------------[ cut here ]------------ WARNING: CPU: 0 PID: 3030 at kernel/bpf/btf.c:1947 btf_type_id_size+0x540/0x548 Modules linked in: CPU: 0 PID: 3030 Comm: syz-executor505 Not tainted 6.0.0-rc7-syzkaller-18095-gbbed346d5a96 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/30/2022 pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : btf_type_id_size+0x540/0x548 lr : btf_type_id_size+0x53c/0x548 kernel/bpf/btf.c:1946 sp : ffff80001278bb80 x29: ffff80001278bb80 x28: ffff80000d452300 x27: ffff80000ee76810 x26: 0000000000000011 x25: 0000000011000000 x24: 0000000000000000 x23: 0000000000000000 x22: ffff0000cb275e00 x21: 0000000000000002 x20: ffff80001278bc04 x19: 0000000000000000 x18: fffffffffffffff5 x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000 x14: 0000000000000000 x13: 0000000000000012 x12: ffff80000d4513c8 x11: ff80800008358c24 x10: 0000000000000000 x9 : ffff800008358c24 x8 : ffff0000c73d0000 x7 : 0000000000000000 x6 : 00000000ffffffff x5 : 0000000000002dc0 x4 : 0000000000000080 x3 : 0000000000000005 x2 : 0000000000000000 x1 : 0000000011000000 x0 : 000000000e000000 Call trace: btf_type_id_size+0x540/0x548 btf_func_proto_check kernel/bpf/btf.c:4447 [inline] btf_check_all_types kernel/bpf/btf.c:4723 [inline] btf_parse_type_sec+0x4ec/0xc54 kernel/bpf/btf.c:4752 btf_parse kernel/bpf/btf.c:5031 [inline] btf_new_fd+0x37c/0x564 kernel/bpf/btf.c:6710 bpf_btf_load+0x78/0x98 kernel/bpf/syscall.c:4314 __sys_bpf+0x424/0x5f4 kernel/bpf/syscall.c:4998 __do_sys_bpf kernel/bpf/syscall.c:5057 [inline] __se_sys_bpf kernel/bpf/syscall.c:5055 [inline] __arm64_sys_bpf+0x2c/0x40 kernel/bpf/syscall.c:5055 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall arch/arm64/kernel/syscall.c:52 [inline] el0_svc_common+0x138/0x220 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x48/0x164 arch/arm64/kernel/syscall.c:206 el0_svc+0x58/0x150 arch/arm64/kernel/entry-common.c:636 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:654 el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:581 irq event stamp: 11588 hardirqs last enabled at (11587): [] ___slab_alloc+0x778/0x880 mm/slub.c:2991 hardirqs last disabled at (11588): [] el1_dbg+0x24/0x5c arch/arm64/kernel/entry-common.c:404 softirqs last enabled at (11102): [] _stext+0x2e4/0x37c softirqs last disabled at (11093): [] ____do_softirq+0x14/0x20 arch/arm64/kernel/irq.c:79 ---[ end trace 0000000000000000 ]---