WARNING: [] kernel/bpf/verifier.c:2817 at reg_bounds_sanity_check+0x63a/0xf90 kernel/bpf/verifier.c:2817, CPU#1: syz.2.266/5528 Modules linked in: CPU: 1 UID: 0 PID: 5528 Comm: syz.2.266 Not tainted syzkaller #0 PREEMPT Hardware name: riscv-virtio,qemu (DT) epc : reg_bounds_sanity_check+0x63a/0xf90 kernel/bpf/verifier.c:2817 ra : reg_bounds_sanity_check+0x63a/0xf90 kernel/bpf/verifier.c:2817 epc : ffffffff8062a88e ra : ffffffff8062a88e sp : ffff8f800ce56d20 gp : ffffffff8a22a0c0 tp : ffffaf801aa89a80 t0 : 0000000000000000 t1 : ffffffff8007a848 t2 : ffffffff91601828 s0 : ffff8f800ce56f00 s1 : ffffaf802f798000 a0 : ffffaf801aa89a88 a1 : ffffffff86dda2c0 a2 : 0000000000080000 a3 : ffffffff8014b68c a4 : 0000000000000000 a5 : 0000000000000000 a6 : 0000000000000003 a7 : 0000000041b58ab3 s2 : 00000000ffffdfcd s3 : ffffffffffffdfcc s4 : 1ffff5f003ccf850 s5 : 1ffff5f003ccf84f s6 : 1ffff5f003ccf850 s7 : 0000000000000004 s8 : 0000000000000004 s9 : ffffaf801e67c230 s10: ffffffff86ae6800 s11: 1ffff5f003ccf84f t3 : ffffffff87fb2860 t4 : fffff5ef0e594511 t5 : fffff5ef0e594512 t6 : ffffffff8687a840 ssp : 0000000000000000 status: 0000000200000120 badaddr: ffffffff8062a88e cause: 0000000000000003 [] reg_bounds_sanity_check+0x63a/0xf90 kernel/bpf/verifier.c:2817 [] reg_set_min_max kernel/bpf/verifier.c:17165 [inline] [] reg_set_min_max+0x166/0x264 kernel/bpf/verifier.c:17132 [] check_cond_jmp_op+0x1852/0x6240 kernel/bpf/verifier.c:17622 [] do_check_insn kernel/bpf/verifier.c:21185 [inline] [] do_check kernel/bpf/verifier.c:21325 [inline] [] do_check_common+0x86fe/0xc700 kernel/bpf/verifier.c:24667 [] do_check_main kernel/bpf/verifier.c:24750 [inline] [] bpf_check+0xb574/0xc4e4 kernel/bpf/verifier.c:26073 [] bpf_prog_load+0x1704/0x24c4 kernel/bpf/syscall.c:3089 [] __sys_bpf+0xc5e/0x54dc kernel/bpf/syscall.c:6228 [] __do_sys_bpf kernel/bpf/syscall.c:6341 [inline] [] __se_sys_bpf kernel/bpf/syscall.c:6339 [inline] [] __riscv_sys_bpf+0x70/0xd0 kernel/bpf/syscall.c:6339 [] syscall_handler+0x92/0x114 arch/riscv/include/asm/syscall.h:112 [] do_trap_ecall_u+0x402/0x680 arch/riscv/kernel/traps.c:342 [] handle_exception+0x15e/0x16a arch/riscv/kernel/entry.S:232