------------[ cut here ]------------ verifier log line truncated - local buffer too short WARNING: CPU: 0 PID: 3027 at kernel/bpf/verifier.c:301 bpf_verifier_vlog+0x2a0/0x2b8 kernel/bpf/verifier.c:300 Modules linked in: CPU: 0 PID: 3027 Comm: syz-executor119 Not tainted 6.0.0-rc3-syzkaller-16800-g85413d1e802e #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : bpf_verifier_vlog+0x2a0/0x2b8 kernel/bpf/verifier.c:300 lr : bpf_verifier_vlog+0x2a0/0x2b8 kernel/bpf/verifier.c:300 sp : ffff80000ffeb940 x29: ffff80000ffeb970 x28: ffff80000cbae88d x27: 0000000000000000 x26: 0000000000000500 x25: ffff80000cbb9e9d x24: 0000000000000001 x23: 0000000000000001 x22: ffff80000d937000 x21: 00000000000003ff x20: ffff0000ca872a14 x19: ffff0000ca872a10 x18: 0000000000000100 x17: ffff80000c06ff08 x16: ffff80000dbb8658 x15: ffff0000c9a99a80 x14: 0000000000000000 x13: 00000000ffffffff x12: ffff0000c9a99a80 x11: ff808000081c39d0 x10: 0000000000000000 x9 : 5670375c44bf3400 x8 : 5670375c44bf3400 x7 : ffff800008197c80 x6 : 0000000000000000 x5 : 0000000000000080 x4 : 0000000000000001 x3 : 0000000000000000 x2 : 0000000000000000 x1 : 0000000100000000 x0 : 0000000000000034 Call trace: bpf_verifier_vlog+0x2a0/0x2b8 kernel/bpf/verifier.c:300 __btf_verifier_log+0x68/0x94 kernel/bpf/btf.c:1375 __btf_verifier_log_type+0x210/0x300 kernel/bpf/btf.c:1413 btf_func_proto_check_meta+0xa0/0xfc btf_check_meta kernel/bpf/btf.c:4588 [inline] btf_check_all_metas+0x148/0x378 kernel/bpf/btf.c:4612 btf_parse_type_sec+0xa0/0xc54 kernel/bpf/btf.c:4748 btf_parse kernel/bpf/btf.c:5031 [inline] btf_new_fd+0x38c/0x574 kernel/bpf/btf.c:6710 bpf_btf_load+0x78/0x98 kernel/bpf/syscall.c:4314 __sys_bpf+0x424/0x5f4 kernel/bpf/syscall.c:4998 __do_sys_bpf kernel/bpf/syscall.c:5057 [inline] __se_sys_bpf kernel/bpf/syscall.c:5055 [inline] __arm64_sys_bpf+0x2c/0x40 kernel/bpf/syscall.c:5055 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall arch/arm64/kernel/syscall.c:52 [inline] el0_svc_common+0x138/0x220 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x48/0x154 arch/arm64/kernel/syscall.c:206 el0_svc+0x58/0x150 arch/arm64/kernel/entry-common.c:624 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:642 el0t_64_sync+0x18c/0x190 irq event stamp: 13320 hardirqs last enabled at (13319): [] __up_console_sem+0xb0/0xfc kernel/printk/printk.c:264 hardirqs last disabled at (13320): [] el1_dbg+0x24/0x5c arch/arm64/kernel/entry-common.c:395 softirqs last enabled at (13314): [] _stext+0x2e4/0x37c softirqs last disabled at (13305): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (13305): [] invoke_softirq+0x70/0xbc kernel/softirq.c:452 ---[ end trace 0000000000000000 ]---