ffffffffffffff, 0xffffffffffffffff}) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:47:50 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:47:50 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r2}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) 23:47:50 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r6 = dup(0xffffffffffffffff) getsockname$packet(r6, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) 23:47:50 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r2}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) 23:47:50 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r2}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) 23:47:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) 23:47:50 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r2}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) 23:47:51 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:47:51 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:47:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) 23:47:51 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETSF(r6, 0x5405, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "585ad56fec52acd601002101500000005b46af"}) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) 23:47:51 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r2}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) 23:47:51 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETSF(r7, 0x5405, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "585ad56fec52acd601002101500000005b46af"}) dup(r6) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8}]}}}]}, 0x40}}, 0x0) 23:47:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r2}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) 23:47:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) 23:47:51 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETSF(r7, 0x5405, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "585ad56fec52acd601002101500000005b46af"}) dup(r6) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8}]}}}]}, 0x40}}, 0x0) 23:47:51 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r6 = dup(0xffffffffffffffff) getsockname$packet(r6, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) 23:47:51 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r1 = dup(0xffffffffffffffff) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r2}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) 23:47:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r1 = dup(0xffffffffffffffff) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r2}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) 23:47:51 executing program 3: lsetxattr(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000180)=@random={'security.', 'bridge_slave_0\x00'}, &(0x7f0000000140)='bridge_s<\\\xbe\xbc\xcb\xcd\xa3', 0xf, 0x2) r0 = socket(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) readv(r3, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1002}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) accept4$packet(r0, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x14, 0x800) sendmsg$nl_route_sched(r3, &(0x7f0000000600)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000400)=@delqdisc={0x18c, 0x25, 0x0, 0x70bd2a, 0x25dfdbfd, {0x0, 0x0, 0x0, r4, {0x9, 0xffff}, {0xd, 0x7}, {0x0, 0xfff3}}, [@qdisc_kind_options=@q_choke={{0xa}, {0x130, 0x2, [@TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14, 0x1, {0xa46e, 0x81, 0x10001, 0x8, 0x1e, 0x20, 0x2}}, @TCA_CHOKE_PARMS={0x14, 0x1, {0x27, 0x1b2, 0x10000, 0x8, 0x9, 0x13, 0x8}}]}}, @qdisc_kind_options=@q_etf={{0x8}, {0x14, 0x2, @TCA_ETF_PARMS={0x10, 0x1, {0x482aa4e4, 0xb}}}}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x1a}, @TCA_RATE={0x6, 0x5, {0x5, 0x3}}]}, 0x18c}, 0x1, 0x0, 0x0, 0x40}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@bridge_setlink={0x20, 0x13, 0x0, 0x0, 0x0, {0x7, 0x0, 0x0, r2}}, 0x20}}, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) 23:47:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:47:51 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:47:51 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:47:51 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r1 = dup(0xffffffffffffffff) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r2}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) 23:47:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r1 = dup(0xffffffffffffffff) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r2}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) 23:47:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:47:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r1 = dup(0xffffffffffffffff) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r2}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) 23:47:51 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) (fail_nth: 1) 23:47:51 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r1 = dup(0xffffffffffffffff) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r2}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) [ 88.808675][ T4545] FAULT_INJECTION: forcing a failure. [ 88.808675][ T4545] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 88.821774][ T4545] CPU: 1 PID: 4545 Comm: syz-executor.2 Not tainted 5.16.0-rc2-syzkaller #0 [ 88.830447][ T4545] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 88.840542][ T4545] Call Trace: [ 88.843878][ T4545] [ 88.846800][ T4545] dump_stack_lvl+0xd6/0x122 [ 88.851477][ T4545] dump_stack+0x11/0x1b 23:47:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r2}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) 23:47:51 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 1) [ 88.855670][ T4545] should_fail+0x23c/0x250 [ 88.860078][ T4545] should_fail_usercopy+0x16/0x20 [ 88.865167][ T4545] _copy_from_user+0x1c/0xd0 [ 88.869823][ T4545] sendmsg_copy_msghdr+0x60/0x2a0 [ 88.874910][ T4545] __sys_sendmsg+0x166/0x230 [ 88.879509][ T4545] __x64_sys_sendmsg+0x42/0x50 [ 88.884277][ T4545] do_syscall_64+0x44/0xd0 [ 88.888697][ T4545] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 88.894612][ T4545] RIP: 0033:0x7f5597032ae9 23:47:51 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) (fail_nth: 1) 23:47:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:47:51 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r2}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) [ 88.899082][ T4545] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 88.918686][ T4545] RSP: 002b:00007f5594da9188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 88.927173][ T4545] RAX: ffffffffffffffda RBX: 00007f5597145f60 RCX: 00007f5597032ae9 [ 88.935198][ T4545] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000005 [ 88.943557][ T4545] RBP: 00007f5594da91d0 R08: 0000000000000000 R09: 0000000000000000 [ 88.951521][ T4545] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 23:47:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:47:51 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r2}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) [ 88.959488][ T4545] R13: 00007ffc64ac697f R14: 00007f5594da9300 R15: 0000000000022000 [ 88.967461][ T4545] 23:47:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r2}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) 23:47:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r2}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) [ 89.008050][ T4557] FAULT_INJECTION: forcing a failure. [ 89.008050][ T4557] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 89.021187][ T4557] CPU: 1 PID: 4557 Comm: syz-executor.0 Not tainted 5.16.0-rc2-syzkaller #0 [ 89.029895][ T4557] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 89.039943][ T4557] Call Trace: [ 89.043214][ T4557] [ 89.046133][ T4557] dump_stack_lvl+0xd6/0x122 [ 89.050939][ T4557] dump_stack+0x11/0x1b 23:47:51 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) (fail_nth: 2) 23:47:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) [ 89.055100][ T4557] should_fail+0x23c/0x250 [ 89.059512][ T4557] should_fail_usercopy+0x16/0x20 [ 89.064567][ T4557] _copy_from_user+0x1c/0xd0 [ 89.069216][ T4557] sendmsg_copy_msghdr+0x60/0x2a0 [ 89.074268][ T4557] __sys_sendmsg+0x166/0x230 [ 89.079067][ T4557] __x64_sys_sendmsg+0x42/0x50 [ 89.083835][ T4557] do_syscall_64+0x44/0xd0 [ 89.088283][ T4557] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 89.090472][ T4565] FAULT_INJECTION: forcing a failure. [ 89.090472][ T4565] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 89.094180][ T4557] RIP: 0033:0x7f63a3dfbae9 [ 89.094199][ T4557] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 89.131162][ T4557] RSP: 002b:00007f63a1b72188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 89.139630][ T4557] RAX: ffffffffffffffda RBX: 00007f63a3f0ef60 RCX: 00007f63a3dfbae9 [ 89.147650][ T4557] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 89.155632][ T4557] RBP: 00007f63a1b721d0 R08: 0000000000000000 R09: 0000000000000000 [ 89.163582][ T4557] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 89.171585][ T4557] R13: 00007ffcec81edaf R14: 00007f63a1b72300 R15: 0000000000022000 [ 89.179539][ T4557] [ 89.182542][ T4565] CPU: 0 PID: 4565 Comm: syz-executor.3 Not tainted 5.16.0-rc2-syzkaller #0 [ 89.191227][ T4565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 89.201275][ T4565] Call Trace: [ 89.204542][ T4565] [ 89.207466][ T4565] dump_stack_lvl+0xd6/0x122 [ 89.212070][ T4565] dump_stack+0x11/0x1b [ 89.216227][ T4565] should_fail+0x23c/0x250 [ 89.220640][ T4565] should_fail_usercopy+0x16/0x20 [ 89.225650][ T4565] _copy_from_user+0x1c/0xd0 [ 89.230236][ T4565] sendmsg_copy_msghdr+0x60/0x2a0 [ 89.235243][ T4565] __sys_sendmsg+0x166/0x230 [ 89.239843][ T4565] __x64_sys_sendmsg+0x42/0x50 [ 89.244630][ T4565] do_syscall_64+0x44/0xd0 [ 89.249033][ T4565] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 89.254965][ T4565] RIP: 0033:0x7f229eaecae9 [ 89.259360][ T4565] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 89.278980][ T4565] RSP: 002b:00007f229c863188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 89.287454][ T4565] RAX: ffffffffffffffda RBX: 00007f229ebfff60 RCX: 00007f229eaecae9 [ 89.295408][ T4565] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000005 23:47:51 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 2) [ 89.303360][ T4565] RBP: 00007f229c8631d0 R08: 0000000000000000 R09: 0000000000000000 [ 89.311305][ T4565] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 89.319342][ T4565] R13: 00007ffd9766560f R14: 00007f229c863300 R15: 0000000000022000 [ 89.327307][ T4565] [ 89.358550][ T4575] FAULT_INJECTION: forcing a failure. [ 89.358550][ T4575] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 89.358616][ T4573] FAULT_INJECTION: forcing a failure. [ 89.358616][ T4573] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 89.371661][ T4575] CPU: 0 PID: 4575 Comm: syz-executor.2 Not tainted 5.16.0-rc2-syzkaller #0 [ 89.393324][ T4575] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 89.403359][ T4575] Call Trace: [ 89.406618][ T4575] [ 89.409534][ T4575] dump_stack_lvl+0xd6/0x122 [ 89.414227][ T4575] dump_stack+0x11/0x1b [ 89.418461][ T4575] should_fail+0x23c/0x250 [ 89.422882][ T4575] should_fail_usercopy+0x16/0x20 [ 89.427896][ T4575] _copy_from_user+0x1c/0xd0 [ 89.432516][ T4575] iovec_from_user+0xc4/0x2e0 [ 89.437179][ T4575] ? terminate_walk+0x263/0x280 [ 89.442017][ T4575] __import_iovec+0x57/0x2d0 [ 89.446647][ T4575] import_iovec+0xb8/0xd0 [ 89.450979][ T4575] sendmsg_copy_msghdr+0x275/0x2a0 [ 89.456296][ T4575] __sys_sendmsg+0x166/0x230 [ 89.460990][ T4575] __x64_sys_sendmsg+0x42/0x50 [ 89.465747][ T4575] do_syscall_64+0x44/0xd0 [ 89.470343][ T4575] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 89.476231][ T4575] RIP: 0033:0x7f5597032ae9 [ 89.480644][ T4575] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 89.500235][ T4575] RSP: 002b:00007f5594da9188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 89.508627][ T4575] RAX: ffffffffffffffda RBX: 00007f5597145f60 RCX: 00007f5597032ae9 [ 89.516591][ T4575] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000005 [ 89.524546][ T4575] RBP: 00007f5594da91d0 R08: 0000000000000000 R09: 0000000000000000 [ 89.532496][ T4575] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 89.540444][ T4575] R13: 00007ffc64ac697f R14: 00007f5594da9300 R15: 0000000000022000 [ 89.548401][ T4575] 23:47:52 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r2}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) 23:47:52 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) (fail_nth: 2) 23:47:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 89.551400][ T4573] CPU: 1 PID: 4573 Comm: syz-executor.0 