------------[ cut here ]------------ trace type BPF program uses run-time allocation WARNING: CPU: 0 PID: 13131 at kernel/bpf/verifier.c:12623 check_map_prog_compatibility kernel/bpf/verifier.c:12623 [inline] WARNING: CPU: 0 PID: 13131 at kernel/bpf/verifier.c:12623 resolve_pseudo_ldimm64 kernel/bpf/verifier.c:12796 [inline] WARNING: CPU: 0 PID: 13131 at kernel/bpf/verifier.c:12623 bpf_check+0xb056/0xb0d0 kernel/bpf/verifier.c:15229 Modules linked in: CPU: 0 PID: 13131 Comm: syz-executor.2 Not tainted 5.19.0-rc5-syzkaller-01173-gea2babac63d4 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 RIP: 0010:check_map_prog_compatibility kernel/bpf/verifier.c:12623 [inline] RIP: 0010:resolve_pseudo_ldimm64 kernel/bpf/verifier.c:12796 [inline] RIP: 0010:bpf_check+0xb056/0xb0d0 kernel/bpf/verifier.c:15229 Code: e9 53 a1 ff ff 4c 89 ef e8 07 ab 38 00 e9 87 64 ff ff e8 9d 5a eb ff 48 c7 c7 20 43 d4 89 c6 05 c5 6b 17 0c 01 e8 7b b6 a3 07 <0f> 0b e9 9b a0 ff ff 4c 8b bd 88 fe ff ff e8 77 5a eb ff 48 c7 c6 RSP: 0018:ffffc9000341f8b0 EFLAGS: 00010286 RAX: 0000000000000000 RBX: 0000000000000002 RCX: 0000000000000000 RDX: 0000000000040000 RSI: ffffffff8160d738 RDI: fffff52000683f08 RBP: ffffc9000341fb10 R08: 0000000000000005 R09: 0000000000000000 R10: 0000000080000000 R11: 0000000000000001 R12: ffff888072276000 R13: dffffc0000000000 R14: ffffc900032f5058 R15: 0000000000000002 FS: 00007f445c296700(0000) GS:ffff8880b9a00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fa12ebc3718 CR3: 000000001c917000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 Call Trace: bpf_prog_load+0xfb2/0x2250 kernel/bpf/syscall.c:2595 __sys_bpf+0x133f/0x5750 kernel/bpf/syscall.c:4954 __do_sys_bpf kernel/bpf/syscall.c:5058 [inline] __se_sys_bpf kernel/bpf/syscall.c:5056 [inline] __x64_sys_bpf+0x75/0xb0 kernel/bpf/syscall.c:5056 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x46/0xb0 RIP: 0033:0x7f445b089279 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f445c296168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 RAX: ffffffffffffffda RBX: 00007f445b19bf80 RCX: 00007f445b089279 RDX: 0000000000000080 RSI: 0000000020000440 RDI: 0000000000000005 RBP: 00007f445b0e3189 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffc904e2b9f R14: 00007f445c296300 R15: 0000000000022000