general protection fault, probably for non-canonical address 0xdffffc0000000013: 0000 [#1] PREEMPT SMP KASAN KASAN: null-ptr-deref in range [0x0000000000000098-0x000000000000009f] CPU: 1 PID: 27994 Comm: kworker/1:6 Not tainted 6.5.0-syzkaller-12673-g73be7fb14e83 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023 Workqueue: events l2cap_info_timeout RIP: 0010:debug_spin_lock_before kernel/locking/spinlock_debug.c:85 [inline] RIP: 0010:do_raw_spin_lock+0x6e/0x2b0 kernel/locking/spinlock_debug.c:114 Code: 81 48 8d 54 05 00 c7 02 f1 f1 f1 f1 c7 42 04 04 f3 f3 f3 65 48 8b 14 25 28 00 00 00 48 89 54 24 60 31 d2 48 89 fa 48 c1 ea 03 <0f> b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 e3 RSP: 0018:ffffc900100c7ab0 EFLAGS: 00010203 RAX: dffffc0000000000 RBX: 0000000000000098 RCX: 0000000000000000 RDX: 0000000000000013 RSI: ffffffff8ae92720 RDI: 000000000000009c RBP: 1ffff92002018f57 R08: 0000000000000000 R09: fffffbfff1d9c43a R10: ffffffff8ece21d7 R11: 0000000000000000 R12: 0000000000000098 R13: 0000000000000003 R14: ffff88802199f4b8 R15: 0000000000000004 FS: 0000000000000000(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f87c9effbc1 CR3: 000000004335b000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: spin_lock_bh include/linux/spinlock.h:356 [inline] lock_sock_nested+0x5f/0xf0 net/core/sock.c:3508 lock_sock include/net/sock.h:1722 [inline] l2cap_sock_ready_cb+0x41/0x160 net/bluetooth/l2cap_sock.c:1630 l2cap_chan_ready net/bluetooth/l2cap_core.c:1365 [inline] l2cap_conn_start+0x15c/0xa40 net/bluetooth/l2cap_core.c:1640 process_one_work+0x887/0x15d0 kernel/workqueue.c:2630 process_scheduled_works kernel/workqueue.c:2703 [inline] worker_thread+0x8bb/0x1290 kernel/workqueue.c:2784 kthread+0x33a/0x430 kernel/kthread.c:388 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:304 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:debug_spin_lock_before kernel/locking/spinlock_debug.c:85 [inline] RIP: 0010:do_raw_spin_lock+0x6e/0x2b0 kernel/locking/spinlock_debug.c:114 Code: 81 48 8d 54 05 00 c7 02 f1 f1 f1 f1 c7 42 04 04 f3 f3 f3 65 48 8b 14 25 28 00 00 00 48 89 54 24 60 31 d2 48 89 fa 48 c1 ea 03 <0f> b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 e3 RSP: 0018:ffffc900100c7ab0 EFLAGS: 00010203 RAX: dffffc0000000000 RBX: 0000000000000098 RCX: 0000000000000000 RDX: 0000000000000013 RSI: ffffffff8ae92720 RDI: 000000000000009c RBP: 1ffff92002018f57 R08: 0000000000000000 R09: fffffbfff1d9c43a R10: ffffffff8ece21d7 R11: 0000000000000000 R12: 0000000000000098 R13: 0000000000000003 R14: ffff88802199f4b8 R15: 0000000000000004 FS: 0000000000000000(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f87c9effbc1 CR3: 000000004335b000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 81 48 8d 54 05 00 c7 orl $0xc7000554,-0x73(%rax) 7: 02 f1 add %cl,%dh 9: f1 int1 a: f1 int1 b: f1 int1 c: c7 42 04 04 f3 f3 f3 movl $0xf3f3f304,0x4(%rdx) 13: 65 48 8b 14 25 28 00 mov %gs:0x28,%rdx 1a: 00 00 1c: 48 89 54 24 60 mov %rdx,0x60(%rsp) 21: 31 d2 xor %edx,%edx 23: 48 89 fa mov %rdi,%rdx 26: 48 c1 ea 03 shr $0x3,%rdx * 2a: 0f b6 14 02 movzbl (%rdx,%rax,1),%edx <-- trapping instruction 2e: 48 89 f8 mov %rdi,%rax 31: 83 e0 07 and $0x7,%eax 34: 83 c0 03 add $0x3,%eax 37: 38 d0 cmp %dl,%al 39: 7c 08 jl 0x43 3b: 84 d2 test %dl,%dl 3d: 0f .byte 0xf 3e: 85 e3 test %esp,%ebx