Unable to handle kernel paging request at virtual address dfff800000000024 Mem abort info: ESR = 0x0000000096000006 EC = 0x25: DABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x06: level 2 translation fault Data abort info: ISV = 0, ISS = 0x00000006 CM = 0, WnR = 0 [dfff800000000024] address between user and kernel address ranges Internal error: Oops: 0000000096000006 [#1] PREEMPT SMP Modules linked in: CPU: 0 PID: 4421 Comm: kworker/0:7 Not tainted syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/26/2026 Workqueue: events l2cap_info_timeout pstate: 824000c5 (Nzcv daIF +PAN -UAO +TCO -DIT -SSBS BTYPE=--) pc : __lock_acquire+0xf4/0x67ec kernel/locking/lockdep.c:4882 lr : lock_acquire+0x1f4/0x618 kernel/locking/lockdep.c:5623 sp : ffff80001ff075c0 x29: ffff80001ff077d0 x28: 0000000000000000 x27: 0000000000000001 x26: 0000000000000120 x25: 1ffff0000285402a x24: 0000000000000000 x23: dfff800000000000 x22: 0000000000000000 x21: 0000000000000000 x20: ffff8000105efda8 x19: 0000000000000000 x18: 000000000857ccce x17: ffff800016e33000 x16: ffff80001125a830 x15: ffff800016913500 x14: 0000000000000003 x13: 1ffff00003fe0ed0 x12: 0000000000ff0100 x11: 0000000000000000 x10: ffff700003fe0ed8 x9 : ffff0000d8cc0000 x8 : 0000000000000024 x7 : ffff8000105efda8 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000001 x3 : 0000000000000000 x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000120 Call trace: __lock_acquire+0xf4/0x67ec kernel/locking/lockdep.c:4882 lock_acquire+0x1f4/0x618 kernel/locking/lockdep.c:5623 lock_sock_nested+0xd8/0x1d4 net/core/sock.c:3259 lock_sock include/net/sock.h:1744 [inline] l2cap_sock_ready_cb+0x4c/0x12c net/bluetooth/l2cap_sock.c:1652 l2cap_chan_ready net/bluetooth/l2cap_core.c:1387 [inline] l2cap_conn_start+0x5d4/0xb94 net/bluetooth/l2cap_core.c:1646 l2cap_info_timeout+0x68/0xb8 net/bluetooth/l2cap_core.c:1813 process_one_work+0x79c/0x1138 kernel/workqueue.c:2310 worker_thread+0x8f4/0x1034 kernel/workqueue.c:2457 kthread+0x374/0x454 kernel/kthread.c:334 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:856 Code: 900603e8 b9400108 340001c8 d343ff48 (38776908) ---[ end trace 3fc1ed8e67260a58 ]--- ---------------- Code disassembly (best guess): 0: 900603e8 adrp x8, 0xc07c000 4: b9400108 ldr w8, [x8] 8: 340001c8 cbz w8, 0x40 c: d343ff48 lsr x8, x26, #3 * 10: 38776908 ldrb w8, [x8, x23] <-- trapping instruction