------------[ cut here ]------------ WARNING: CPU: 1 PID: 3079 at kernel/bpf/btf.c:1947 btf_type_id_size+0x540/0x548 Modules linked in: CPU: 1 PID: 3079 Comm: syz-executor219 Not tainted 6.1.0-rc5-syzkaller-32254-g9e4ce762f0e7 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/30/2022 pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : btf_type_id_size+0x540/0x548 lr : btf_type_id_size+0x53c/0x548 kernel/bpf/btf.c:1946 sp : ffff80000ffc3b70 x29: ffff80000ffc3b70 x28: ffff0000c9834800 x27: ffff80000ef45870 x26: 0000000000000011 x25: 0000000011000000 x24: 0000000000000000 x23: 0000000000000000 x22: ffff0000c9834800 x21: 0000000000000001 x20: ffff80000ffc3c04 x19: 0000000000000000 x18: 0000000000000000 x17: 000000000d000001 x16: 0000000000000000 x15: 0000000000000000 x14: 0000000000000000 x13: 0000000000000012 x12: ffff80000d4f2e28 x11: ff808000083602a4 x10: 0000000000000000 x9 : ffff8000083602a4 x8 : ffff0000c4c90000 x7 : 0000000000000000 x6 : 000000000000003f x5 : 00000000ffffffff x4 : 0000000000002dc0 x3 : 0000000000000080 x2 : 0000000000000000 x1 : 0000000011000000 x0 : 000000000e000000 Call trace: btf_type_id_size+0x540/0x548 btf_func_proto_check kernel/bpf/btf.c:4500 [inline] btf_check_all_types kernel/bpf/btf.c:4728 [inline] btf_parse_type_sec+0x954/0xcdc kernel/bpf/btf.c:4757 btf_parse kernel/bpf/btf.c:5031 [inline] btf_new_fd+0x37c/0x564 kernel/bpf/btf.c:6897 bpf_btf_load+0x78/0x98 kernel/bpf/syscall.c:4324 __sys_bpf+0x42c/0x5fc kernel/bpf/syscall.c:5010 __do_sys_bpf kernel/bpf/syscall.c:5069 [inline] __se_sys_bpf kernel/bpf/syscall.c:5067 [inline] __arm64_sys_bpf+0x2c/0x40 kernel/bpf/syscall.c:5067 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall arch/arm64/kernel/syscall.c:52 [inline] el0_svc_common+0x138/0x220 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x48/0x164 arch/arm64/kernel/syscall.c:206 el0_svc+0x58/0x150 arch/arm64/kernel/entry-common.c:637 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:584 irq event stamp: 12536 hardirqs last enabled at (12535): [] ___slab_alloc+0x794/0x91c mm/slub.c:3132 hardirqs last disabled at (12536): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405 softirqs last enabled at (11854): [] local_bh_enable+0x10/0x34 include/linux/bottom_half.h:32 softirqs last disabled at (11852): [] local_bh_disable+0x10/0x34 include/linux/bottom_half.h:19 ---[ end trace 0000000000000000 ]---