verifier bug: REG INVARIANTS VIOLATION (true_reg1): range bounds violation u64=[0xffffdfcd, 0xffffffffffffdfcc] s64=[0x80000000ffffdfcd, 0x7fffffffffffdfcc] u32=[0xffffdfcd, 0xffffdfcc] s32=[0xffffdfcd, 0xffffdfcc] var_off=(0xffffdfcc, 0xffffffff00000000) WARNING: kernel/bpf/verifier.c:2817 at reg_bounds_sanity_check+0x160/0x1e8 kernel/bpf/verifier.c:2817, CPU#1: syz.2.8654/29748 Modules linked in: CPU: 1 UID: 0 PID: 29748 Comm: syz.2.8654 Not tainted syzkaller #0 PREEMPT Hardware name: linux,dummy-virt (DT) pstate: 61402009 (nZCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--) pc : reg_bounds_sanity_check+0x160/0x1e8 kernel/bpf/verifier.c:2817 lr : reg_bounds_sanity_check+0x160/0x1e8 kernel/bpf/verifier.c:2817 sp : ffff80008347b750 x29: ffff80008347b780 x28: 0000000000000010 x27: 0000000000000230 x26: f3f0000006079310 x25: 0000000000000001 x24: 0000000000000010 x23: ffff8000825a5548 x22: ffff8000825a54d0 x21: ffff8000825a7838 x20: f1f0000008d20000 x19: f8f000000b53a230 x18: 0000000000000000 x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000 x14: 00000000000002db x13: 00000000f5257d14 x12: 0000b17c5c4672e0 x11: 00000000000000c0 x10: 31a8e7dde3789227 x9 : c357e179b2eb6f37 x8 : f9f00000048cb1d8 x7 : 0000000000000004 x6 : 0000000000000000 x5 : f9f00000048ca180 x4 : fbffff3fffffffff x3 : 000000000000ffff x2 : 0000000000000000 x1 : 0000000000000000 x0 : f9f00000048ca180 Call trace: reg_bounds_sanity_check+0x160/0x1e8 kernel/bpf/verifier.c:2817 (P) reg_set_min_max kernel/bpf/verifier.c:17158 [inline] reg_set_min_max+0x118/0x208 kernel/bpf/verifier.c:17125 check_cond_jmp_op+0xafc/0x149c kernel/bpf/verifier.c:17609 do_check_insn kernel/bpf/verifier.c:21168 [inline] do_check kernel/bpf/verifier.c:21308 [inline] do_check_common+0x2688/0x2b60 kernel/bpf/verifier.c:24650 do_check_main kernel/bpf/verifier.c:24733 [inline] bpf_check+0x1c20/0x26b0 kernel/bpf/verifier.c:26056 bpf_prog_load+0x658/0xd80 kernel/bpf/syscall.c:3089 __sys_bpf+0x944/0x1afc kernel/bpf/syscall.c:6228 __do_sys_bpf kernel/bpf/syscall.c:6341 [inline] __se_sys_bpf kernel/bpf/syscall.c:6339 [inline] __arm64_sys_bpf+0x24/0x40 kernel/bpf/syscall.c:6339 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x48/0x104 arch/arm64/kernel/syscall.c:49 el0_svc_common.constprop.0+0x40/0xe0 arch/arm64/kernel/syscall.c:132 do_el0_svc+0x1c/0x28 arch/arm64/kernel/syscall.c:151 el0_svc+0x34/0x124 arch/arm64/kernel/entry-common.c:724 el0t_64_sync_handler+0xa0/0xf0 arch/arm64/kernel/entry-common.c:743 el0t_64_sync+0x1a4/0x1a8 arch/arm64/kernel/entry.S:596 ---[ end trace 0000000000000000 ]---