Unable to handle kernel paging request at virtual address ffff8000a0035698 KASAN: probably user-memory-access in range [0x00000005001ab4c0-0x00000005001ab4c7] Mem abort info: ESR = 0x0000000096000007 EC = 0x25: DABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x07: level 3 translation fault Data abort info: ISV = 0, ISS = 0x00000007, ISS2 = 0x00000000 CM = 0, WnR = 0, TnD = 0, TagAccess = 0 GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 swapper pgtable: 4k pages, 48-bit VAs, pgdp=0000000206d55000 [ffff8000a0035698] pgd=0000000000000000, p4d=100000020f59c003, pud=100000020f59d003, pmd=100000010c188403, pte=0000000000000000 Internal error: Oops: 0000000096000007 [#1] SMP Modules linked in: CPU: 0 UID: 0 PID: 7536 Comm: khidpd_04580058 Not tainted syzkaller #0 PREEMPT Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/03/2025 pstate: 034000c5 (nzcv daIF +PAN -UAO +TCO +DIT -SSBS BTYPE=--) pc : generic_test_bit include/asm-generic/bitops/generic-non-atomic.h:128 [inline] pc : __lock_acquire+0x720/0x30a4 kernel/locking/lockdep.c:5207 lr : mark_usage kernel/locking/lockdep.c:4674 [inline] lr : __lock_acquire+0x700/0x30a4 kernel/locking/lockdep.c:5191 sp : ffff80009f1b7820 x29: ffff80009f1b7900 x28: 0000000000000001 x27: ffff0000d3202778 x26: ffff80008afabde8 x25: 0000000000000000 x24: 0000000000000001 x23: 0000000000000000 x22: 0000000000000000 x21: ffff0000d3201c80 x20: ffff8000975d1000 x19: 0000000000000000 x18: 1fffe0003377d090 x17: ffff80008f86e000 x16: ffff800082e5e68c x15: 0000000000000001 x14: 1fffe0003377fb48 x13: 0000000000000000 x12: 0000000000000000 x11: 66666666664e4a87 x10: ffff800093398d48 x9 : 000000000199392a x8 : 0000000000000000 x7 : ffff80008afabde8 x6 : 0000000000000000 x5 : 0000000000000001 x4 : 0000000000000001 x3 : 0000000000000000 x2 : 0000000000000008 x1 : ffff0000d3202778 x0 : 0000000000000001 Call trace: generic_test_bit include/asm-generic/bitops/generic-non-atomic.h:128 [inline] (P) __lock_acquire+0x720/0x30a4 kernel/locking/lockdep.c:5207 (P) lock_acquire+0x140/0x2e0 kernel/locking/lockdep.c:5868 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline] _raw_spin_lock_irqsave+0x5c/0x7c kernel/locking/spinlock.c:162 class_raw_spinlock_irqsave_constructor include/linux/spinlock.h:557 [inline] set_task_blocked_on include/linux/sched.h:2165 [inline] __mutex_lock_common+0xd24/0x2678 kernel/locking/mutex.c:701 __mutex_lock kernel/locking/mutex.c:776 [inline] mutex_lock_nested+0x2c/0x38 kernel/locking/mutex.c:828 l2cap_unregister_user+0x74/0x190 net/bluetooth/l2cap_core.c:1729 hidp_session_thread+0x3d0/0x490 net/bluetooth/hidp/core.c:1304 kthread+0x5fc/0x75c kernel/kthread.c:463 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:844 Code: 350000e8 f9400feb 93407d69 d346fd29 (f8697949) ---[ end trace 0000000000000000 ]--- ---------------- Code disassembly (best guess): 0: 350000e8 cbnz w8, 0x1c 4: f9400feb ldr x11, [sp, #24] 8: 93407d69 sxtw x9, w11 c: d346fd29 lsr x9, x9, #6 * 10: f8697949 ldr x9, [x10, x9, lsl #3] <-- trapping instruction