From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-oo1-f69.google.com (mail-oo1-f69.google.com [209.85.161.69]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id BE3EF33BBB1 for ; Sat, 14 Mar 2026 04:28:12 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.161.69 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1773462494; cv=none; b=AXSbR9DZYalzwUWQFR2vH1wRs3J6e5m7B+OtcznJYq/eUVP0HhrUf4aW8MJ4QYNq5KiCleQnGqMsNKfDZWvtPVQwoiy6Bm2uhDigsE37KoE7PR27MBv6TqINlB95dFsxuTm8IVm8EEZgT6iboA5j8tKPYXeLJaHQcHoqrxYivNs= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1773462494; c=relaxed/simple; bh=OPum0+x7MjD1fLBvrBBZd2b0pZIxyBd30+KjOCAPsdM=; h=MIME-Version:Date:In-Reply-To:Message-ID:Subject:From:To: Content-Type; b=TSi9FUnqn0tgSbOCxZC/S7RtY8CZhv9lY/B+C06IRJU6NddLXLfkgtCBU0ZYggGEzYoolbJXxjzbfSRukCvm5G8PE0o5J0tU3m5B9IfXgg9PKwPbpFoWt+MLQ8sSuAniYgUBvGuQscUlNF5uSOtCgOqpoAqoVZhfCINxmumNbrE= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=fail (p=none dis=none) header.from=syzkaller.appspotmail.com; spf=pass smtp.mailfrom=M3KW2WVRGUFZ5GODRSRYTGD7.apphosting.bounces.google.com; arc=none smtp.client-ip=209.85.161.69 Authentication-Results: smtp.subspace.kernel.org; dmarc=fail (p=none dis=none) header.from=syzkaller.appspotmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=M3KW2WVRGUFZ5GODRSRYTGD7.apphosting.bounces.google.com Received: by mail-oo1-f69.google.com with SMTP id 006d021491bc7-67bb6081a0dso44451324eaf.2 for ; Fri, 13 Mar 2026 21:28:12 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1773462491; x=1774067291; h=to:from:subject:message-id:in-reply-to:date:mime-version :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=1kZsJjz6AypMEKf/j/LJRn0kALKsEj27GzpwklY9qKg=; b=pG3sZec9YRtWp5t8zkKJdqQo9ssoF1O0nh3dZgdAaCh6TOch00wFo1I4L1W+KkFADo dI/59gG/lVIZfuR07m8LW+SYnPyr7HnSFMNx5qBFwDcdJQKlBN8SQ9oHIE/Y2jBUUQYM sdnvQ17IfdO+Bi6VKcjZj2vImbP0zGwe0rD0iLInyiKkwEwAExGKEPD8CNVgEuwq+cHC Xpw4/m6wrvLt9A8aj3AugVRT7rs/fZnMzLKHv/r0ECRRx8FUYmyX+oZo0VVo9GMyfb1D 0YUI6t/KUhn/5fs/6Tg2GNKFVEYfSqDrTNd+syZizkpg4VUbOXd26D0JNfXUGgqIIz2Q CUDQ== X-Gm-Message-State: AOJu0YxKea7uCczhmvcHNDa3dwsjFDgS1GJE+6NrlTsam9oK3Wj9rT85 UqDTVtKDS8kRGrVXoehZUfjvW7JTFyw55AZX9ysrz0ByJnd2a/tDC5EcnYkDBglB47c1Om1NFqH mLL53i1tIs6rCkzKKbIALikneuuMa/biXu/09Nc8yc7XGSDqmH11WPNO3NXg= Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-Received: by 2002:a05:6820:2019:b0:662:fbdd:1adb with SMTP id 006d021491bc7-67bda9c0409mr4033398eaf.25.1773462491633; Fri, 13 Mar 2026 21:28:11 -0700 (PDT) Date: Fri, 13 Mar 2026 21:28:11 -0700 In-Reply-To: <69b46af7.050a0220.36eb34.000e.GAE@google.com> X-Google-Appengine-App-Id: s~syzkaller X-Google-Appengine-App-Id-Alias: syzkaller Message-ID: <69b4e3db.050a0220.12d28.0145.GAE@google.com> Subject: Forwarded: [PATCH] bonding: debug: add printk to bond_header_create From: syzbot To: linux-kernel@vger.kernel.org, syzkaller-bugs@googlegroups.com Content-Type: text/plain; charset="UTF-8" For archival purposes, forwarding an incoming command email to linux-kernel@vger.kernel.org, syzkaller-bugs@googlegroups.com. *** Subject: [PATCH] bonding: debug: add printk to bond_header_create Author: kartikey406@gmail.com #syz test: git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git master Add temporary debug printks to identify which pointer is corrupted in bond_header_create() causing a general protection fault. Reported-by: syzbot+3d8bc31c45e11450f24c@syzkaller.appspotmail.com --- drivers/net/bonding/bond_main.c | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/drivers/net/bonding/bond_main.c b/drivers/net/bonding/bond_main.c index 707419270ebf..807ab8784116 100644 --- a/drivers/net/bonding/bond_main.c +++ b/drivers/net/bonding/bond_main.c @@ -1520,7 +1520,12 @@ static int bond_header_create(struct sk_buff *skb, struct net_device *bond_dev, rcu_read_lock(); slave = rcu_dereference(bond->curr_active_slave); + pr_err("bond: curr_active_slave raw=%px\n", + rcu_access_pointer(bond->curr_active_slave)); if (slave) { + pr_err("bond: slave=%px\n", slave); + pr_err("bond: slave->dev=%px\n", slave->dev); + pr_err("bond: slave->dev->header_ops=%px\n", slave->dev->header_ops); slave_ops = READ_ONCE(slave->dev->header_ops); if (slave_ops && slave_ops->create) ret = slave_ops->create(skb, slave->dev, -- 2.43.0