------------[ cut here ]------------ WARNING: CPU: 0 PID: 11536 at kernel/bpf/verifier.c:2722 reg_bounds_sanity_check+0x390/0x45c kernel/bpf/verifier.c:2722 verifier bug: REG INVARIANTS VIOLATION (true_reg1): range bounds violation u64=[0x1f, 0x1f] s64=[0x1f, 0x1f] u32=[0x1f, 0x17] s32=[0x1f, 0x1f] var_off=(0x1f, 0x0)(1) Modules linked in: Kernel panic - not syncing: kernel: panic_on_warn set ... CPU: 0 UID: 0 PID: 11536 Comm: syz.3.657 Not tainted 6.16.0-syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express Call trace: [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257) r7:00000000 r6:8281f77c r5:00000000 r4:8224af5c [<80201b08>] (show_stack) from [<8021faf0>] (__dump_stack lib/dump_stack.c:94 [inline]) [<80201b08>] (show_stack) from [<8021faf0>] (dump_stack_lvl+0x54/0x7c lib/dump_stack.c:120) [<8021fa9c>] (dump_stack_lvl) from [<8021fb30>] (dump_stack+0x18/0x1c lib/dump_stack.c:129) r5:00000000 r4:82a6bd18 [<8021fb18>] (dump_stack) from [<80202624>] (vpanic+0x10c/0x360 kernel/panic.c:440) [<80202518>] (vpanic) from [<802028ac>] (trace_suspend_resume+0x0/0xd8 kernel/panic.c:574) r7:803d429c [<80202878>] (panic) from [<802548dc>] (check_panic_on_warn kernel/panic.c:333 [inline]) [<80202878>] (panic) from [<802548dc>] (get_taint+0x0/0x1c kernel/panic.c:328) r3:8280c684 r2:00000001 r1:82231a24 r0:822393ec [<80254868>] (check_panic_on_warn) from [<80254a40>] (__warn+0x80/0x188 kernel/panic.c:845) [<802549c0>] (__warn) from [<80254d30>] (warn_slowpath_fmt+0x1e8/0x1f4 kernel/panic.c:880) r8:00000009 r7:82251754 r6:dfd79984 r5:85733c00 r4:00000000 [<80254b4c>] (warn_slowpath_fmt) from [<803d429c>] (reg_bounds_sanity_check+0x390/0x45c kernel/bpf/verifier.c:2722) r10:85878000 r9:0000001f r8:00000000 r7:0000001f r6:0000001f r5:822520b0 r4:85c40168 [<803d3f0c>] (reg_bounds_sanity_check) from [<803e2768>] (reg_set_min_max kernel/bpf/verifier.c:16334 [inline]) [<803d3f0c>] (reg_bounds_sanity_check) from [<803e2768>] (reg_set_min_max+0x1b0/0x26c kernel/bpf/verifier.c:16308) r10:00000000 r9:855c19e0 r8:00000010 r7:85878000 r6:85c401e0 r5:85c40168 r4:855c1968 [<803e25b8>] (reg_set_min_max) from [<803ecb70>] (check_cond_jmp_op+0x848/0x1718 kernel/bpf/verifier.c:16768) r10:855c19e0 r9:85c40000 r8:00000000 r7:860d3c00 r6:84031f00 r5:85878000 r4:df961078 r3:855c1968 [<803ec328>] (check_cond_jmp_op) from [<803f7340>] (do_check_insn kernel/bpf/verifier.c:19956 [inline]) [<803ec328>] (check_cond_jmp_op) from [<803f7340>] (do_check kernel/bpf/verifier.c:20093 [inline]) [<803ec328>] (check_cond_jmp_op) from [<803f7340>] (do_check_common+0x2648/0x3160 kernel/bpf/verifier.c:23258) r10:0000000f r9:8587d000 r8:00000009 r7:df961048 r6:df961000 r5:84031a00 r4:85878000 [<803f4cf8>] (do_check_common) from [<803fb608>] (do_check_main kernel/bpf/verifier.c:23341 [inline]) [<803f4cf8>] (do_check_common) from [<803fb608>] (bpf_check+0x28bc/0x3020 kernel/bpf/verifier.c:24700) r10:00000000 r9:858787b8 r8:85878000 r7:00000001 r6:8587d000 r5:0000000e r4:00000a7b [<803f8d4c>] (bpf_check) from [<803cda78>] (bpf_prog_load+0x68c/0xc20 kernel/bpf/syscall.c:2972) r10:85733c00 r9:84a1bf30 r8:00000048 r7:dfd79d90 r6:00000000 r5:00000000 r4:dfd79ec0 [<803cd3ec>] (bpf_prog_load) from [<803cf0b4>] (__sys_bpf+0x42c/0x20f0 kernel/bpf/syscall.c:6022) r10:b5403587 r9:200017c0 r8:00000000 r7:00000000 r6:00000005 r5:dfd79e90 r4:00000048 [<803cec88>] (__sys_bpf) from [<803d1318>] (__do_sys_bpf kernel/bpf/syscall.c:6132 [inline]) [<803cec88>] (__sys_bpf) from [<803d1318>] (sys_bpf+0x2c/0x48 kernel/bpf/syscall.c:6130) r10:00000182 r9:85733c00 r8:8020029c r7:00000182 r6:002f6300 r5:00000000 r4:00000000 [<803d12ec>] (sys_bpf) from [<80200060>] (ret_fast_syscall+0x0/0x1c arch/arm/mm/proc-v7.S:67) Exception stack(0xdfd79fa8 to 0xdfd79ff0) 9fa0: 00000000 00000000 00000005 200017c0 00000048 00000000 9fc0: 00000000 00000000 002f6300 00000182 002e0000 00000000 00006364 76b160bc 9fe0: 76b15ec0 76b15eb0 000193a4 00131fc0 Rebooting in 86400 seconds..