bond0: The slave device specified does not support setting the MAC address kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] PREEMPT SMP KASAN Modules linked in: CPU: 0 PID: 10051 Comm: syz-executor.3 Not tainted 4.14.290-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 task: ffff88805c234480 task.stack: ffff88805c1b0000 RIP: 0010:hsr_dev_change_mtu+0x95/0xc0 net/hsr/hsr_device.c:149 RSP: 0018:ffff88805c1b6f48 EFLAGS: 00010202 RAX: dffffc0000000000 RBX: ffff888096614a40 RCX: ffffc900092fd000 RDX: 0000000000000002 RSI: ffffffff86fb4cb0 RDI: 0000000000000010 RBP: 00000000000005dc R08: 0000000000000000 R09: 0000000000000001 R10: 0000000000000000 R11: ffff88805c234480 R12: ffff888096615540 R13: 0000000000000000 R14: 0000000000000000 R15: ffffffff86fb4c30 FS: 00007fbdb4f48700(0000) GS:ffff8880ba400000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000056209bb6f160 CR3: 000000009d8bf000 CR4: 00000000003406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: __dev_set_mtu net/core/dev.c:6883 [inline] dev_set_mtu+0x1f0/0x3c0 net/core/dev.c:6918 bond_enslave+0x6ed/0x4cf0 drivers/net/bonding/bond_main.c:1507 do_set_master+0x19e/0x200 net/core/rtnetlink.c:1961 do_setlink+0x8b8/0x2bf0 net/core/rtnetlink.c:2098 rtnl_newlink+0x1271/0x1830 net/core/rtnetlink.c:2662 rtnetlink_rcv_msg+0x3be/0xb10 net/core/rtnetlink.c:4322 netlink_rcv_skb+0x125/0x390 net/netlink/af_netlink.c:2454 netlink_unicast_kernel net/netlink/af_netlink.c:1296 [inline] netlink_unicast+0x437/0x610 net/netlink/af_netlink.c:1322 netlink_sendmsg+0x648/0xbc0 net/netlink/af_netlink.c:1893 sock_sendmsg_nosec net/socket.c:646 [inline] sock_sendmsg+0xb5/0x100 net/socket.c:656 ___sys_sendmsg+0x6c8/0x800 net/socket.c:2062 __sys_sendmsg+0xa3/0x120 net/socket.c:2096 SYSC_sendmsg net/socket.c:2107 [inline] SyS_sendmsg+0x27/0x40 net/socket.c:2103 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x7fbdb65d3279 RSP: 002b:00007fbdb4f48168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 00007fbdb66e5f80 RCX: 00007fbdb65d3279 RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000008 RBP: 00007fbdb662d189 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffcbf639d0f R14: 00007fbdb4f48300 R15: 0000000000022000 Code: 44 89 e0 5b 5d 41 5c 41 5d c3 e8 47 b2 83 fa eb e1 e8 70 fa 59 fa 49 8d 7d 10 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 75 1d 49 8b 7d 10 ba 06 00 00 00 48 c7 c6 60 f7 73 RIP: hsr_dev_change_mtu+0x95/0xc0 net/hsr/hsr_device.c:149 RSP: ffff88805c1b6f48 ---[ end trace 4e53fda24ba9f01f ]--- ---------------- Code disassembly (best guess): 0: 44 89 e0 mov %r12d,%eax 3: 5b pop %rbx 4: 5d pop %rbp 5: 41 5c pop %r12 7: 41 5d pop %r13 9: c3 retq a: e8 47 b2 83 fa callq 0xfa83b256 f: eb e1 jmp 0xfffffff2 11: e8 70 fa 59 fa callq 0xfa59fa86 16: 49 8d 7d 10 lea 0x10(%r13),%rdi 1a: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 21: fc ff df 24: 48 89 fa mov %rdi,%rdx 27: 48 c1 ea 03 shr $0x3,%rdx * 2b: 80 3c 02 00 cmpb $0x0,(%rdx,%rax,1) <-- trapping instruction 2f: 75 1d jne 0x4e 31: 49 8b 7d 10 mov 0x10(%r13),%rdi 35: ba 06 00 00 00 mov $0x6,%edx 3a: 48 rex.W 3b: c7 .byte 0xc7 3c: c6 (bad) 3d: 60 (bad) 3e: f7 .byte 0xf7 3f: 73 .byte 0x73