------------[ cut here ]------------ verifier bug: not inlined functions bpf_probe_read_ verifier bug: not inlined functions bpf_probe_read_user#112 is missing func(1) WARNING: CPU: 0 PID: 10639 at kernel/bpf/verifier.c:22838 do_misc_fixups+0xa938/0xcf04 kernel/bpf/verifier.c:22838 Modules linked in: CPU: 0 UID: 0 PID: 10639 Comm: syz.4.2277 Not tainted syzkaller #0 PREEMPT Hardware name: linux,dummy-virt (DT) pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : do_misc_fixups+0xa938/0xcf04 kernel/bpf/verifier.c:22838 lr : do_misc_fixups+0xa938/0xcf04 kernel/bpf/verifier.c:22838 sp : ffff80008fe97450 x29: ffff80008fe97450 x28: ffff000023008000 x27: ffff00002300e130 x26: ffff00002300e148 x25: ffff000023008000 x24: 0000000000000000 x23: ffff00002300e128 x22: 1ffff00011b98613 x21: ffff80008dcc3098 x20: ffff800085585680 x19: ffff80008556d6a0 x18: ffff00002300e168 x17: 2020200025692020 x16: 00000000f1f1f1f1 x15: 00000000f3f3f3f3 x14: 0000000000000000 x13: 0000000000008000 x12: ffff700011fd2e2d x11: 1ffff00011fd2e2c x10: ffff700011fd2e2c x9 : dfff800000000000 x8 : ffff80008fe97167 x7 : 0000000000000001 x6 : ffff700011fd2e2c x5 : 1ffff00010e21c42 x4 : 1fffe00002546791 x3 : dfff800000000000 x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff000012a33c80 Call trace: do_misc_fixups+0xa938/0xcf04 kernel/bpf/verifier.c:22838 (P) bpf_check+0x3c84/0x9508 kernel/bpf/verifier.c:24742 bpf_prog_load+0xe2c/0x1b74 kernel/bpf/syscall.c:2979 __sys_bpf+0x9c4/0x29c8 kernel/bpf/syscall.c:6029 __do_sys_bpf kernel/bpf/syscall.c:6139 [inline] __se_sys_bpf kernel/bpf/syscall.c:6137 [inline] __arm64_sys_bpf+0x70/0xa4 kernel/bpf/syscall.c:6137 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x6c/0x258 arch/arm64/kernel/syscall.c:49 el0_svc_common.constprop.0+0xac/0x230 arch/arm64/kernel/syscall.c:132 do_el0_svc+0x40/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x50/0x1a0 arch/arm64/kernel/entry-common.c:879 el0t_64_sync_handler+0xa0/0xe4 arch/arm64/kernel/entry-common.c:898 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:596 irq event stamp: 246 hardirqs last enabled at (245): [] __exit_to_kernel_mode arch/arm64/kernel/entry-common.c:86 [inline] hardirqs last enabled at (245): [] exit_to_kernel_mode+0x38/0x118 arch/arm64/kernel/entry-common.c:96 hardirqs last disabled at (246): [] el1_brk64+0x1c/0x48 arch/arm64/kernel/entry-common.c:574 softirqs last enabled at (194): [] softirq_handle_end kernel/softirq.c:425 [inline] softirqs last enabled at (194): [] handle_softirqs+0x88c/0xdb4 kernel/softirq.c:607 softirqs last disabled at (187): [] __do_softirq+0x14/0x20 kernel/softirq.c:613 ---[ end trace 0000000000000000 ]---