Unable to handle kernel paging request at virtual address dfff800000000005 KASAN: null-ptr-deref in range [0x0000000000000028-0x000000000000002f] Mem abort info: ESR = 0x0000000096000005 EC = 0x25: DABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x05: level 1 translation fault Data abort info: ISV = 0, ISS = 0x00000005, ISS2 = 0x00000000 CM = 0, WnR = 0, TnD = 0, TagAccess = 0 GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 [dfff800000000005] address between user and kernel address ranges Internal error: Oops: 0000000096000005 [#1] SMP Modules linked in: CPU: 0 UID: 0 PID: 7082 Comm: kworker/0:38 Tainted: G B syzkaller #0 PREEMPT Tainted: [B]=BAD_PAGE Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 Workqueue: events request_firmware_work_func pstate: 83400005 (Nzcv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--) pc : load_firmware_cb+0x22c/0x14f4 drivers/media/tuners/xc2028.c:1376 lr : load_firmware_cb+0xe0/0x14f4 drivers/media/tuners/xc2028.c:1374 sp : ffff80009ede78a0 x29: ffff80009ede79f0 x28: 1ffff00011efe299 x27: 0000000000000000 x26: dfff800000000000 x25: ffff700013dbcf28 x24: 1fffe00018c54a63 x23: ffff80009ede7940 x22: 0000000000000000 x21: 0000000000000000 x20: 0000000000000000 x19: ffff0000c62a5318 x18: 00000000ffffffff x17: ffff0001fea8d8b0 x16: ffff80008052b424 x15: 0000000000000001 x14: 000000008045443c x13: 0000000028bf1cd6 x12: ffff8000801fb550 x11: ffff800093339c28 x10: 0000000000ff0100 x9 : 0000000000000000 x8 : 0000000000000005 x7 : 0000000000000000 x6 : 000000000000003f x5 : 0000000000000040 x4 : 0000000000000001 x3 : ffff8000870c0424 x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000028 Call trace: load_firmware_cb+0x22c/0x14f4 drivers/media/tuners/xc2028.c:1376 (P) request_firmware_work_func+0xe8/0x19c drivers/base/firmware_loader/main.c:1161 process_one_work+0x7e8/0x155c kernel/workqueue.c:3236 process_scheduled_works kernel/workqueue.c:3319 [inline] worker_thread+0x958/0xed8 kernel/workqueue.c:3400 kthread+0x5fc/0x75c kernel/kthread.c:463 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:844 Code: b5fff65b f9403bf6 9100a2c0 d343fc08 (387a6908) ---[ end trace 0000000000000000 ]--- ---------------- Code disassembly (best guess): 0: b5fff65b cbnz x27, 0xfffffffffffffec8 4: f9403bf6 ldr x22, [sp, #112] 8: 9100a2c0 add x0, x22, #0x28 c: d343fc08 lsr x8, x0, #3 * 10: 387a6908 ldrb w8, [x8, x26] <-- trapping instruction