general protection fault, probably for non-canonical address 0xdffffc0000000026: 0000 [#1] PREEMPT SMP KASAN KASAN: null-ptr-deref in range [0x0000000000000130-0x0000000000000137] CPU: 0 PID: 968 Comm: kworker/0:3 Not tainted 6.6.93-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 Workqueue: events l2cap_info_timeout RIP: 0010:__lock_acquire+0xeb/0x7c80 kernel/locking/lockdep.c:5005 Code: 85 dc 66 00 00 83 3d 4f dd e2 0c 00 48 89 9c 24 f0 00 00 00 0f 84 11 10 00 00 83 3d be c9 58 0b 00 74 36 48 89 f8 48 c1 e8 03 <42> 80 3c 00 00 74 1f 48 8b bc 24 88 00 00 00 e8 d1 3c 77 00 48 8b RSP: 0018:ffffc90004297600 EFLAGS: 00010002 RAX: 0000000000000026 RBX: 1ffff92000852ee4 RCX: 0000000000000000 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000130 RBP: ffffc90004297848 R08: dffffc0000000000 R09: 0000000000000000 R10: dffffc0000000000 R11: fffffbfff1c934ee R12: 0000000000000001 R13: 0000000000000000 R14: ffff888021f3bc00 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8880b8e00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ff1e9bcd893 CR3: 0000000075189000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: lock_acquire+0x197/0x410 kernel/locking/lockdep.c:5754 lock_sock_nested+0x48/0x100 net/core/sock.c:3510 lock_sock include/net/sock.h:1731 [inline] l2cap_sock_ready_cb+0x45/0x130 net/bluetooth/l2cap_sock.c:1658 l2cap_chan_ready net/bluetooth/l2cap_core.c:1263 [inline] l2cap_conn_start+0x753/0xe40 net/bluetooth/l2cap_core.c:1512 l2cap_info_timeout+0x68/0xa0 net/bluetooth/l2cap_core.c:1669 process_one_work kernel/workqueue.c:2634 [inline] process_scheduled_works+0xa45/0x15b0 kernel/workqueue.c:2711 worker_thread+0xa55/0xfc0 kernel/workqueue.c:2792 kthread+0x2fa/0x390 kernel/kthread.c:388 ret_from_fork+0x48/0x80 arch/x86/kernel/process.c:152 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:293 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:__lock_acquire+0xeb/0x7c80 kernel/locking/lockdep.c:5005 Code: 85 dc 66 00 00 83 3d 4f dd e2 0c 00 48 89 9c 24 f0 00 00 00 0f 84 11 10 00 00 83 3d be c9 58 0b 00 74 36 48 89 f8 48 c1 e8 03 <42> 80 3c 00 00 74 1f 48 8b bc 24 88 00 00 00 e8 d1 3c 77 00 48 8b RSP: 0018:ffffc90004297600 EFLAGS: 00010002 RAX: 0000000000000026 RBX: 1ffff92000852ee4 RCX: 0000000000000000 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000130 RBP: ffffc90004297848 R08: dffffc0000000000 R09: 0000000000000000 R10: dffffc0000000000 R11: fffffbfff1c934ee R12: 0000000000000001 R13: 0000000000000000 R14: ffff888021f3bc00 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8880b8e00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ff1e9bcd893 CR3: 0000000075189000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 85 dc test %ebx,%esp 2: 66 00 00 data16 add %al,(%rax) 5: 83 3d 4f dd e2 0c 00 cmpl $0x0,0xce2dd4f(%rip) # 0xce2dd5b c: 48 89 9c 24 f0 00 00 mov %rbx,0xf0(%rsp) 13: 00 14: 0f 84 11 10 00 00 je 0x102b 1a: 83 3d be c9 58 0b 00 cmpl $0x0,0xb58c9be(%rip) # 0xb58c9df 21: 74 36 je 0x59 23: 48 89 f8 mov %rdi,%rax 26: 48 c1 e8 03 shr $0x3,%rax * 2a: 42 80 3c 00 00 cmpb $0x0,(%rax,%r8,1) <-- trapping instruction 2f: 74 1f je 0x50 31: 48 8b bc 24 88 00 00 mov 0x88(%rsp),%rdi 38: 00 39: e8 d1 3c 77 00 call 0x773d0f 3e: 48 rex.W 3f: 8b .byte 0x8b