BUG: kernel NULL pointer dereference, address: 0000000000000002
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 8000000027d11067 P4D 8000000027d11067 PUD 7c5ce067 PMD 0 
Oops: Oops: 0000 [#1] PREEMPT SMP KASAN PTI
CPU: 1 UID: 0 PID: 46 Comm: kworker/1:1 Not tainted 6.13.0-rc4-syzkaller-00054-gd6ef8b40d075 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
Workqueue: slub_flushwq flush_cpu_slab
RIP: 0010:PagePoisoned include/linux/page-flags.h:293 [inline]
RIP: 0010:page_to_nid include/linux/mm.h:1648 [inline]
RIP: 0010:folio_nid include/linux/mm.h:1654 [inline]
RIP: 0010:slab_nid mm/slab.h:201 [inline]
RIP: 0010:__put_partials+0x2d/0x1c0 mm/slub.c:3131
Code: 41 56 41 55 41 54 53 48 83 ec 18 48 85 f6 0f 84 51 01 00 00 48 89 f3 49 89 fe 31 c0 48 89 44 24 08 31 c0 48 89 04 24 45 31 ed <48> 8b 03 48 83 f8 ff 0f 84 41 01 00 00 4c 8b 7b 10 48 c1 e8 3a 49
RSP: 0000:ffffc90000b67b08 EFLAGS: 00010246
RAX: 0000000000000000 RBX: 0000000000000002 RCX: ffffffff817b274a
RDX: dffffc0000000000 RSI: 0000000000000002 RDI: ffff88814e5f6b40
RBP: 0000000000000001 R08: ffffffff942708b7 R09: 1ffffffff284e116
R10: dffffc0000000000 R11: fffffbfff284e117 R12: 0000000000000002
R13: 0000000000000000 R14: ffff88814e5f6b40 R15: ffff88801daebc00
FS:  0000000000000000(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000002 CR3: 00000000311ea000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 <TASK>
 put_partials mm/slub.c:3176 [inline]
 flush_cpu_slab+0x2bf/0x450 mm/slub.c:3311
 process_one_work kernel/workqueue.c:3229 [inline]
 process_scheduled_works+0xa66/0x1840 kernel/workqueue.c:3310
 worker_thread+0x870/0xd30 kernel/workqueue.c:3391
 kthread+0x2f0/0x390 kernel/kthread.c:389
 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
 </TASK>
Modules linked in:
CR2: 0000000000000002
---[ end trace 0000000000000000 ]---
RIP: 0010:PagePoisoned include/linux/page-flags.h:293 [inline]
RIP: 0010:page_to_nid include/linux/mm.h:1648 [inline]
RIP: 0010:folio_nid include/linux/mm.h:1654 [inline]
RIP: 0010:slab_nid mm/slab.h:201 [inline]
RIP: 0010:__put_partials+0x2d/0x1c0 mm/slub.c:3131
Code: 41 56 41 55 41 54 53 48 83 ec 18 48 85 f6 0f 84 51 01 00 00 48 89 f3 49 89 fe 31 c0 48 89 44 24 08 31 c0 48 89 04 24 45 31 ed <48> 8b 03 48 83 f8 ff 0f 84 41 01 00 00 4c 8b 7b 10 48 c1 e8 3a 49
RSP: 0000:ffffc90000b67b08 EFLAGS: 00010246
RAX: 0000000000000000 RBX: 0000000000000002 RCX: ffffffff817b274a
RDX: dffffc0000000000 RSI: 0000000000000002 RDI: ffff88814e5f6b40
RBP: 0000000000000001 R08: ffffffff942708b7 R09: 1ffffffff284e116
R10: dffffc0000000000 R11: fffffbfff284e117 R12: 0000000000000002
R13: 0000000000000000 R14: ffff88814e5f6b40 R15: ffff88801daebc00
FS:  0000000000000000(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000002 CR3: 00000000311ea000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
   0:	41 56                	push   %r14
   2:	41 55                	push   %r13
   4:	41 54                	push   %r12
   6:	53                   	push   %rbx
   7:	48 83 ec 18          	sub    $0x18,%rsp
   b:	48 85 f6             	test   %rsi,%rsi
   e:	0f 84 51 01 00 00    	je     0x165
  14:	48 89 f3             	mov    %rsi,%rbx
  17:	49 89 fe             	mov    %rdi,%r14
  1a:	31 c0                	xor    %eax,%eax
  1c:	48 89 44 24 08       	mov    %rax,0x8(%rsp)
  21:	31 c0                	xor    %eax,%eax
  23:	48 89 04 24          	mov    %rax,(%rsp)
  27:	45 31 ed             	xor    %r13d,%r13d
* 2a:	48 8b 03             	mov    (%rbx),%rax <-- trapping instruction
  2d:	48 83 f8 ff          	cmp    $0xffffffffffffffff,%rax
  31:	0f 84 41 01 00 00    	je     0x178
  37:	4c 8b 7b 10          	mov    0x10(%rbx),%r15
  3b:	48 c1 e8 3a          	shr    $0x3a,%rax
  3f:	49                   	rex.WB