general protection fault, probably for non-canonical address 0xdffffc000000000b: 0000 [#1] PREEMPT SMP KASAN
KASAN: null-ptr-deref in range [0x0000000000000058-0x000000000000005f]
CPU: 0 PID: 6538 Comm: syz-executor Not tainted syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025
RIP: 0010:klist_put lib/klist.c:212 [inline]
RIP: 0010:klist_del lib/klist.c:230 [inline]
RIP: 0010:klist_remove+0x15c/0x390 lib/klist.c:249
Code: 80 3c 04 00 74 08 4c 89 f7 e8 b0 a4 89 f7 4d 8b 3e 49 83 e7 fe 49 8d 7f 58 48 89 f8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <80> 3c 08 00 74 05 e8 89 a4 89 f7 49 8b 47 58 48 89 44 24 10 4c 89
RSP: 0018:ffffc9000494f860 EFLAGS: 00010202
RAX: 000000000000000b RBX: ffff888023b60000 RCX: dffffc0000000000
RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000058
RBP: ffffc9000494f948 R08: ffffffff8e31c143 R09: 1ffffffff1c63828
R10: dffffc0000000000 R11: fffffbfff1c63829 R12: 1ffff11004bf210c
R13: dffffc0000000000 R14: ffff888025f90860 R15: 0000000000000000
FS: 0000000000000000(0000) GS:ffff8880b8e00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000020000000022c CR3: 0000000019294000 CR4: 00000000003506f0
Call Trace:
<TASK>
device_move+0x193/0x6f0 drivers/base/core.c:4654
hci_conn_del_sysfs+0xaf/0x160 net/bluetooth/hci_sysfs.c:75
hci_conn_cleanup net/bluetooth/hci_conn.c:175 [inline]
hci_conn_del+0x8d8/0xc80 net/bluetooth/hci_conn.c:1149
hci_conn_hash_flush+0x185/0x220 net/bluetooth/hci_conn.c:2541
hci_dev_close_sync+0x962/0xfb0 net/bluetooth/hci_sync.c:5285
hci_dev_do_close net/bluetooth/hci_core.c:523 [inline]
hci_unregister_dev+0x21a/0x510 net/bluetooth/hci_core.c:2709
vhci_release+0x155/0x1a0 drivers/bluetooth/hci_vhci.c:691
__fput+0x234/0x970 fs/file_table.c:384
task_work_run+0x1ce/0x250 kernel/task_work.c:239
exit_task_work include/linux/task_work.h:43 [inline]
do_exit+0x90b/0x23c0 kernel/exit.c:883
do_group_exit+0x21b/0x2d0 kernel/exit.c:1024
__do_sys_exit_group kernel/exit.c:1035 [inline]
__se_sys_exit_group kernel/exit.c:1033 [inline]
__x64_sys_exit_group+0x3f/0x40 kernel/exit.c:1033
do_syscall_x64 arch/x86/entry/common.c:51 [inline]
do_syscall_64+0x55/0xb0 arch/x86/entry/common.c:81
entry_SYSCALL_64_after_hwframe+0x68/0xd2
RIP: 0033:0x7fcd6ed8f749
Code: Unable to access opcode bytes at 0x7fcd6ed8f71f.
RSP: 002b:00007ffcbe047208 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
RAX: ffffffffffffffda RBX: 00007fcd6ee13da2 RCX: 00007fcd6ed8f749
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000001
RBP: 0000000000000075 R08: 00007ffcbe044fa5 R09: 00007ffcbe0484c0
R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffcbe0484c0
R13: 00007fcd6ee13d7d R14: 000000000003063e R15: 00007ffcbe049590
</TASK>
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:klist_put lib/klist.c:212 [inline]
RIP: 0010:klist_del lib/klist.c:230 [inline]
RIP: 0010:klist_remove+0x15c/0x390 lib/klist.c:249
Code: 80 3c 04 00 74 08 4c 89 f7 e8 b0 a4 89 f7 4d 8b 3e 49 83 e7 fe 49 8d 7f 58 48 89 f8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <80> 3c 08 00 74 05 e8 89 a4 89 f7 49 8b 47 58 48 89 44 24 10 4c 89
RSP: 0018:ffffc9000494f860 EFLAGS: 00010202
RAX: 000000000000000b RBX: ffff888023b60000 RCX: dffffc0000000000
RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000058
RBP: ffffc9000494f948 R08: ffffffff8e31c143 R09: 1ffffffff1c63828
R10: dffffc0000000000 R11: fffffbfff1c63829 R12: 1ffff11004bf210c
R13: dffffc0000000000 R14: ffff888025f90860 R15: 0000000000000000
FS: 0000000000000000(0000) GS:ffff8880b8f00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fa90f20c000 CR3: 000000002d2f2000 CR4: 00000000003506e0
----------------
Code disassembly (best guess):
0: 80 3c 04 00 cmpb $0x0,(%rsp,%rax,1)
4: 74 08 je 0xe
6: 4c 89 f7 mov %r14,%rdi
9: e8 b0 a4 89 f7 call 0xf789a4be
e: 4d 8b 3e mov (%r14),%r15
11: 49 83 e7 fe and $0xfffffffffffffffe,%r15
15: 49 8d 7f 58 lea 0x58(%r15),%rdi
19: 48 89 f8 mov %rdi,%rax
1c: 48 c1 e8 03 shr $0x3,%rax
20: 48 b9 00 00 00 00 00 movabs $0xdffffc0000000000,%rcx
27: fc ff df
* 2a: 80 3c 08 00 cmpb $0x0,(%rax,%rcx,1) <-- trapping instruction
2e: 74 05 je 0x35
30: e8 89 a4 89 f7 call 0xf789a4be
35: 49 8b 47 58 mov 0x58(%r15),%rax
39: 48 89 44 24 10 mov %rax,0x10(%rsp)
3e: 4c rex.WR
3f: 89 .byte 0x89