Not tainted 5.16.0-rc2-syzkaller #0 [ 89.560070][ T4573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 89.570117][ T4573] Call Trace: [ 89.573387][ T4573] [ 89.576336][ T4573] dump_stack_lvl+0xd6/0x122 [ 89.580984][ T4573] dump_stack+0x11/0x1b [ 89.585139][ T4573] should_fail+0x23c/0x250 [ 89.589555][ T4573] should_fail_usercopy+0x16/0x20 [ 89.594615][ T4573] _copy_from_user+0x1c/0xd0 [ 89.599301][ T4573] iovec_from_user+0xc4/0x2e0 [ 89.604209][ T4573] __import_iovec+0x57/0x2d0 23:47:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) 23:47:52 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) (fail_nth: 3) 23:47:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) [ 89.608796][ T4573] import_iovec+0xb8/0xd0 [ 89.613129][ T4573] sendmsg_copy_msghdr+0x275/0x2a0 [ 89.618326][ T4573] __sys_sendmsg+0x166/0x230 [ 89.623117][ T4573] __x64_sys_sendmsg+0x42/0x50 [ 89.627880][ T4573] do_syscall_64+0x44/0xd0 [ 89.632362][ T4573] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 89.638264][ T4573] RIP: 0033:0x7f63a3dfbae9 23:47:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 89.642686][ T4573] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 89.662727][ T4573] RSP: 002b:00007f63a1b72188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 89.671263][ T4573] RAX: ffffffffffffffda RBX: 00007f63a3f0ef60 RCX: 00007f63a3dfbae9 [ 89.679255][ T4573] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 89.687233][ T4573] RBP: 00007f63a1b721d0 R08: 0000000000000000 R09: 0000000000000000 [ 89.695286][ T4573] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 23:47:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 89.703349][ T4573] R13: 00007ffcec81edaf R14: 00007f63a1b72300 R15: 0000000000022000 [ 89.711408][ T4573] 23:47:52 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 3) [ 89.749243][ T4590] FAULT_INJECTION: forcing a failure. [ 89.749243][ T4590] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 89.762489][ T4590] CPU: 1 PID: 4590 Comm: syz-executor.3 Not tainted 5.16.0-rc2-syzkaller #0 [ 89.771161][ T4590] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 89.781294][ T4590] Call Trace: [ 89.784568][ T4590] [ 89.787564][ T4590] dump_stack_lvl+0xd6/0x122 [ 89.791539][ T4594] FAULT_INJECTION: forcing a failure. [ 89.791539][ T4594] name failslab, interval 1, probability 0, space 0, times 1 [ 89.792206][ T4590] dump_stack+0x11/0x1b [ 89.808898][ T4590] should_fail+0x23c/0x250 [ 89.813389][ T4590] should_fail_usercopy+0x16/0x20 [ 89.818401][ T4590] _copy_from_user+0x1c/0xd0 [ 89.822974][ T4590] iovec_from_user+0xc4/0x2e0 [ 89.827699][ T4590] ? prep_new_page+0x5f/0x1c0 [ 89.832509][ T4590] __import_iovec+0x57/0x2d0 [ 89.837090][ T4590] import_iovec+0xb8/0xd0 [ 89.841458][ T4590] sendmsg_copy_msghdr+0x275/0x2a0 [ 89.846684][ T4590] __sys_sendmsg+0x166/0x230 [ 89.851699][ T4590] __x64_sys_sendmsg+0x42/0x50 [ 89.856490][ T4590] do_syscall_64+0x44/0xd0 [ 89.860889][ T4590] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 89.866993][ T4590] RIP: 0033:0x7f229eaecae9 [ 89.871389][ T4590] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 89.890987][ T4590] RSP: 002b:00007f229c863188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 89.899385][ T4590] RAX: ffffffffffffffda RBX: 00007f229ebfff60 RCX: 00007f229eaecae9 [ 89.907338][ T4590] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000005 [ 89.915291][ T4590] RBP: 00007f229c8631d0 R08: 0000000000000000 R09: 0000000000000000 [ 89.923252][ T4590] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 89.931214][ T4590] R13: 00007ffd9766560f R14: 00007f229c863300 R15: 0000000000022000 [ 89.939177][ T4590] [ 89.942185][ T4594] CPU: 0 PID: 4594 Comm: syz-executor.0 Not tainted 5.16.0-rc2-syzkaller #0 [ 89.950983][ T4594] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 89.961033][ T4594] Call Trace: [ 89.964301][ T4594] [ 89.967222][ T4594] dump_stack_lvl+0xd6/0x122 [ 89.971803][ T4594] dump_stack+0x11/0x1b [ 89.975990][ T4594] should_fail+0x23c/0x250 [ 89.980558][ T4594] __should_failslab+0x81/0x90 [ 89.985347][ T4594] should_failslab+0x5/0x20 [ 89.989897][ T4594] kmem_cache_alloc_node+0x61/0x2d0 [ 89.995118][ T4594] ? __alloc_skb+0xf0/0x450 [ 89.998334][ T4595] FAULT_INJECTION: forcing a failure. [ 