Internal error: Oops - BTI: 0000000036000001 [#1] PREEMPT SMP Modules linked in: CPU: 1 PID: 4475 Comm: syz.4.137 Not tainted 5.15.189-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 pstate: 62400405 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=jc) pc : copy_from_kernel_nofault+0x134/0x330 mm/maccess.c:39 lr : copy_from_kernel_nofault+0x10c/0x330 mm/maccess.c:39 sp : ffff80001ba97380 x29: ffff80001ba97380 x28: 0000000000000004 x27: dfff800000000000 x26: 1fffe0001ae46979 x25: 00000000fffffff2 x24: ffff80001ba97460 x23: 0000000000000000 x22: 0000000000000000 x21: 0000000000010000 x20: ffff80001ba97464 x19: ffff0000d7234bc8 x18: 0000000000000001 x17: 0000000000000002 x16: ffff800008683e84 x15: 0000000000000036 x14: 0000000000ff0100 x13: ffffffffffffffff x12: 0000000000ff0100 x11: 0000000000000001 x10: 0000000000000000 x9 : 1ffff00003752e8c x8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000058587025 x5 : ffff80001ba97485 x4 : ffff800013919d84 x3 : ffff800008587df4 x2 : 0000000000000004 x1 : 0000000000000004 x0 : 0000000000000003 Call trace: copy_from_kernel_nofault+0x134/0x330 mm/maccess.c:39 bpf_bprintf_prepare+0xc60/0x119c kernel/bpf/helpers.c:885 ____bpf_snprintf kernel/bpf/helpers.c:1011 [inline] bpf_snprintf+0xcc/0x14c kernel/bpf/helpers.c:995 bpf_prog_7c484fe798e6c38f+0x7c/0x968 bpf_dispatcher_nop_func include/linux/bpf.h:790 [inline] __bpf_prog_run include/linux/filter.h:628 [inline] bpf_prog_run include/linux/filter.h:635 [inline] __bpf_prog_run_save_cb include/linux/filter.h:758 [inline] bpf_prog_run_save_cb include/linux/filter.h:772 [inline] sk_filter_trim_cap+0x360/0x880 net/core/filter.c:153 sk_filter include/linux/filter.h:915 [inline] unix_dgram_sendmsg+0x758/0x1188 net/unix/af_unix.c:1840 unix_seqpacket_sendmsg+0x108/0x1cc net/unix/af_unix.c:2270 sock_sendmsg_nosec net/socket.c:704 [inline] __sock_sendmsg net/socket.c:716 [inline] ____sys_sendmsg+0x61c/0x920 net/socket.c:2436 ___sys_sendmsg+0x1d0/0x240 net/socket.c:2490 __sys_sendmsg net/socket.c:2519 [inline] __do_sys_sendmsg net/socket.c:2528 [inline] __se_sys_sendmsg net/socket.c:2526 [inline] __arm64_sys_sendmsg+0x1a8/0x254 net/socket.c:2526 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181 el0_svc+0x78/0x1e0 arch/arm64/kernel/entry-common.c:608 el0t_64_sync_handler+0xcc/0xe4 arch/arm64/kernel/entry-common.c:626 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 Code: d343ff09 2a1703f9 12000b0a b94002a8 (11000d4a) ---[ end trace 72846e1dc2fade34 ]--- ---------------- Code disassembly (best guess): 0: d343ff09 lsr x9, x24, #3 4: 2a1703f9 mov w25, w23 8: 12000b0a and w10, w24, #0x7 c: b94002a8 ldr w8, [x21] * 10: 11000d4a add w10, w10, #0x3 <-- trapping instruction