general protection fault, probably for non-canonical address 0xdffffc0000000024: 0000 [#1] PREEMPT SMP KASAN KASAN: null-ptr-deref in range [0x0000000000000120-0x0000000000000127] CPU: 0 PID: 4465 Comm: kworker/0:9 Not tainted 5.15.183-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 Workqueue: events l2cap_info_timeout RIP: 0010:__lock_acquire+0xe8/0x7c60 kernel/locking/lockdep.c:4882 Code: 42 0f b6 04 00 84 c0 0f 85 2f 65 00 00 83 3d 52 ed 0c 0c 00 0f 84 a8 27 00 00 83 3d 41 c6 a2 0a 00 74 29 48 89 d8 48 c1 e8 03 <42> 80 3c 00 00 74 12 48 89 df e8 99 49 61 00 49 b8 00 00 00 00 00 RSP: 0018:ffffc9000300f680 EFLAGS: 00010006 RAX: 0000000000000024 RBX: 0000000000000120 RCX: 1ffff92000601ef4 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000120 RBP: ffffc9000300f8d0 R08: dffffc0000000000 R09: 0000000000000000 R10: fffffbfff1ad148e R11: 1ffffffff1ad148d R12: 0000000000000001 R13: ffff888025f9d940 R14: 0000000000000000 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8880b9000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f87e975fe9c CR3: 000000001e1fc000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 3a810b1eb6134bdc DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: lock_acquire+0x197/0x3f0 kernel/locking/lockdep.c:5623 lock_sock_nested+0x44/0x100 net/core/sock.c:3251 lock_sock include/net/sock.h:1694 [inline] l2cap_sock_ready_cb+0x41/0x120 net/bluetooth/l2cap_sock.c:1649 l2cap_chan_ready net/bluetooth/l2cap_core.c:1386 [inline] l2cap_conn_start+0x749/0xde0 net/bluetooth/l2cap_core.c:1644 process_one_work+0x863/0x1000 kernel/workqueue.c:2310 worker_thread+0xaa8/0x12a0 kernel/workqueue.c:2457 kthread+0x436/0x520 kernel/kthread.c:334 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:287 Modules linked in: ---[ end trace 391744b3a144f7f9 ]--- RIP: 0010:__lock_acquire+0xe8/0x7c60 kernel/locking/lockdep.c:4882 Code: 42 0f b6 04 00 84 c0 0f 85 2f 65 00 00 83 3d 52 ed 0c 0c 00 0f 84 a8 27 00 00 83 3d 41 c6 a2 0a 00 74 29 48 89 d8 48 c1 e8 03 <42> 80 3c 00 00 74 12 48 89 df e8 99 49 61 00 49 b8 00 00 00 00 00 RSP: 0018:ffffc9000300f680 EFLAGS: 00010006 RAX: 0000000000000024 RBX: 0000000000000120 RCX: 1ffff92000601ef4 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000120 RBP: ffffc9000300f8d0 R08: dffffc0000000000 R09: 0000000000000000 R10: fffffbfff1ad148e R11: 1ffffffff1ad148d R12: 0000000000000001 R13: ffff888025f9d940 R14: 0000000000000000 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8880b9000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f87e975fe9c CR3: 000000001e1fc000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 3a810b1eb6134bdc DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 42 0f b6 04 00 movzbl (%rax,%r8,1),%eax 5: 84 c0 test %al,%al 7: 0f 85 2f 65 00 00 jne 0x653c d: 83 3d 52 ed 0c 0c 00 cmpl $0x0,0xc0ced52(%rip) # 0xc0ced66 14: 0f 84 a8 27 00 00 je 0x27c2 1a: 83 3d 41 c6 a2 0a 00 cmpl $0x0,0xaa2c641(%rip) # 0xaa2c662 21: 74 29 je 0x4c 23: 48 89 d8 mov %rbx,%rax 26: 48 c1 e8 03 shr $0x3,%rax * 2a: 42 80 3c 00 00 cmpb $0x0,(%rax,%r8,1) <-- trapping instruction 2f: 74 12 je 0x43 31: 48 89 df mov %rbx,%rdi 34: e8 99 49 61 00 call 0x6149d2 39: 49 rex.WB 3a: b8 00 00 00 00 mov $0x0,%eax