------------[ cut here ]------------ verifier bug: not inlined functions bpf_p verifier bug: not inlined functions bpf_perf_event_read#22 is missing func(1) WARNING: CPU: 0 PID: 6907 at kernel/bpf/verifier.c:22838 do_misc_fixups+0xa938/0xcf04 kernel/bpf/verifier.c:22838 Modules linked in: CPU: 0 UID: 0 PID: 6907 Comm: syz.2.1255 Not tainted syzkaller #0 PREEMPT Hardware name: linux,dummy-virt (DT) pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : do_misc_fixups+0xa938/0xcf04 kernel/bpf/verifier.c:22838 lr : do_misc_fixups+0xa938/0xcf04 kernel/bpf/verifier.c:22838 sp : ffff8000a81e7450 x29: ffff8000a81e7450 x28: ffff0000210c8000 x27: ffff0000210ce130 x26: ffff0000210ce148 x25: ffff0000210c8000 x24: 0000000000000000 x23: ffff0000210ce128 x22: 1ffff00011b53a13 x21: ffff80008da9d098 x20: ffff800085583e00 x19: ffff80008556d4a0 x18: ffff0000210ce168 x17: 0000000000000000 x16: 00000000f1f1f1f1 x15: 00000000f3f3f3f3 x14: 0000000000000000 x13: 0000000000008000 x12: ffff70001503ce2d x11: 1ffff0001503ce2c x10: ffff70001503ce2c x9 : dfff800000000000 x8 : ffff8000a81e7167 x7 : 0000000000000001 x6 : ffff70001503ce2c x5 : 1ffff00010e21c42 x4 : 1fffe00002ed43c9 x3 : dfff800000000000 x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff0000176a1e40 Call trace: do_misc_fixups+0xa938/0xcf04 kernel/bpf/verifier.c:22838 (P) bpf_check+0x3c84/0x9508 kernel/bpf/verifier.c:24742 bpf_prog_load+0xe2c/0x1b74 kernel/bpf/syscall.c:2979 __sys_bpf+0x9c4/0x29c8 kernel/bpf/syscall.c:6029 __do_sys_bpf kernel/bpf/syscall.c:6139 [inline] __se_sys_bpf kernel/bpf/syscall.c:6137 [inline] __arm64_sys_bpf+0x70/0xa4 kernel/bpf/syscall.c:6137 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x6c/0x258 arch/arm64/kernel/syscall.c:49 el0_svc_common.constprop.0+0xac/0x230 arch/arm64/kernel/syscall.c:132 do_el0_svc_compat+0x40/0x68 arch/arm64/kernel/syscall.c:157 el0_svc_compat+0x4c/0x184 arch/arm64/kernel/entry-common.c:1029 el0t_32_sync_handler+0x88/0xac arch/arm64/kernel/entry-common.c:1047 el0t_32_sync+0x19c/0x1a0 arch/arm64/kernel/entry.S:601 irq event stamp: 480 hardirqs last enabled at (479): [] __exit_to_kernel_mode arch/arm64/kernel/entry-common.c:86 [inline] hardirqs last enabled at (479): [] exit_to_kernel_mode+0x38/0x118 arch/arm64/kernel/entry-common.c:96 hardirqs last disabled at (480): [] el1_brk64+0x1c/0x48 arch/arm64/kernel/entry-common.c:574 softirqs last enabled at (448): [] softirq_handle_end kernel/softirq.c:425 [inline] softirqs last enabled at (448): [] handle_softirqs+0x88c/0xdb4 kernel/softirq.c:607 softirqs last disabled at (433): [] __do_softirq+0x14/0x20 kernel/softirq.c:613 ---[ end trace 0000000000000000 ]---