BUG: unable to handle page fault for address: ffffc90010a02010 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 13fe34067 P4D 13fe34067 PUD 1aee9067 PMD 34bc1067 PTE 0 Oops: Oops: 0000 [#1] SMP KASAN PTI CPU: 1 UID: 0 PID: 5597 Comm: kworker/u9:2 Tainted: G L syzkaller #0 PREEMPT_{RT,(full)} Tainted: [L]=SOFTLOCKUP Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 Workqueue: hci3 hci_rx_work RIP: 0010:kcov_remote_area_get kernel/kcov.c:142 [inline] RIP: 0010:kcov_remote_start+0x2a1/0x710 kernel/kcov.c:920 Code: 8a 8d 4c 8b b8 08 d4 6a 92 bd 00 00 04 00 eb 4f 41 8b ae a4 00 00 00 49 c7 c7 20 57 02 8e 4d 8b 3f 49 81 ff 20 57 02 8e 74 4c <41> 39 6f 10 75 ee 4c 89 ff e8 f1 55 e7 02 84 c0 74 0e 49 8b 07 49 RSP: 0018:ffffc90004d77a10 EFLAGS: 00010283 RAX: 0000000000000000 RBX: ffff88803f89dc40 RCX: 0000000000000000 RDX: 0000000063b08f00 RSI: 0000000000000001 RDI: ffffffff8ba74c00 RBP: 0000000000100000 R08: ffffffff8b1e5760 R09: ffffffff8dfc8140 R10: dffffc0000000000 R11: fffffbfff1f11a5f R12: 0000000000000002 R13: 0000000000000001 R14: ffff88802437bf00 R15: ffffc90010a02000 FS: 0000000000000000(0000) GS:ffff88812627c000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffc90010a02010 CR3: 00000000704c4000 CR4: 00000000003526f0 Call Trace: kcov_remote_start_common include/linux/kcov.h:50 [inline] hci_rx_work+0x10f/0x1040 net/bluetooth/hci_core.c:4040 process_one_work kernel/workqueue.c:3302 [inline] process_scheduled_works+0xb5d/0x1860 kernel/workqueue.c:3385 worker_thread+0xa53/0xfc0 kernel/workqueue.c:3466 kthread+0x388/0x470 kernel/kthread.c:436 ret_from_fork+0x514/0xb70 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 Modules linked in: CR2: ffffc90010a02010 ---[ end trace 0000000000000000 ]--- RIP: 0010:kcov_remote_area_get kernel/kcov.c:142 [inline] RIP: 0010:kcov_remote_start+0x2a1/0x710 kernel/kcov.c:920 Code: 8a 8d 4c 8b b8 08 d4 6a 92 bd 00 00 04 00 eb 4f 41 8b ae a4 00 00 00 49 c7 c7 20 57 02 8e 4d 8b 3f 49 81 ff 20 57 02 8e 74 4c <41> 39 6f 10 75 ee 4c 89 ff e8 f1 55 e7 02 84 c0 74 0e 49 8b 07 49 RSP: 0018:ffffc90004d77a10 EFLAGS: 00010283 RAX: 0000000000000000 RBX: ffff88803f89dc40 RCX: 0000000000000000 RDX: 0000000063b08f00 RSI: 0000000000000001 RDI: ffffffff8ba74c00 RBP: 0000000000100000 R08: ffffffff8b1e5760 R09: ffffffff8dfc8140 R10: dffffc0000000000 R11: fffffbfff1f11a5f R12: 0000000000000002 R13: 0000000000000001 R14: ffff88802437bf00 R15: ffffc90010a02000 FS: 0000000000000000(0000) GS:ffff88812627c000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffc90010a02010 CR3: 00000000704c4000 CR4: 00000000003526f0 ---------------- Code disassembly (best guess), 1 bytes skipped: 0: 8d 4c 8b b8 lea -0x48(%rbx,%rcx,4),%ecx 4: 08 d4 or %dl,%ah 6: 6a 92 push $0xffffffffffffff92 8: bd 00 00 04 00 mov $0x40000,%ebp d: eb 4f jmp 0x5e f: 41 8b ae a4 00 00 00 mov 0xa4(%r14),%ebp 16: 49 c7 c7 20 57 02 8e mov $0xffffffff8e025720,%r15 1d: 4d 8b 3f mov (%r15),%r15 20: 49 81 ff 20 57 02 8e cmp $0xffffffff8e025720,%r15 27: 74 4c je 0x75 * 29: 41 39 6f 10 cmp %ebp,0x10(%r15) <-- trapping instruction 2d: 75 ee jne 0x1d 2f: 4c 89 ff mov %r15,%rdi 32: e8 f1 55 e7 02 call 0x2e75628 37: 84 c0 test %al,%al 39: 74 0e je 0x49 3b: 49 8b 07 mov (%r15),%rax 3e: 49 rex.WB