WARNING: [] kernel/bpf/verifier.c:2742 at reg_bounds_sanity_check+0x63a/0xf90 kernel/bpf/verifier.c:2742, CPU#0: syz.1.3/3850 Modules linked in: CPU: 0 UID: 0 PID: 3850 Comm: syz.1.3 Not tainted syzkaller #0 PREEMPT Hardware name: riscv-virtio,qemu (DT) epc : reg_bounds_sanity_check+0x63a/0xf90 kernel/bpf/verifier.c:2742 ra : reg_bounds_sanity_check+0x63a/0xf90 kernel/bpf/verifier.c:2742 epc : ffffffff8060b3a6 ra : ffffffff8060b3a6 sp : ffff8f800a716d00 gp : ffffffff89f9df20 tp : ffffaf8031039a80 t0 : 0000000000000000 t1 : ffffffff8007a568 t2 : ffffffff9136c6e0 s0 : ffff8f800a716ee0 s1 : ffffaf8031958000 a0 : ffffaf8031039a88 a1 : ffffffff86bcf300 a2 : 0000000000080000 a3 : ffffffff80146d20 a4 : 0000000000000000 a5 : 0000000000000000 a6 : 0000000000000003 a7 : 0000000041b58ab3 s2 : 0000000000000000 s3 : 0000000000000000 s4 : 1ffff5f006181c5e s5 : 1ffff5f006181c5d s6 : 1ffff5f006181c5e s7 : 0000000000000004 s8 : 0000000000000004 s9 : ffffaf8030c0e2a0 s10: ffffffff868e44e0 s11: 1ffff5f006181c5d t3 : ffffffff87d89ca8 t4 : fffff5ef0dd9a468 t5 : fffff5ef0dd9a469 t6 : ffffffff86676340 ssp : 0000000000000000 status: 0000000200000120 badaddr: ffffffff8060b3a6 cause: 0000000000000003 [] reg_bounds_sanity_check+0x63a/0xf90 kernel/bpf/verifier.c:2742 [] reg_set_min_max kernel/bpf/verifier.c:16575 [inline] [] reg_set_min_max+0x166/0x264 kernel/bpf/verifier.c:16542 [] check_cond_jmp_op+0x1852/0x61dc kernel/bpf/verifier.c:17010 [] do_check_insn kernel/bpf/verifier.c:20446 [inline] [] do_check kernel/bpf/verifier.c:20586 [inline] [] do_check_common+0x7ada/0xc890 kernel/bpf/verifier.c:23870 [] do_check_main kernel/bpf/verifier.c:23953 [inline] [] bpf_check+0xbda0/0xc564 kernel/bpf/verifier.c:25260 [] bpf_prog_load+0x16da/0x2494 kernel/bpf/syscall.c:3088 [] __sys_bpf+0xb9e/0x474c kernel/bpf/syscall.c:6164 [] __do_sys_bpf kernel/bpf/syscall.c:6274 [inline] [] __se_sys_bpf kernel/bpf/syscall.c:6272 [inline] [] __riscv_sys_bpf+0x70/0xd0 kernel/bpf/syscall.c:6272 [] syscall_handler+0x92/0x114 arch/riscv/include/asm/syscall.h:112 [] do_trap_ecall_u+0x3d2/0x58c arch/riscv/kernel/traps.c:344 [] handle_exception+0x15e/0x16a arch/riscv/kernel/entry.S:232