------------[ cut here ]------------ WARNING: kernel/bpf/verifier.c:2742 at reg_bounds_sanity_check+0x3c0/0x428 kernel/bpf/verifier.c:2742, CPU#1: syz.0.324/5065 verifier bug: REG INVARIANTS VIOLATION (false_reg1): range bounds violation u64=[0x4000000, 0x0] s64=[0x4000000, 0x0] u32=[0x4000000, 0x0] s32=[0x4000000, 0x0] var_off=(0x0, 0x0) Modules linked in: Kernel panic - not syncing: kernel: panic_on_warn set ... CPU: 1 UID: 0 PID: 5065 Comm: syz.0.324 Not tainted syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express Call trace: [<80201a40>] (dump_backtrace) from [<80201b34>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257) r7:82290758 r6:00000000 r5:822a20bc r4:00000001 [<80201b1c>] (show_stack) from [<8021ed6c>] (__dump_stack lib/dump_stack.c:94 [inline]) [<80201b1c>] (show_stack) from [<8021ed6c>] (dump_stack_lvl+0x5c/0x70 lib/dump_stack.c:120) [<8021ed10>] (dump_stack_lvl) from [<8021ed98>] (dump_stack+0x18/0x1c lib/dump_stack.c:129) r7:82290758 r6:83eea400 r5:00000000 r4:82a7cd14 [<8021ed80>] (dump_stack) from [<802025c4>] (vpanic+0xe0/0x2e4 kernel/panic.c:490) [<802024e4>] (vpanic) from [<802027fc>] (trace_suspend_resume+0x0/0xd8 kernel/panic.c:627) r7:803dc648 [<802027c8>] (panic) from [<80251f68>] (check_panic_on_warn kernel/panic.c:377 [inline]) [<802027c8>] (panic) from [<80251f68>] (get_taint+0x0/0x1c kernel/panic.c:372) r3:8280c504 r2:00000001 r1:82288f44 r0:82290758 [<80251ef0>] (check_panic_on_warn) from [<802520e0>] (__warn+0x94/0x1a0 kernel/panic.c:902) [<8025204c>] (__warn) from [<802523d4>] (warn_slowpath_fmt+0x1e8/0x1f4 kernel/panic.c:937) r8:00000009 r7:822a8958 r6:dfa0d8bc r5:83eea400 r4:00000000 [<802521f0>] (warn_slowpath_fmt) from [<803dc648>] (reg_bounds_sanity_check+0x3c0/0x428 kernel/bpf/verifier.c:2742) r10:85298000 r9:04000000 r8:00000000 r7:04000000 r6:00000000 r5:822a90bc r4:858b2aa0 [<803dc288>] (reg_bounds_sanity_check) from [<803e9098>] (reg_set_min_max kernel/bpf/verifier.c:16577 [inline]) [<803dc288>] (reg_bounds_sanity_check) from [<803e9098>] (reg_set_min_max+0x230/0x288 kernel/bpf/verifier.c:16542) r10:00000000 r9:00000030 r8:85298000 r7:8529e118 r6:8529e0a8 r5:85e752a0 r4:858b2aa0 [<803e8e68>] (reg_set_min_max) from [<803f8998>] (check_cond_jmp_op+0x434/0x1968 kernel/bpf/verifier.c:17021) r10:85e75000 r9:00000030 r8:85b37600 r7:00000070 r6:85298000 r5:85b3b600 r4:dfb5b088 r3:858b2aa0 [<803f8564>] (check_cond_jmp_op) from [<803ff450>] (do_check_insn kernel/bpf/verifier.c:20446 [inline]) [<803f8564>] (check_cond_jmp_op) from [<803ff450>] (do_check kernel/bpf/verifier.c:20586 [inline]) [<803f8564>] (check_cond_jmp_op) from [<803ff450>] (do_check_common+0x2160/0x31c4 kernel/bpf/verifier.c:23870) r10:85298000 r9:00000000 r8:85b37600 r7:8529e000 r6:dfb5b088 r5:dfb5b040 r4:dfb5b000 [<803fd2f0>] (do_check_common) from [<80403890>] (do_check_main kernel/bpf/verifier.c:23953 [inline]) [<803fd2f0>] (do_check_common) from [<80403890>] (bpf_check+0x275c/0x2d2c kernel/bpf/verifier.c:25260) r10:8529e000 r9:00000001 r8:85298000 r7:00000a7b r6:852988bc r5:00000000 r4:00000016 [<80401134>] (bpf_check) from [<803d59d8>] (bpf_prog_load+0x5b0/0xdd8 kernel/bpf/syscall.c:3088) r10:dfa0dd58 r9:83eea400 r8:85f0c730 r7:dfa0dd18 r6:00000000 r5:00000000 r4:dfa0deb0 [<803d5428>] (bpf_prog_load) from [<803d71d4>] (__sys_bpf+0x334/0x2118 kernel/bpf/syscall.c:6164) r10:00000005 r9:00000000 r8:dfa0de50 r7:00000048 r6:83eea400 r5:200054c0 r4:00000000 [<803d6ea0>] (__sys_bpf) from [<803d954c>] (__do_sys_bpf kernel/bpf/syscall.c:6274 [inline]) [<803d6ea0>] (__sys_bpf) from [<803d954c>] (sys_bpf+0x2c/0x48 kernel/bpf/syscall.c:6272) r10:00000182 r9:83eea400 r8:8020029c r7:00000182 r6:00346450 r5:00000000 r4:00000000 [<803d9520>] (sys_bpf) from [<80200060>] (ret_fast_syscall+0x0/0x1c arch/arm/mm/proc-v7.S:67) Exception stack(0xdfa0dfa8 to 0xdfa0dff0) dfa0: 00000000 00000000 00000005 200054c0 00000048 00000000 dfc0: 00000000 00000000 00346450 00000182 00346418 00000000 00000001 76ef80dc dfe0: 76ef7e88 76ef7e78 00018734 0012fc20 Rebooting in 86400 seconds..