BUG: kernel NULL pointer dereference, address: 0000000000000649
#PF: supervisor write access in kernel mode
#PF: error_code(0x0002) - not-present page
PGD 8000000057bc7067 P4D 8000000057bc7067 PUD 0
Oops: Oops: 0002 [#1] SMP KASAN PTI
CPU: 1 UID: 0 PID: 21173 Comm: kworker/u8:45 Not tainted 6.17.0-rc1-syzkaller-00125-g79116acb75e1 #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025
Workqueue: bat_events batadv_nc_worker
RIP: 0010:llc_ui_setsockopt+0x4e1/0x5f0 net/llc/af_llc.c:-1
Code: a1 f8 eb 4b e8 a0 16 3e f8 4c 6b f3 64 49 8d 9f a0 06 00 00 48 89 d8 48 c1 e8 03 42 80 3c 28 00 74 08 48 89 df e8 bf 80 a1 f8 <4c> 89 33 eb 23 e8 75 16 3e f8 4d 8d b7 0d 07 00 00 4c 89 f0 48 c1
RSP: 0018:ffffc90000a08c38 EFLAGS: 00010246
RAX: 00000000000000c9 RBX: 0000000000000649 RCX: ffff8880305b5a00
RDX: 0000000000000100 RSI: ffffffff8be333e0 RDI: ffff8880573d9c10
RBP: ffffc90000a08d30 R08: ffffffff8fa37e37 R09: 1ffffffff1f46fc6
R10: dffffc0000000000 R11: ffffffff89819410 R12: 1ffff9200014118c
R13: ffff8880573d9c10 R14: 0000000000000001 R15: 0000000000000001
FS: 0000000000000000(0000) GS:ffff888125d1c000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000649 CR3: 0000000031414000 CR4: 00000000003526f0
Call Trace:
expire_timers kernel/time/timer.c:1798 [inline]
__run_timers kernel/time/timer.c:2372 [inline]
__run_timer_base+0x61a/0x860 kernel/time/timer.c:2384
run_timer_base kernel/time/timer.c:2393 [inline]
run_timer_softirq+0xb7/0x180 kernel/time/timer.c:2403
handle_softirqs+0x283/0x870 kernel/softirq.c:579
do_softirq+0xec/0x180 kernel/softirq.c:480
__local_bh_enable_ip+0x17d/0x1c0 kernel/softirq.c:407
spin_unlock_bh include/linux/spinlock.h:396 [inline]
batadv_nc_purge_paths+0x318/0x3b0 net/batman-adv/network-coding.c:471
batadv_nc_worker+0x328/0x610 net/batman-adv/network-coding.c:720
process_one_work kernel/workqueue.c:3236 [inline]
process_scheduled_works+0xade/0x17b0 kernel/workqueue.c:3319
worker_thread+0x8a0/0xda0 kernel/workqueue.c:3400
kthread+0x70e/0x8a0 kernel/kthread.c:463
ret_from_fork+0x3f9/0x770 arch/x86/kernel/process.c:148
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
Modules linked in:
CR2: 0000000000000649
---[ end trace 0000000000000000 ]---
RIP: 0010:llc_ui_setsockopt+0x4e1/0x5f0 net/llc/af_llc.c:-1
Code: a1 f8 eb 4b e8 a0 16 3e f8 4c 6b f3 64 49 8d 9f a0 06 00 00 48 89 d8 48 c1 e8 03 42 80 3c 28 00 74 08 48 89 df e8 bf 80 a1 f8 <4c> 89 33 eb 23 e8 75 16 3e f8 4d 8d b7 0d 07 00 00 4c 89 f0 48 c1
RSP: 0018:ffffc90000a08c38 EFLAGS: 00010246
RAX: 00000000000000c9 RBX: 0000000000000649 RCX: ffff8880305b5a00
RDX: 0000000000000100 RSI: ffffffff8be333e0 RDI: ffff8880573d9c10
RBP: ffffc90000a08d30 R08: ffffffff8fa37e37 R09: 1ffffffff1f46fc6
R10: dffffc0000000000 R11: ffffffff89819410 R12: 1ffff9200014118c
R13: ffff8880573d9c10 R14: 0000000000000001 R15: 0000000000000001
FS: 0000000000000000(0000) GS:ffff888125d1c000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000649 CR3: 0000000031414000 CR4: 00000000003526f0
----------------
Code disassembly (best guess):
0: a1 f8 eb 4b e8 a0 16 movabs 0xf83e16a0e84bebf8,%eax
7: 3e f8
9: 4c 6b f3 64 imul $0x64,%rbx,%r14
d: 49 8d 9f a0 06 00 00 lea 0x6a0(%r15),%rbx
14: 48 89 d8 mov %rbx,%rax
17: 48 c1 e8 03 shr $0x3,%rax
1b: 42 80 3c 28 00 cmpb $0x0,(%rax,%r13,1)
20: 74 08 je 0x2a
22: 48 89 df mov %rbx,%rdi
25: e8 bf 80 a1 f8 call 0xf8a180e9
* 2a: 4c 89 33 mov %r14,(%rbx) <-- trapping instruction
2d: eb 23 jmp 0x52
2f: e8 75 16 3e f8 call 0xf83e16a9
34: 4d 8d b7 0d 07 00 00 lea 0x70d(%r15),%r14
3b: 4c 89 f0 mov %r14,%rax
3e: 48 rex.W
3f: c1 .byte 0xc1