89.998334][ T4595] name failslab, interval 1, probability 0, space 0, times 1 [ 89.999601][ T4594] __alloc_skb+0xf0/0x450 [ 89.999627][ T4594] netlink_sendmsg+0x4d5/0x7d0 [ 90.021206][ T4594] ? netlink_getsockopt+0x720/0x720 [ 90.026447][ T4594] ____sys_sendmsg+0x39a/0x510 [ 90.031199][ T4594] __sys_sendmsg+0x195/0x230 [ 90.035816][ T4594] __x64_sys_sendmsg+0x42/0x50 [ 90.040612][ T4594] do_syscall_64+0x44/0xd0 [ 90.045061][ T4594] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 90.050937][ T4594] RIP: 0033:0x7f63a3dfbae9 [ 90.055431][ T4594] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 90.075025][ T4594] RSP: 002b:00007f63a1b72188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 90.083413][ T4594] RAX: ffffffffffffffda RBX: 00007f63a3f0ef60 RCX: 00007f63a3dfbae9 [ 90.092467][ T4594] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 23:47:52 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) (fail_nth: 3) 23:47:52 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) 23:47:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 90.100421][ T4594] RBP: 00007f63a1b721d0 R08: 0000000000000000 R09: 0000000000000000 [ 90.108373][ T4594] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 90.116332][ T4594] R13: 00007ffcec81edaf R14: 00007f63a1b72300 R15: 0000000000022000 [ 90.124293][ T4594] [ 90.127370][ T4595] CPU: 1 PID: 4595 Comm: syz-executor.2 Not tainted 5.16.0-rc2-syzkaller #0 [ 90.136088][ T4595] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 90.146135][ T4595] Call Trace: 23:47:52 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 4) [ 90.149414][ T4595] [ 90.152337][ T4595] dump_stack_lvl+0xd6/0x122 [ 90.156922][ T4595] dump_stack+0x11/0x1b [ 90.161072][ T4595] should_fail+0x23c/0x250 [ 90.165485][ T4595] __should_failslab+0x81/0x90 [ 90.170321][ T4595] should_failslab+0x5/0x20 [ 90.174876][ T4595] kmem_cache_alloc_node+0x61/0x2d0 [ 90.176795][ T4598] FAULT_INJECTION: forcing a failure. [ 90.176795][ T4598] name failslab, interval 1, probability 0, space 0, times 0 [ 90.180108][ T4595] ? __alloc_skb+0xf0/0x450 [ 90.180135][ T4595] __alloc_skb+0xf0/0x450 [ 90.201583][ T4595] netlink_sendmsg+0x4d5/0x7d0 [ 90.206413][ T4595] ? netlink_getsockopt+0x720/0x720 [ 90.211636][ T4595] ____sys_sendmsg+0x39a/0x510 [ 90.216419][ T4595] __sys_sendmsg+0x195/0x230 [ 90.221073][ T4595] __x64_sys_sendmsg+0x42/0x50 [ 90.225824][ T4595] do_syscall_64+0x44/0xd0 [ 90.230293][ T4595] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 90.236348][ T4595] RIP: 0033:0x7f5597032ae9 [ 90.240742][ T4595] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 90.260348][ T4595] RSP: 002b:00007f5594d88188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 90.268872][ T4595] RAX: ffffffffffffffda RBX: 00007f5597146020 RCX: 00007f5597032ae9 [ 90.276869][ T4595] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000005 [ 90.284829][ T4595] RBP: 00007f5594d881d0 R08: 0000000000000000 R09: 0000000000000000 [ 90.292811][ T4595] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 90.300775][ T4595] R13: 00007ffc64ac697f R14: 00007f5594d88300 R15: 0000000000022000 [ 90.308737][ T4595] [ 90.311740][ T4598] CPU: 0 PID: 4598 Comm: syz-executor.0 Not tainted 5.16.0-rc2-syzkaller #0 [ 90.320412][ T4598] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 90.330457][ T4598] Call Trace: [ 90.333727][ T4598] [ 90.336635][ T4598] dump_stack_lvl+0xd6/0x122 [ 90.341207][ T4598] dump_stack+0x11/0x1b [ 90.345353][ T4598] should_fail+0x23c/0x250 [ 90.349853][ T4598] __should_failslab+0x81/0x90 [ 90.354807][ T4598] should_failslab+0x5/0x20 [ 90.359310][ T4598] kmem_cache_alloc_node_trace+0x61/0x310 [ 90.365117][ T4598] ? __kmalloc_node_track_caller+0x30/0x40 [ 90.371111][ T4598] __kmalloc_node_track_caller+0x30/0x40 [ 90.376730][ T4598] ? netlink_sendmsg+0x4d5/0x7d0 [ 90.378047][ T4604] FAULT_INJECTION: forcing a failure. [ 90.378047][ T4604] name failslab, interval 1, probability 0, space 0, times 0 [ 90.381649][ T4598] __alloc_skb+0x19d/0x450 [ 90.398639][ T4598] netlink_sendmsg+0x4d5/0x7d0 [ 90.403400][ T4598] ? netlink_getsockopt+0x720/0x720 [ 90.408583][ T4598] ____sys_sendmsg+0x39a/0x510 [ 90.413349][ T4598] __sys_sendmsg+0x195/0x230 [ 90.417931][ T4598] __x64_sys_sendmsg+0x42/0x50 [ 90.422771][ T4598] do_syscall_64+0x44/0xd0 [ 90.427192][ T4598] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 90.433070][ T4598] RIP: 0033:0x7f63a3dfbae9 [ 90.437541][ T4598] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 90.457127][ T4598] RSP: 002b:00007f63a1b72188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 90.465725][ T4598] RAX: ffffffffffffffda RBX: 00007f63a3f0ef60 RCX: 00007f63a3dfbae9 [ 90.473680][ T4598] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 90.481636][ T4598] RBP: 00007f63a1b721d0 R08: 0000000000000000 R09: 0000000000000000 [ 90.489646][ T4598] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 23:47:53 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 5) [ 90.497602][ T4598] R13: 00007ffcec81edaf R14: 00007f63a1b72300 R15: 0000000000022000 [ 90.505561][ T4598] [ 90.508566][ T4604] CPU: 1 PID: 4604 Comm: syz-executor.3 Not tainted 5.16.0-rc2-syzkaller #0 [ 90.517239][ T4604] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 90.527288][ T4604] Call Trace: [ 90.530559][ T4604] [ 90.533526][ T4604] dump_stack_lvl+0xd6/0x122 [ 90.538189][ T4604] dump_stack+0x11/0x1b [ 90.542382][ T4604] should_fail+0x23c/0x250 [ 90.546799][ T4604] __should_failslab+0x81/0x90 [ 90.551639][ T4604] should_failslab+0x5/0x20 [ 90.556123][ T4607] FAULT_INJECTION: forcing a failure. [ 90.556123][ T4607] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 90.556166][ T4604] kmem_cache_alloc_node+0x61/0x2d0 [ 90.574342][ T4604] ? __alloc_skb+0xf0/0x450 [ 90.578843][ T4604] __alloc_skb+0xf0/0x450 [ 90.583162][ T4604] netlink_sendmsg+0x4d5/0x7d0 [ 90.587966][ T4604] ? netlink_getsockopt+0x720/0x720 [ 90.593222][ T4604] ____sys_sendmsg+0x39a/0x510 [ 90.597972][ T4604] __sys_sendmsg+0x195/0x230 [ 90.602587][ T4604] __x64_sys_sendmsg+0x42/0x50 [ 90.607349][ T4604] do_syscall_64+0x44/0xd0 [ 90.611750][ T4604] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 90.617637][ T4604] RIP: 0033:0x7f229eaecae9 [ 90.622030][ T4604] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 90.641775][ T4604] RSP: 002b:00007f229c842188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 90.650164][ T4604] RAX: ffffffffffffffda RBX: 00007f229ec00020 RCX: 00007f229eaecae9 [ 90.658116][ T4604] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 90.669623][ T4604] RBP: 00007f229c8421d0 R08: 0000000000000000 R09: 0000000000000000 [ 90.677591][ T4604] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 90.685545][ T4604] R13: 00007ffd9766560f R14: 00007f229c842300 R15: 0000000000022000 [ 90.693567][ T4604] [ 90.696671][ T4607] CPU: 0 PID: 4607 Comm: syz-executor.0 Not tainted 5.16.0-rc2-syzkaller #0 [ 90.705343][ T4607] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 90.715391][ T4607] Call Trace: [ 90.718660][ T4607] [ 90.721584][ T4607] dump_stack_lvl+0xd6/0x122 [ 90.726224][ T4607] dump_stack+0x11/0x1b [ 90.730371][ T4607] should_fail+0x23c/0x250 [ 90.734781][ T4607] should_fail_usercopy+0x16/0x20 [ 90.739957][ T4607] _copy_from_iter+0x131/0x990 [ 90.744719][ T4607] ? check_stack_object+0x61/0x70 [ 90.749816][ T4607] ? __virt_addr_valid+0x15a/0x1a0 [ 90.754968][ T4607] ? __check_object_size+0x253/0x310 [ 90.760251][ T4607] netlink_sendmsg+0x58d/0x7d0 [ 90.765126][ T4607] ? netlink_getsockopt+0x720/0x720 [ 90.770434][ T4607] ____sys_sendmsg+0x39a/0x510 [ 90.775205][ T4607] __sys_sendmsg+0x195/0x230 [ 90.779890][ T4607] __x64_sys_sendmsg+0x42/0x50 [ 90.784688][ T4607] do_syscall_64+0x44/0xd0 [ 90.789104][ T4607] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 90.795047][ T4607] RIP: 0033:0x7f63a3dfbae9 [ 90.799497][ T4607] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 90.819135][ T4607] RSP: 002b:00007f63a1b72188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 90.827527][ T4607] RAX: ffffffffffffffda RBX: 00007f63a3f0ef60 RCX: 00007f63a3dfbae9 [ 90.835570][ T4607] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 90.843518][ T4607] RBP: 00007f63a1b721d0 R08: 0000000000000000 R09: 0000000000000000 23:47:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:47:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:47:53 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) (fail_nth: 4) 23:47:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:47:53 