------------[ cut here ]------------ verifier backtracking bug WARNING: CPU: 0 PID: 6161 at kernel/bpf/verifier.c:3683 backtrack_insn kernel/bpf/verifier.c:3683 [inline] WARNING: CPU: 0 PID: 6161 at kernel/bpf/verifier.c:3683 __mark_chain_precision+0x5cec/0x6124 kernel/bpf/verifier.c:4224 Modules linked in: CPU: 0 PID: 6161 Comm: syz-executor257 Not tainted 6.8.0-rc7-syzkaller-g707081b61156 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : backtrack_insn kernel/bpf/verifier.c:3683 [inline] pc : __mark_chain_precision+0x5cec/0x6124 kernel/bpf/verifier.c:4224 lr : backtrack_insn kernel/bpf/verifier.c:3683 [inline] lr : __mark_chain_precision+0x5cec/0x6124 kernel/bpf/verifier.c:4224 sp : ffff800097826940 x29: ffff800097826b20 x28: ffff0000d6e90000 x27: dfff800000000000 x26: 0000000000000078 x25: 0000000000000085 x24: ffff0000d6e93f00 x23: ffff700012f04d50 x22: 0000000000000002 x21: 0000000000000001 x20: 0000000000000400 x19: ffff800091cc2000 x18: ffff0000d6e90655 x17: 0000000000000000 x16: ffff80008ad6b09c x15: 0000000000000001 x14: 1fffe00036800002 x13: 0000000000000000 x12: 0000000000000000 x11: 0000000000000002 x10: 0000000000ff0100 x9 : 225e1d0b8a4fa200 x8 : 225e1d0b8a4fa200 x7 : 0000000000000001 x6 : 0000000000000001 x5 : ffff800097826238 x4 : ffff80008ed822c0 x3 : ffff8000805ba130 x2 : 0000000000000001 x1 : 0000000100000000 x0 : 0000000000000000 Call trace: backtrack_insn kernel/bpf/verifier.c:3683 [inline] __mark_chain_precision+0x5cec/0x6124 kernel/bpf/verifier.c:4224 mark_chain_precision kernel/bpf/verifier.c:4327 [inline] check_return_code+0x934/0xf54 kernel/bpf/verifier.c:15339 do_check+0x8594/0xbc10 kernel/bpf/verifier.c:17633 do_check_common+0xce0/0x1390 kernel/bpf/verifier.c:20113 do_check_main kernel/bpf/verifier.c:20204 [inline] bpf_check+0xdb4c/0x1185c kernel/bpf/verifier.c:20852 bpf_prog_load+0x104c/0x17a8 kernel/bpf/syscall.c:2769 __sys_bpf+0x2ac/0x5dc kernel/bpf/syscall.c:5457 __do_sys_bpf kernel/bpf/syscall.c:5561 [inline] __se_sys_bpf kernel/bpf/syscall.c:5559 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5559 __invoke_syscall arch/arm64/kernel/syscall.c:34 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:48 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:133 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:152 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598 irq event stamp: 11132 hardirqs last enabled at (11131): [] __up_console_sem kernel/printk/printk.c:341 [inline] hardirqs last enabled at (11131): [] __console_unlock kernel/printk/printk.c:2706 [inline] hardirqs last enabled at (11131): [] console_unlock+0x17c/0x3d4 kernel/printk/printk.c:3038 hardirqs last disabled at (11132): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:470 softirqs last enabled at (11120): [] softirq_handle_end kernel/softirq.c:399 [inline] softirqs last enabled at (11120): [] __do_softirq+0xac8/0xce4 kernel/softirq.c:582 softirqs last disabled at (11113): [] ____do_softirq+0x14/0x20 arch/arm64/kernel/irq.c:81 ---[ end trace 0000000000000000 ]---