Unable to handle kernel paging request at virtual address dfff800000000026 KASAN: null-ptr-deref in range [0x0000000000000130-0x0000000000000137] Mem abort info: ESR = 0x0000000096000006 EC = 0x25: DABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x06: level 2 translation fault Data abort info: ISV = 0, ISS = 0x00000006 CM = 0, WnR = 0 [dfff800000000026] address between user and kernel address ranges Internal error: Oops: 0000000096000006 [#1] PREEMPT SMP Modules linked in: CPU: 0 PID: 4382 Comm: kworker/0:5 Not tainted syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/03/2025 Workqueue: events l2cap_info_timeout pstate: 824000c5 (Nzcv daIF +PAN -UAO +TCO -DIT -SSBS BTYPE=--) pc : __lock_acquire+0xf4/0x6800 kernel/locking/lockdep.c:4919 lr : lock_acquire+0x20c/0x63c kernel/locking/lockdep.c:5662 sp : ffff8000210c75e0 x29: ffff8000210c77f0 x28: 0000000000000000 x27: 0000000000000001 x26: 0000000000000130 x25: 1ffff00002a40070 x24: 0000000000000000 x23: dfff800000000000 x22: 0000000000000000 x21: 0000000000000000 x20: ffff800010cb5f4c x19: 0000000000000000 x18: ffff800011b7bf60 x17: ffff800018338000 x16: ffff8000082d9364 x15: ffff800017e19000 x14: 0000000000000001 x13: 1fffe0001966f024 x12: 0000000000ff0100 x11: ff0080000a8d86b0 x10: ffff700004218edc x9 : ffff0000c7449bc0 x8 : 0000000000000026 x7 : ffff800010cb5f4c x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000001 x3 : 0000000000000000 x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000130 Call trace: __lock_acquire+0xf4/0x6800 kernel/locking/lockdep.c:4919 lock_acquire+0x20c/0x63c kernel/locking/lockdep.c:5662 lock_sock_nested+0x70/0x130 net/core/sock.c:3496 lock_sock include/net/sock.h:1805 [inline] l2cap_sock_ready_cb+0x4c/0x12c net/bluetooth/l2cap_sock.c:1697 l2cap_chan_ready net/bluetooth/l2cap_core.c:1411 [inline] l2cap_conn_start+0x5d4/0xb88 net/bluetooth/l2cap_core.c:1670 l2cap_info_timeout+0x68/0xb8 net/bluetooth/l2cap_core.c:1837 process_one_work+0x7f8/0x13a4 kernel/workqueue.c:2292 worker_thread+0x8c4/0xfec kernel/workqueue.c:2439 kthread+0x250/0x2d8 kernel/kthread.c:376 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:850 Code: d0067e48 b94bc108 340001c8 d343ff48 (38776908) ---[ end trace 0000000000000000 ]--- ---------------- Code disassembly (best guess): 0: d0067e48 adrp x8, 0xcfca000 4: b94bc108 ldr w8, [x8, #3008] 8: 340001c8 cbz w8, 0x40 c: d343ff48 lsr x8, x26, #3 * 10: 38776908 ldrb w8, [x8, x23] <-- trapping instruction