general protection fault, probably for non-canonical address 0xeffffc000ced900b: 0000 [#1] PREEMPT SMP KASAN PTI KASAN: maybe wild-memory-access in range [0x80000000676c8058-0x80000000676c805f] CPU: 1 PID: 5230 Comm: kbnepd bnep0 Not tainted 6.9.0-rc5-syzkaller-00042-ge88c4cfcb7b8 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 RIP: 0010:klist_next+0x4d/0x520 lib/klist.c:377 Code: 00 fc ff df 48 c1 ea 03 80 3c 02 00 0f 85 39 04 00 00 48 b8 00 00 00 00 00 fc ff df 48 8b 2b 48 8d 7d 58 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 3e 04 00 00 4c 8d 6b 08 4c 8b 75 58 48 b8 00 00 RSP: 0000:ffffc900048879e8 EFLAGS: 00010a03 RAX: dffffc0000000000 RBX: ffffc90004887a50 RCX: ffffffff859c9493 RDX: 100000000ced900b RSI: ffffffff8ac6435a RDI: 80000000676c805f RBP: 80000000676c8007 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000003 R12: ffffffff859c9250 R13: ffffc90004887a50 R14: 1ffff92000910f46 R15: dffffc0000000000 FS: 0000000000000000(0000) GS:ffff8880b9500000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f11fb9a2e1c CR3: 00000000234d0000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: next_device drivers/base/core.c:3970 [inline] device_for_each_child+0xcf/0x190 drivers/base/core.c:4048 pm_runtime_set_memalloc_noio+0xf2/0x180 drivers/base/power/runtime.c:248 netdev_unregister_kobject+0x1ed/0x270 net/core/net-sysfs.c:2106 unregister_netdevice_many_notify+0xc8a/0x19f0 net/core/dev.c:11135 unregister_netdevice_many net/core/dev.c:11163 [inline] unregister_netdevice_queue+0x307/0x3f0 net/core/dev.c:11042 unregister_netdevice include/linux/netdevice.h:3115 [inline] unregister_netdev+0x1c/0x30 net/core/dev.c:11181 bnep_session+0x220d/0x2d60 net/bluetooth/bnep/core.c:525 kthread+0x2c1/0x3a0 kernel/kthread.c:388 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:klist_next+0x4d/0x520 lib/klist.c:377 Code: 00 fc ff df 48 c1 ea 03 80 3c 02 00 0f 85 39 04 00 00 48 b8 00 00 00 00 00 fc ff df 48 8b 2b 48 8d 7d 58 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 3e 04 00 00 4c 8d 6b 08 4c 8b 75 58 48 b8 00 00 RSP: 0000:ffffc900048879e8 EFLAGS: 00010a03 RAX: dffffc0000000000 RBX: ffffc90004887a50 RCX: ffffffff859c9493 RDX: 100000000ced900b RSI: ffffffff8ac6435a RDI: 80000000676c805f RBP: 80000000676c8007 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000003 R12: ffffffff859c9250 R13: ffffc90004887a50 R14: 1ffff92000910f46 R15: dffffc0000000000 FS: 0000000000000000(0000) GS:ffff8880b9500000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f11fb9a2e1c CR3: 000000000d57a000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess), 4 bytes skipped: 0: 48 c1 ea 03 shr $0x3,%rdx 4: 80 3c 02 00 cmpb $0x0,(%rdx,%rax,1) 8: 0f 85 39 04 00 00 jne 0x447 e: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 15: fc ff df 18: 48 8b 2b mov (%rbx),%rbp 1b: 48 8d 7d 58 lea 0x58(%rbp),%rdi 1f: 48 89 fa mov %rdi,%rdx 22: 48 c1 ea 03 shr $0x3,%rdx * 26: 80 3c 02 00 cmpb $0x0,(%rdx,%rax,1) <-- trapping instruction 2a: 0f 85 3e 04 00 00 jne 0x46e 30: 4c 8d 6b 08 lea 0x8(%rbx),%r13 34: 4c 8b 75 58 mov 0x58(%rbp),%r14 38: 48 rex.W 39: b8 .byte 0xb8