------------[ cut here ]------------ WARNING: CPU: 0 PID: 10691 at kernel/bpf/btf.c:1947 btf_type_id_size+0x540/0x548 Modules linked in: CPU: 0 PID: 10691 Comm: syz-executor.2 Not tainted 6.1.0-rc8-syzkaller-33330-ga5541c0811a0 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : btf_type_id_size+0x540/0x548 lr : btf_type_id_size+0x53c/0x548 kernel/bpf/btf.c:1946 sp : ffff8000153e3b70 x29: ffff8000153e3b70 x28: ffff00013a4b0600 x27: ffff80000ef13870 x26: 0000000000000011 x25: 0000000011000000 x24: 0000000000000000 x23: 0000000000000000 x22: ffff00013a4b0600 x21: 0000000000000001 x20: ffff8000153e3c04 x19: 0000000000000000 x18: 0000000000000000 x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000 x14: 0000000000000002 x13: 0000000000000012 x12: 0000000000040000 x11: 000000000000151e x10: ffff800019eae000 x9 : ffff80000835ffb0 x8 : 000000000000151f x7 : 0000000000000000 x6 : 000000000000003f x5 : 00000000ffffffff x4 : 0000000000002dc0 x3 : 0000000000000080 x2 : 0000000000000000 x1 : 0000000011000000 x0 : 000000000e000000 Call trace: btf_type_id_size+0x540/0x548 btf_func_proto_check kernel/bpf/btf.c:4500 [inline] btf_check_all_types kernel/bpf/btf.c:4728 [inline] btf_parse_type_sec+0x954/0xcdc kernel/bpf/btf.c:4757 btf_parse kernel/bpf/btf.c:5031 [inline] btf_new_fd+0x37c/0x564 kernel/bpf/btf.c:6897 bpf_btf_load+0x78/0x98 kernel/bpf/syscall.c:4324 __sys_bpf+0x42c/0x5fc kernel/bpf/syscall.c:5010 __do_sys_bpf kernel/bpf/syscall.c:5069 [inline] __se_sys_bpf kernel/bpf/syscall.c:5067 [inline] __arm64_sys_bpf+0x2c/0x40 kernel/bpf/syscall.c:5067 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall arch/arm64/kernel/syscall.c:52 [inline] el0_svc_common+0x138/0x220 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x48/0x140 arch/arm64/kernel/syscall.c:197 el0_svc+0x58/0x150 arch/arm64/kernel/entry-common.c:637 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:584 irq event stamp: 62 hardirqs last enabled at (61): [] ___slab_alloc+0x794/0x91c mm/slub.c:3132 hardirqs last disabled at (62): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405 softirqs last enabled at (8): [] local_bh_enable+0x10/0x34 include/linux/bottom_half.h:32 softirqs last disabled at (6): [] local_bh_disable+0x10/0x34 include/linux/bottom_half.h:19 ---[ end trace 0000000000000000 ]---