------------[ cut here ]------------ WARNING: CPU: 0 PID: 14689 at kernel/bpf/btf.c:1943 btf_type_id_size+0x8e0/0x948 Modules linked in: CPU: 0 PID: 14689 Comm: syz.3.4287 Not tainted 6.1.100-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : btf_type_id_size+0x8e0/0x948 lr : btf_type_id_size+0x8dc/0x948 kernel/bpf/btf.c:1942 sp : ffff80001e0979d0 x29: ffff80001e0979e0 x28: 1ffff00003c12f50 x27: dfff800000000000 x26: 0000000011000000 x25: 0000000000000011 x24: 0000000000000000 x23: 0000000000000000 x22: ffff0000cef91200 x21: 0000000000000001 x20: ffff80001e097a80 x19: 000000000e000000 x18: 0000000000000140 x17: ffff80001585d000 x16: ffff800012170194 x15: 0000000000000002 x14: 0000000000000012 x13: ffff0000d08f0000 x12: 0000000000040000 x11: 000000000003ffff x10: ffff80002a3cd000 x9 : ffff8000086684f0 x8 : 0000000000040000 x7 : ffff800008ac212c x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000005 x2 : ffff80001e097aa0 x1 : 0000000011000000 x0 : 000000000e000000 Call trace: btf_type_id_size+0x8e0/0x948 map_check_btf+0x104/0x97c kernel/bpf/syscall.c:1033 map_create+0x6f4/0xbc8 kernel/bpf/syscall.c:1182 __sys_bpf+0x284/0x654 kernel/bpf/syscall.c:5002 __do_sys_bpf kernel/bpf/syscall.c:5124 [inline] __se_sys_bpf kernel/bpf/syscall.c:5122 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5122 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2c0 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:140 do_el0_svc+0x64/0x218 arch/arm64/kernel/syscall.c:204 el0_svc+0x58/0x168 arch/arm64/kernel/entry-common.c:637 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655 el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:585 irq event stamp: 10384 hardirqs last enabled at (10383): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:151 [inline] hardirqs last enabled at (10383): [] _raw_spin_unlock_irqrestore+0x48/0xac kernel/locking/spinlock.c:194 hardirqs last disabled at (10384): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405 softirqs last enabled at (4628): [] softirq_handle_end kernel/softirq.c:414 [inline] softirqs last enabled at (4628): [] handle_softirqs+0xb84/0xd58 kernel/softirq.c:599 softirqs last disabled at (4501): [] __do_softirq+0x14/0x20 kernel/softirq.c:605 ---[ end trace 0000000000000000 ]--- bridge0: port 2(bridge_slave_1) entered disabled state bridge0: port 1(bridge_slave_0) entered disabled state