Oops: general protection fault, probably for non-canonical address 0xdffffc0000000006: 0000 [#1] SMP KASAN NOPTI KASAN: null-ptr-deref in range [0x0000000000000030-0x0000000000000037] CPU: 0 UID: 0 PID: 7594 Comm: syz.0.391 Tainted: G L syzkaller #0 PREEMPT(full) Tainted: [L]=SOFTLOCKUP Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 RIP: 0010:kernfs_rename_ns+0x3b/0xa70 fs/kernfs/dir.c:1752 Code: 48 89 fb 4c 8d 73 30 48 83 ec 28 48 89 14 24 48 89 4c 24 08 e8 86 8c 4f ff 4c 89 f2 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 16 09 00 00 48 8b 43 30 48 85 c0 0f 84 ca 08 00 RSP: 0018:ffffc90004487768 EFLAGS: 00010206 RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000000 RDX: 0000000000000006 RSI: ffffffff82b96b1a RDI: 0000000000000000 RBP: ffff888020aa7000 R08: 0000000000000007 R09: 0000000000000000 R10: 000000007fffffff R11: ffffffff8b914418 R12: ffff888057075dc0 R13: ffff88803646ec00 R14: 0000000000000030 R15: 1ffff92000890ef9 FS: 0000000000000000(0000) GS:ffff888124339000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f7aa29e9f00 CR3: 000000005f272000 CR4: 00000000003526f0 Call Trace: kobject_move+0x127/0x260 lib/kobject.c:569 device_move+0xa9/0x1140 drivers/base/core.c:4608 hci_conn_del_sysfs+0x86/0x1a0 net/bluetooth/hci_sysfs.c:75 hci_conn_cleanup net/bluetooth/hci_conn.c:173 [inline] hci_conn_del+0x506/0x1180 net/bluetooth/hci_conn.c:1240 hci_conn_hash_flush+0x186/0x280 net/bluetooth/hci_conn.c:2651 hci_dev_close_sync+0x5a7/0x1240 net/bluetooth/hci_sync.c:5368 hci_dev_do_close+0x2e/0xb0 net/bluetooth/hci_core.c:502 hci_unregister_dev+0x227/0x670 net/bluetooth/hci_core.c:2716 vhci_release+0x17d/0x230 drivers/bluetooth/hci_vhci.c:690 __fput+0x3ff/0xb40 fs/file_table.c:469 task_work_run+0x150/0x240 kernel/task_work.c:233 exit_task_work include/linux/task_work.h:40 [inline] do_exit+0x8b8/0x2b60 kernel/exit.c:976 do_group_exit+0xd5/0x2a0 kernel/exit.c:1118 get_signal+0x1ec7/0x21e0 kernel/signal.c:3034 arch_do_signal_or_restart+0x91/0x7a0 arch/x86/kernel/signal.c:337 __exit_to_user_mode_loop kernel/entry/common.c:64 [inline] exit_to_user_mode_loop kernel/entry/common.c:98 [inline] __exit_to_user_mode_prepare include/linux/irq-entry-common.h:226 [inline] irqentry_exit_to_user_mode_prepare include/linux/irq-entry-common.h:270 [inline] irqentry_exit_to_user_mode include/linux/irq-entry-common.h:339 [inline] irqentry_exit+0x1f8/0x670 kernel/entry/common.c:219 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:618 RIP: 0033:0x7fbe98d9c821 Code: Unable to access opcode bytes at 0x7fbe98d9c7f7. RSP: 002b:fffffffffffffe70 EFLAGS: 00010217 RAX: 0000000000000000 RBX: 00007fbe99016090 RCX: 00007fbe98d9c819 RDX: 0000000000000000 RSI: fffffffffffffe70 RDI: 0000000000008000 RBP: 00007fbe98e32c91 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 R13: 00007fbe99016128 R14: 00007fbe99016090 R15: 00007fff7097c998 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:kernfs_rename_ns+0x3b/0xa70 fs/kernfs/dir.c:1752 Code: 48 89 fb 4c 8d 73 30 48 83 ec 28 48 89 14 24 48 89 4c 24 08 e8 86 8c 4f ff 4c 89 f2 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 16 09 00 00 48 8b 43 30 48 85 c0 0f 84 ca 08 00 RSP: 0018:ffffc90004487768 EFLAGS: 00010206 RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000000 RDX: 0000000000000006 RSI: ffffffff82b96b1a RDI: 0000000000000000 RBP: ffff888020aa7000 R08: 0000000000000007 R09: 0000000000000000 R10: 000000007fffffff R11: ffffffff8b914418 R12: ffff888057075dc0 R13: ffff88803646ec00 R14: 0000000000000030 R15: 1ffff92000890ef9 FS: 0000000000000000(0000) GS:ffff888124339000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055634bc5e300 CR3: 0000000050813000 CR4: 00000000003526f0 ---------------- Code disassembly (best guess): 0: 48 89 fb mov %rdi,%rbx 3: 4c 8d 73 30 lea 0x30(%rbx),%r14 7: 48 83 ec 28 sub $0x28,%rsp b: 48 89 14 24 mov %rdx,(%rsp) f: 48 89 4c 24 08 mov %rcx,0x8(%rsp) 14: e8 86 8c 4f ff call 0xff4f8c9f 19: 4c 89 f2 mov %r14,%rdx 1c: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 23: fc ff df 26: 48 c1 ea 03 shr $0x3,%rdx * 2a: 80 3c 02 00 cmpb $0x0,(%rdx,%rax,1) <-- trapping instruction 2e: 0f 85 16 09 00 00 jne 0x94a 34: 48 8b 43 30 mov 0x30(%rbx),%rax 38: 48 85 c0 test %rax,%rax 3b: 0f .byte 0xf 3c: 84 ca test %cl,%dl 3e: 08 00 or %al,(%rax)