general protection fault, probably for non-canonical address 0xdffffc000000000b: 0000 [#1] PREEMPT SMP KASAN KASAN: null-ptr-deref in range [0x0000000000000058-0x000000000000005f] CPU: 0 PID: 7668 Comm: syz-executor Not tainted syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 RIP: 0010:klist_put lib/klist.c:212 [inline] RIP: 0010:klist_del lib/klist.c:230 [inline] RIP: 0010:klist_remove+0x15c/0x390 lib/klist.c:249 Code: 80 3c 04 00 74 08 4c 89 f7 e8 c0 b8 82 f7 4d 8b 3e 49 83 e7 fe 49 8d 7f 58 48 89 f8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <80> 3c 08 00 74 05 e8 99 b8 82 f7 49 8b 47 58 48 89 44 24 10 4c 89 RSP: 0018:ffffc900047ff860 EFLAGS: 00010202 RAX: 000000000000000b RBX: ffff88805efa9e00 RCX: dffffc0000000000 RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000058 RBP: ffffc900047ff948 R08: ffffffff8e322483 R09: 1ffffffff1c64490 R10: dffffc0000000000 R11: fffffbfff1c64491 R12: 1ffff1100bbd330c R13: dffffc0000000000 R14: ffff88805de99860 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8880b8e00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000559dc1ab4000 CR3: 0000000025dc5000 CR4: 00000000003506f0 Call Trace: device_move+0x193/0x6f0 drivers/base/core.c:4654 hci_conn_del_sysfs+0xaf/0x160 net/bluetooth/hci_sysfs.c:75 hci_conn_cleanup net/bluetooth/hci_conn.c:175 [inline] hci_conn_del+0x8d8/0xc80 net/bluetooth/hci_conn.c:1149 hci_conn_hash_flush+0x185/0x220 net/bluetooth/hci_conn.c:2541 hci_dev_close_sync+0x962/0xfb0 net/bluetooth/hci_sync.c:5271 hci_dev_do_close net/bluetooth/hci_core.c:523 [inline] hci_unregister_dev+0x21a/0x510 net/bluetooth/hci_core.c:2709 vhci_release+0x155/0x1a0 drivers/bluetooth/hci_vhci.c:691 __fput+0x234/0x970 fs/file_table.c:384 task_work_run+0x1ce/0x250 kernel/task_work.c:239 exit_task_work include/linux/task_work.h:43 [inline] do_exit+0x90b/0x23c0 kernel/exit.c:883 do_group_exit+0x21b/0x2d0 kernel/exit.c:1024 __do_sys_exit_group kernel/exit.c:1035 [inline] __se_sys_exit_group kernel/exit.c:1033 [inline] __x64_sys_exit_group+0x3f/0x40 kernel/exit.c:1033 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x55/0xb0 arch/x86/entry/common.c:81 entry_SYSCALL_64_after_hwframe+0x68/0xd2 RIP: 0033:0x7fe1b878eec9 Code: Unable to access opcode bytes at 0x7fe1b878ee9f. RSP: 002b:00007ffd250224d8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 RAX: ffffffffffffffda RBX: 00007fe1b88137cb RCX: 00007fe1b878eec9 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000043 RBP: 00007fe1b88137dd R08: 00007ffd25020277 R09: 00000000000927c0 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 R13: 00000000000927c0 R14: 0000000000035e20 R15: 00007ffd25022680 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:klist_put lib/klist.c:212 [inline] RIP: 0010:klist_del lib/klist.c:230 [inline] RIP: 0010:klist_remove+0x15c/0x390 lib/klist.c:249 Code: 80 3c 04 00 74 08 4c 89 f7 e8 c0 b8 82 f7 4d 8b 3e 49 83 e7 fe 49 8d 7f 58 48 89 f8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <80> 3c 08 00 74 05 e8 99 b8 82 f7 49 8b 47 58 48 89 44 24 10 4c 89 RSP: 0018:ffffc900047ff860 EFLAGS: 00010202 RAX: 000000000000000b RBX: ffff88805efa9e00 RCX: dffffc0000000000 RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000058 RBP: ffffc900047ff948 R08: ffffffff8e322483 R09: 1ffffffff1c64490 R10: dffffc0000000000 R11: fffffbfff1c64491 R12: 1ffff1100bbd330c R13: dffffc0000000000 R14: ffff88805de99860 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8880b8f00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f5e5d717d60 CR3: 000000000cb30000 CR4: 00000000003506e0 ---------------- Code disassembly (best guess): 0: 80 3c 04 00 cmpb $0x0,(%rsp,%rax,1) 4: 74 08 je 0xe 6: 4c 89 f7 mov %r14,%rdi 9: e8 c0 b8 82 f7 call 0xf782b8ce e: 4d 8b 3e mov (%r14),%r15 11: 49 83 e7 fe and $0xfffffffffffffffe,%r15 15: 49 8d 7f 58 lea 0x58(%r15),%rdi 19: 48 89 f8 mov %rdi,%rax 1c: 48 c1 e8 03 shr $0x3,%rax 20: 48 b9 00 00 00 00 00 movabs $0xdffffc0000000000,%rcx 27: fc ff df * 2a: 80 3c 08 00 cmpb $0x0,(%rax,%rcx,1) <-- trapping instruction 2e: 74 05 je 0x35 30: e8 99 b8 82 f7 call 0xf782b8ce 35: 49 8b 47 58 mov 0x58(%r15),%rax 39: 48 89 44 24 10 mov %rax,0x10(%rsp) 3e: 4c rex.WR 3f: 89 .byte 0x89