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = dup(0xffffffffffffffff) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) 23:47:53 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) (fail_nth: 4) [ 90.851467][ T4607] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 90.859418][ T4607] R13: 00007ffcec81edaf R14: 00007f63a1b72300 R15: 0000000000022000 [ 90.867387][ T4607] 23:47:53 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = dup(0xffffffffffffffff) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) 23:47:53 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) [ 90.925372][ T4619] FAULT_INJECTION: forcing a failure. [ 90.925372][ T4619] name failslab, interval 1, probability 0, space 0, times 0 [ 90.938046][ T4619] CPU: 1 PID: 4619 Comm: syz-executor.2 Not tainted 5.16.0-rc2-syzkaller #0 [ 90.946813][ T4619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 90.951625][ T4621] FAULT_INJECTION: forcing a failure. [ 90.951625][ T4621] name failslab, interval 1, probability 0, space 0, times 0 [ 90.956904][ T4619] Call Trace: [ 90.956914][ T4619] [ 90.956920][ T4619] dump_stack_lvl+0xd6/0x122 [ 90.956945][ T4619] dump_stack+0x11/0x1b [ 90.956993][ T4619] should_fail+0x23c/0x250 [ 90.988797][ T4619] __should_failslab+0x81/0x90 [ 90.993607][ T4619] should_failslab+0x5/0x20 [ 90.998130][ T4619] kmem_cache_alloc_node_trace+0x61/0x310 [ 91.003843][ T4619] ? __kmalloc_node_track_caller+0x30/0x40 [ 91.009693][ T4619] __kmalloc_node_track_caller+0x30/0x40 [ 91.015309][ T4619] ? netlink_sendmsg+0x4d5/0x7d0 [ 91.020231][ T4619] __alloc_skb+0x19d/0x450 [ 91.024642][ T4619] netlink_sendmsg+0x4d5/0x7d0 [ 91.029518][ T4619] ? netlink_getsockopt+0x720/0x720 [ 91.034740][ T4619] ____sys_sendmsg+0x39a/0x510 [ 91.039494][ T4619] __sys_sendmsg+0x195/0x230 [ 91.044072][ T4619] __x64_sys_sendmsg+0x42/0x50 [ 91.049256][ T4619] do_syscall_64+0x44/0xd0 [ 91.053656][ T4619] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 91.059550][ T4619] RIP: 0033:0x7f5597032ae9 [ 91.063945][ T4619] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 91.083587][ T4619] RSP: 002b:00007f5594da9188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 91.091985][ T4619] RAX: ffffffffffffffda RBX: 00007f5597145f60 RCX: 00007f5597032ae9 [ 91.100019][ T4619] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000005 [ 91.107988][ T4619] RBP: 00007f5594da91d0 R08: 0000000000000000 R09: 0000000000000000 [ 91.115943][ T4619] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 91.123897][ T4619] R13: 00007ffc64ac697f R14: 00007f5594da9300 R15: 0000000000022000 [ 91.131856][ T4619] [ 91.134926][ T4621] CPU: 0 PID: 4621 Comm: syz-executor.3 Not tainted 5.16.0-rc2-syzkaller #0 [ 91.143596][ T4621] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 91.153649][ T4621] Call Trace: [ 91.156928][ T4621] [ 91.159849][ T4621] dump_stack_lvl+0xd6/0x122 [ 91.163825][ T4625] FAULT_INJECTION: forcing a failure. [ 91.163825][ T4625] name failslab, interval 1, probability 0, space 0, times 0 [ 91.164435][ T4621] dump_stack+0x11/0x1b [ 91.164485][ T4621] should_fail+0x23c/0x250 [ 91.164502][ T4621] __should_failslab+0x81/0x90 [ 91.190348][ T4621] should_failslab+0x5/0x20 [ 91.194840][ T4621] kmem_cache_alloc_node_trace+0x61/0x310 [ 91.200577][ T4621] ? __kmalloc_node_track_caller+0x30/0x40 [ 91.206367][ T4621] __kmalloc_node_track_caller+0x30/0x40 [ 91.211996][ T4621] ? netlink_sendmsg+0x4d5/0x7d0 [ 91.216921][ T4621] __alloc_skb+0x19d/0x450 [ 91.221364][ T4621] netlink_sendmsg+0x4d5/0x7d0 [ 91.226165][ T4621] ? netlink_getsockopt+0x720/0x720 [ 91.231411][ T4621] ____sys_sendmsg+0x39a/0x510 [ 91.236184][ T4621] __sys_sendmsg+0x195/0x230 [ 91.240820][ T4621] __x64_sys_sendmsg+0x42/0x50 [ 91.245581][ T4621] do_syscall_64+0x44/0xd0 [ 91.249997][ T4621] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 91.255915][ T4621] RIP: 0033:0x7f229eaecae9 [ 91.260402][ T4621] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 91.279993][ T4621] RSP: 002b:00007f229c863188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 91.288391][ T4621] RAX: ffffffffffffffda RBX: 00007f229ebfff60 RCX: 00007f229eaecae9 [ 91.296382][ T4621] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000005 [ 91.304334][ T4621] RBP: 