Code disassembly (best guess):
0: 74 24 je 0x26
2: 10 e8 adc %ch,%al
4: ba 93 20 f8 48 mov $0x48f82093,%edx
9: 89 ef mov %ebp,%edi
b: e8 02 0a 21 f8 callq 0xf8210a12
10: 81 e3 00 02 00 00 and $0x200,%ebx
16: 75 25 jne 0x3d
18: 9c pushfq
19: 58 pop %rax
1a: f6 c4 02 test $0x2,%ah
1d: 75 2d jne 0x4c
1f: 48 85 db test %rbx,%rbx
22: 74 01 je 0x25
24: fb sti
25: bf 01 00 00 00 mov $0x1,%edi
* 2a: e8 43 f5 13 f8 callq 0xf813f572 <-- trapping instruction
2f: 65 8b 05 3c 4c c6 76 mov %gs:0x76c64c3c(%rip),%eax # 0x76c64c72
36: 85 c0 test %eax,%eax
38: 74 0a je 0x44
3a: 5b pop %rbx
3b: 5d pop %rbp
3c: c3 retq
3d: e8 .byte 0xe8
3e: 50 push %rax
3f: 6b .byte 0x6b