batman_adv: batadv0: Interface deactivated: batadv_slave_0 batman_adv: batadv0: Removing interface: batadv_slave_0 ================================================================== batman_adv: batadv0: Interface deactivated: batadv_slave_1 batman_adv: batadv0: Removing interface: batadv_slave_1 BUG: KASAN: null-ptr-deref on address (null) Read of size 24 by task kworker/u4:4/2605 CPU: 1 PID: 2605 Comm: kworker/u4:4 Not tainted 4.8.0-rc4-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: bat_events batadv_iv_send_outstanding_bat_ogm_packet 0000000000000000 ffff8801229cf9b8 ffffffff82d08572 ffff8801229cfa48 ffff880126aa4280 0000000000000000 ffff88010c9523d0 0000000000000024 ffff8801229cfa38 ffffffff8175fefa 0000000000000003 ffff88012250c3c0 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0x136/0x1d4 lib/dump_stack.c:51 [] kasan_report_error+0x3da/0x490 mm/kasan/report.c:280 [] kasan_report+0x34/0x40 mm/kasan/report.c:303 [] check_memory_region_inline mm/kasan/kasan.c:285 [inline] [] check_memory_region+0x13d/0x1a0 mm/kasan/kasan.c:299 [] memcpy+0x23/0x50 mm/kasan/kasan.c:334 [] batadv_tvlv_realloc_packet_buff net/batman-adv/tvlv.c:294 [inline] [] batadv_tvlv_container_ogm_append+0x158/0x470 net/batman-adv/tvlv.c:329 [] batadv_iv_ogm_schedule+0xa34/0xcc0 net/batman-adv/bat_iv_ogm.c:947 [] batadv_iv_send_outstanding_bat_ogm_packet+0x4fa/0x8b0 net/batman-adv/bat_iv_ogm.c:1810 [] process_one_work+0x67d/0x14f0 kernel/workqueue.c:2096 [] worker_thread+0xda/0xf10 kernel/workqueue.c:2230 [] kthread+0x209/0x2d0 kernel/kthread.c:209 [] ret_from_fork+0x1f/0x40 arch/x86/entry/entry_64.S:393 ================================================================== BUG: unable to handle kernel NULL pointer dereference at (null) IP: [] memcpy_erms+0x6/0x10 arch/x86/lib/memcpy_64.S:51 device bridge_slave_1 left promiscuous mode bridge0: port 2(bridge_slave_1) entered disabled state PGD 0 Oops: 0000 [#1] PREEMPT SMP KASAN Modules linked in: CPU: 1 PID: 2605 Comm: kworker/u4:4 Tainted: G B 4.8.0-rc4-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: bat_events batadv_iv_send_outstanding_bat_ogm_packet task: ffff88012250c3c0 task.stack: ffff8801229c8000 RIP: 0010:[] [] memcpy_erms+0x6/0x10 arch/x86/lib/memcpy_64.S:51 RSP: 0018:ffff8801229cfa98 EFLAGS: 00010246 RAX: ffff880126aa4280 RBX: 0000000000000018 RCX: 0000000000000018 RDX: 0000000000000018 RSI: 0000000000000000 RDI: ffff880126aa4280 RBP: ffff8801229cfab8 R08: ffffed0024d54853 R09: ffffed0024d54853 R10: 0000000000000003 R11: ffffed0024d54852 R12: ffff880126aa4280 R13: 0000000000000000 R14: ffff88010c9523d0 R15: 0000000000000024 FS: 0000000000000000(0000) GS:ffff88012c100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000000 CR3: 0000000108bf9000 CR4: 00000000001406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Stack: ffffffff8175f165 0000000000000018 ffff880112382380 ffff88010c9523c8 ffff8801229cfb18 ffffffff85ceb978 ffff880112382b68 0000000000000000 ffff880126aa4280 ffff88010000003c ffff880112382b78 ffff880112382380 Call Trace: [] batadv_tvlv_realloc_packet_buff net/batman-adv/tvlv.c:294 [inline] [] batadv_tvlv_container_ogm_append+0x158/0x470 net/batman-adv/tvlv.c:329 [] batadv_iv_ogm_schedule+0xa34/0xcc0 net/batman-adv/bat_iv_ogm.c:947 [] batadv_iv_send_outstanding_bat_ogm_packet+0x4fa/0x8b0 net/batman-adv/bat_iv_ogm.c:1810 [] process_one_work+0x67d/0x14f0 kernel/workqueue.c:2096 [] worker_thread+0xda/0xf10 kernel/workqueue.c:2230 [] kthread+0x209/0x2d0 kernel/kthread.c:209 [] ret_from_fork+0x1f/0x40 arch/x86/entry/entry_64.S:393 Code: ff ff ff 90 90 eb 1e 0f 1f 00 48 89 f8 48 89 d1 48 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 c3 66 0f 1f 44 00 00 48 89 f8 48 89 d1 a4 c3 0f 1f 80 00 00 00 00 48 89 f8 48 83 fa 20 72 7e 40 38 RIP [] memcpy_erms+0x6/0x10 arch/x86/lib/memcpy_64.S:50 RSP CR2: 0000000000000000 ---[ end trace 6b40b5a1ce619741 ]---