------------[ cut here ]------------ WARNING: CPU: 1 PID: 6084 at mm/page_alloc.c:4402 __alloc_pages+0x308/0x698 mm/page_alloc.c:4402 Modules linked in: CPU: 1 PID: 6084 Comm: syz-executor342 Not tainted 6.6.0-rc7-syzkaller-g8de1e7afcc1c #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 pstate: 20400005 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : __alloc_pages+0x308/0x698 mm/page_alloc.c:4402 lr : __alloc_pages+0xc8/0x698 mm/page_alloc.c:4396 sp : ffff800096bf78c0 x29: ffff800096bf79a0 x28: ffff800096bf78e0 x27: dfff800000000000 x26: ffff700012d7ef1c x25: 0000000000000000 x24: ffff800096bf7900 x23: 0000000000000000 x22: 0000000000040dc0 x21: 1ffff00012d7ef20 x20: ffff800096bf7920 x19: 0000000000000014 x18: 0000000000000000 x17: 0000000000005501 x16: ffff80008a668b40 x15: 0000000000000005 x14: 1ffff00012d7ef24 x13: 0000000000000000 x12: 0000000000000000 x11: ffff700012d7ef29 x10: 1ffff00012d7ef28 x9 : 0000000000000001 x8 : ffff8000910a2000 x7 : 0000000000000000 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000020 x2 : 0000000000000008 x1 : 0000000000000000 x0 : ffff800096bf7920 Call trace: __alloc_pages+0x308/0x698 mm/page_alloc.c:4402 __alloc_pages_node include/linux/gfp.h:237 [inline] alloc_pages_node include/linux/gfp.h:260 [inline] __kmalloc_large_node+0xbc/0x1fc mm/slab_common.c:1167 __do_kmalloc_node mm/slab_common.c:1014 [inline] __kmalloc+0x124/0x1b8 mm/slab_common.c:1039 kmalloc include/linux/slab.h:603 [inline] kzalloc include/linux/slab.h:720 [inline] input_mt_init_slots+0xc0/0x818 drivers/input/input-mt.c:50 uinput_create_device+0x3d0/0x528 drivers/input/misc/uinput.c:328 uinput_ioctl_handler+0x8b0/0x16c0 drivers/input/misc/uinput.c:904 uinput_ioctl+0x38/0x4c drivers/input/misc/uinput.c:1075 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:871 [inline] __se_sys_ioctl fs/ioctl.c:857 [inline] __arm64_sys_ioctl+0x14c/0x1c8 fs/ioctl.c:857 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:51 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:136 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:155 el0_svc+0x54/0x158 arch/arm64/kernel/entry-common.c:678 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:696 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:595 irq event stamp: 11234 hardirqs last enabled at (11233): [] kasan_quarantine_put+0x1a0/0x1c8 mm/kasan/quarantine.c:240 hardirqs last disabled at (11234): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:436 softirqs last enabled at (10562): [] softirq_handle_end kernel/softirq.c:399 [inline] softirqs last enabled at (10562): [] __do_softirq+0xac0/0xd54 kernel/softirq.c:582 softirqs last disabled at (10551): [] ____do_softirq+0x14/0x20 arch/arm64/kernel/irq.c:80 ---[ end trace 0000000000000000 ]---