------------[ cut here ]------------ WARNING: CPU: 0 PID: 20687 at kernel/bpf/verifier.c:2715 reg_bounds_sanity_check+0x390/0x45c kernel/bpf/verifier.c:2715 verifier bug: REG INVARIANTS VIOLATION (false_reg1): range bounds violation u64=[0xfffffffefffff630, 0xffffffff00000000] s64=[0xfffffffefffff630, 0xffffffff00000000] u32=[0x30, 0x8000050] s32=[0x30, 0x0] var_off=(0xfffffffe00000030, 0x10fffffc0) Modules linked in: Kernel panic - not syncing: kernel: panic_on_warn set ... CPU: 0 UID: 0 PID: 20687 Comm: syz.6.12797 Not tainted syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express Call trace: [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257) r7:822407e0 r6:854f1800 r5:00000000 r4:82252544 [<80201b08>] (show_stack) from [<8021f894>] (__dump_stack lib/dump_stack.c:94 [inline]) [<80201b08>] (show_stack) from [<8021f894>] (dump_stack_lvl+0x54/0x7c lib/dump_stack.c:120) [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c lib/dump_stack.c:129) r5:00000000 r4:82a78d18 [<8021f8bc>] (dump_stack) from [<802025f8>] (vpanic+0xe0/0x2e8 kernel/panic.c:489) [<80202518>] (vpanic) from [<80202834>] (trace_suspend_resume+0x0/0xd8 kernel/panic.c:626) r7:803d7cac [<80202800>] (panic) from [<80252948>] (check_panic_on_warn kernel/panic.c:376 [inline]) [<80202800>] (panic) from [<80252948>] (get_taint+0x0/0x1c kernel/panic.c:371) r3:8280c684 r2:00000001 r1:82238d44 r0:822407e0 [<802528d0>] (check_panic_on_warn) from [<80252aac>] (__warn+0x80/0x188 kernel/panic.c:897) [<80252a2c>] (__warn) from [<80252d9c>] (warn_slowpath_fmt+0x1e8/0x1f4 kernel/panic.c:932) r8:00000009 r7:82258ea0 r6:dfaf991c r5:854f1800 r4:00000000 [<80252bb8>] (warn_slowpath_fmt) from [<803d7cac>] (reg_bounds_sanity_check+0x390/0x45c kernel/bpf/verifier.c:2715) r10:871a8000 r9:fffff630 r8:fffffffe r7:00000030 r6:00000000 r5:822596c4 r4:8574f150 [<803d791c>] (reg_bounds_sanity_check) from [<803e28e4>] (reg_set_min_max kernel/bpf/verifier.c:16409 [inline]) [<803d791c>] (reg_bounds_sanity_check) from [<803e28e4>] (reg_set_min_max+0x1e8/0x26c kernel/bpf/verifier.c:16381) r10:00000001 r9:8574f000 r8:00000020 r7:871a8000 r6:84f91800 r5:84f91950 r4:8574f150 [<803e26fc>] (reg_set_min_max) from [<803f40ec>] (check_cond_jmp_op+0x85c/0x1860 kernel/bpf/verifier.c:16841) r10:8574f000 r9:84f91800 r8:08000050 r7:83b7bd00 r6:849d2700 r5:871a8000 r4:dfaed078 r3:8574f150 [<803f3890>] (check_cond_jmp_op) from [<803fb42c>] (do_check_insn kernel/bpf/verifier.c:19929 [inline]) [<803f3890>] (check_cond_jmp_op) from [<803fb42c>] (do_check kernel/bpf/verifier.c:20069 [inline]) [<803f3890>] (check_cond_jmp_op) from [<803fb42c>] (do_check_common+0x2010/0x30f4 kernel/bpf/verifier.c:23259) r10:0000000f r9:83b7bd00 r8:871ad000 r7:00000001 r6:871a8000 r5:dfaed030 r4:dfaed000 [<803f941c>] (do_check_common) from [<803ffc58>] (do_check_main kernel/bpf/verifier.c:23342 [inline]) [<803f941c>] (do_check_common) from [<803ffc58>] (bpf_check+0x29f8/0x2f50 kernel/bpf/verifier.c:24647) r10:fffffff0 r9:871a8000 r8:871ad000 r7:00000a7b r6:871a87bc r5:00000001 r4:0000000e [<803fd260>] (bpf_check) from [<803d1428>] (bpf_prog_load+0x650/0xd74 kernel/bpf/syscall.c:3077) r10:dfaf9d90 r9:854f1800 r8:856a9b30 r7:dfaf9d50 r6:00000000 r5:00000000 r4:dfaf9eb0 [<803d0dd8>] (bpf_prog_load) from [<803d3280>] (__sys_bpf+0xab8/0x2240 kernel/bpf/syscall.c:6149) r10:200017c0 r9:854f1800 r8:dfaf9ea8 r7:00000000 r6:00000005 r5:dfaf9e80 r4:00000048 [<803d27c8>] (__sys_bpf) from [<803d4fa8>] (__do_sys_bpf kernel/bpf/syscall.c:6259 [inline]) [<803d27c8>] (__sys_bpf) from [<803d4fa8>] (sys_bpf+0x2c/0x48 kernel/bpf/syscall.c:6257) r10:00000182 r9:854f1800 r8:8020029c r7:00000182 r6:003163a8 r5:00000000 r4:00000000 [<803d4f7c>] (sys_bpf) from [<80200060>] (ret_fast_syscall+0x0/0x1c arch/arm/mm/proc-v7.S:67) Exception stack(0xdfaf9fa8 to 0xdfaf9ff0) 9fa0: 00000000 00000000 00000005 200017c0 00000048 00000000 9fc0: 00000000 00000000 003163a8 00000182 00300000 00000000 00006364 76fdb0bc 9fe0: 76fdaec0 76fdaeb0 000195a4 00132510 Rebooting in 86400 seconds..