BUG: kernel NULL pointer dereference, address: 0000000000000649 #PF: supervisor write access in kernel mode #PF: error_code(0x0002) - not-present page PGD 8000000057bc7067 P4D 8000000057bc7067 PUD 0 Oops: Oops: 0002 [#1] SMP KASAN PTI CPU: 1 UID: 0 PID: 21173 Comm: kworker/u8:45 Not tainted 6.17.0-rc1-syzkaller-00125-g79116acb75e1 #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 Workqueue: bat_events batadv_nc_worker RIP: 0010:llc_ui_setsockopt+0x4e1/0x5f0 net/llc/af_llc.c:-1 Code: a1 f8 eb 4b e8 a0 16 3e f8 4c 6b f3 64 49 8d 9f a0 06 00 00 48 89 d8 48 c1 e8 03 42 80 3c 28 00 74 08 48 89 df e8 bf 80 a1 f8 <4c> 89 33 eb 23 e8 75 16 3e f8 4d 8d b7 0d 07 00 00 4c 89 f0 48 c1 RSP: 0018:ffffc90000a08c38 EFLAGS: 00010246 RAX: 00000000000000c9 RBX: 0000000000000649 RCX: ffff8880305b5a00 RDX: 0000000000000100 RSI: ffffffff8be333e0 RDI: ffff8880573d9c10 RBP: ffffc90000a08d30 R08: ffffffff8fa37e37 R09: 1ffffffff1f46fc6 R10: dffffc0000000000 R11: ffffffff89819410 R12: 1ffff9200014118c R13: ffff8880573d9c10 R14: 0000000000000001 R15: 0000000000000001 FS: 0000000000000000(0000) GS:ffff888125d1c000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000649 CR3: 0000000031414000 CR4: 00000000003526f0 Call Trace: expire_timers kernel/time/timer.c:1798 [inline] __run_timers kernel/time/timer.c:2372 [inline] __run_timer_base+0x61a/0x860 kernel/time/timer.c:2384 run_timer_base kernel/time/timer.c:2393 [inline] run_timer_softirq+0xb7/0x180 kernel/time/timer.c:2403 handle_softirqs+0x283/0x870 kernel/softirq.c:579 do_softirq+0xec/0x180 kernel/softirq.c:480 __local_bh_enable_ip+0x17d/0x1c0 kernel/softirq.c:407 spin_unlock_bh include/linux/spinlock.h:396 [inline] batadv_nc_purge_paths+0x318/0x3b0 net/batman-adv/network-coding.c:471 batadv_nc_worker+0x328/0x610 net/batman-adv/network-coding.c:720 process_one_work kernel/workqueue.c:3236 [inline] process_scheduled_works+0xade/0x17b0 kernel/workqueue.c:3319 worker_thread+0x8a0/0xda0 kernel/workqueue.c:3400 kthread+0x70e/0x8a0 kernel/kthread.c:463 ret_from_fork+0x3f9/0x770 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 Modules linked in: CR2: 0000000000000649 ---[ end trace 0000000000000000 ]--- RIP: 0010:llc_ui_setsockopt+0x4e1/0x5f0 net/llc/af_llc.c:-1 Code: a1 f8 eb 4b e8 a0 16 3e f8 4c 6b f3 64 49 8d 9f a0 06 00 00 48 89 d8 48 c1 e8 03 42 80 3c 28 00 74 08 48 89 df e8 bf 80 a1 f8 <4c> 89 33 eb 23 e8 75 16 3e f8 4d 8d b7 0d 07 00 00 4c 89 f0 48 c1 RSP: 0018:ffffc90000a08c38 EFLAGS: 00010246 RAX: 00000000000000c9 RBX: 0000000000000649 RCX: ffff8880305b5a00 RDX: 0000000000000100 RSI: ffffffff8be333e0 RDI: ffff8880573d9c10 RBP: ffffc90000a08d30 R08: ffffffff8fa37e37 R09: 1ffffffff1f46fc6 R10: dffffc0000000000 R11: ffffffff89819410 R12: 1ffff9200014118c R13: ffff8880573d9c10 R14: 0000000000000001 R15: 0000000000000001 FS: 0000000000000000(0000) GS:ffff888125d1c000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000649 CR3: 0000000031414000 CR4: 00000000003526f0 ---------------- Code disassembly (best guess): 0: a1 f8 eb 4b e8 a0 16 movabs 0xf83e16a0e84bebf8,%eax 7: 3e f8 9: 4c 6b f3 64 imul $0x64,%rbx,%r14 d: 49 8d 9f a0 06 00 00 lea 0x6a0(%r15),%rbx 14: 48 89 d8 mov %rbx,%rax 17: 48 c1 e8 03 shr $0x3,%rax 1b: 42 80 3c 28 00 cmpb $0x0,(%rax,%r13,1) 20: 74 08 je 0x2a 22: 48 89 df mov %rbx,%rdi 25: e8 bf 80 a1 f8 call 0xf8a180e9 * 2a: 4c 89 33 mov %r14,(%rbx) <-- trapping instruction 2d: eb 23 jmp 0x52 2f: e8 75 16 3e f8 call 0xf83e16a9 34: 4d 8d b7 0d 07 00 00 lea 0x70d(%r15),%r14 3b: 4c 89 f0 mov %r14,%rax 3e: 48 rex.W 3f: c1 .byte 0xc1