00007f229c8631d0 R08: 0000000000000000 R09: 0000000000000000 [ 91.312395][ T4621] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 23:47:53 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 6) [ 91.320351][ T4621] R13: 00007ffd9766560f R14: 00007f229c863300 R15: 0000000000022000 [ 91.328310][ T4621] [ 91.331314][ T4625] CPU: 1 PID: 4625 Comm: syz-executor.0 Not tainted 5.16.0-rc2-syzkaller #0 [ 91.339985][ T4625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 91.350205][ T4625] Call Trace: [ 91.353480][ T4625] [ 91.356400][ T4625] dump_stack_lvl+0xd6/0x122 [ 91.361048][ T4625] dump_stack+0x11/0x1b [ 91.365277][ T4625] should_fail+0x23c/0x250 [ 91.369687][ T4625] ? skb_clone+0x12c/0x1f0 23:47:53 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) 23:47:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:47:53 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) (fail_nth: 5) 23:47:53 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) (fail_nth: 5) [ 91.374127][ T4625] __should_failslab+0x81/0x90 [ 91.378986][ T4625] should_failslab+0x5/0x20 [ 91.383487][ T4625] kmem_cache_alloc+0x4f/0x320 [ 91.388307][ T4625] skb_clone+0x12c/0x1f0 [ 91.392548][ T4625] netlink_deliver_tap+0x2da/0x510 [ 91.397658][ T4625] netlink_unicast+0x5de/0x6c0 [ 91.402425][ T4625] netlink_sendmsg+0x6e1/0x7d0 [ 91.407235][ T4625] ? netlink_getsockopt+0x720/0x720 [ 91.412438][ T4625] ____sys_sendmsg+0x39a/0x510 [ 91.417262][ T4625] __sys_sendmsg+0x195/0x230 [ 91.421876][ T4625] __x64_sys_sendmsg+0x42/0x50 23:47:53 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:47:53 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = dup(0xffffffffffffffff) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) [ 91.426640][ T4625] do_syscall_64+0x44/0xd0 [ 91.431275][ T4625] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 91.437243][ T4625] RIP: 0033:0x7f63a3dfbae9 [ 91.441645][ T4625] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 91.461314][ T4625] RSP: 002b:00007f63a1b72188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 91.469728][ T4625] RAX: ffffffffffffffda RBX: 00007f63a3f0ef60 RCX: 00007f63a3dfbae9 23:47:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r4 = dup(0xffffffffffffffff) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) 23:47:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r4 = dup(0xffffffffffffffff) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) [ 91.477814][ T4625] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 91.485836][ T4625] RBP: 00007f63a1b721d0 R08: 0000000000000000 R09: 0000000000000000 [ 91.493853][ T4625] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 91.501819][ T4625] R13: 00007ffcec81edaf R14: 00007f63a1b72300 R15: 0000000000022000 [ 91.509789][ T4625] [ 91.546086][ T4643] FAULT_INJECTION: forcing a failure. [ 91.546086][ T4643] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 91.557455][ T4642] FAULT_INJECTION: forcing a failure. [ 91.557455][ T4642] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 91.559230][ T4643] CPU: 0 PID: 4643 Comm: syz-executor.3 Not tainted 5.16.0-rc2-syzkaller #0 [ 91.580759][ T4643] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 91.590797][ T4643] Call Trace: [ 91.594083][ T4643] [ 91.597000][ T4643] dump_stack_lvl+0xd6/0x122 [ 91.601641][ T4643] dump_stack+0x11/0x1b [ 91.605805][ T4643] should_fail+0x23c/0x250 [ 91.610213][ T4643] should_fail_usercopy+0x16/0x20 [ 91.615299][ T4643] _copy_from_iter+0x131/0x990 [ 91.620046][ T4643] ? check_stack_object+0x61/0x70 [ 91.625060][ T4643] ? __virt_addr_valid+0x15a/0x1a0 [ 91.630157][ T4643] ? __check_object_size+0x253/0x310 [ 91.635456][ T4643] netlink_sendmsg+0x58d/0x7d0 [ 91.640245][ T4643] ? netlink_getsockopt+0x720/0x720 [ 91.645439][ T4643] ____sys_sendmsg+0x39a/0x510 [ 91.650235][ T4643] __sys_sendmsg+0x195/0x230 [ 91.654815][ T4643] __x64_sys_sendmsg+0x42/0x50 [ 91.659616][ T4643] do_syscall_64+0x44/0xd0 [ 91.664080][ T4643] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 91.669962][ T4643] RIP: 0033:0x7f229eaecae9 [ 91.674357][ T4643] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 91.693975][ T4643] RSP: 002b:00007f229c863188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 91.702392][ T4643] RAX: ffffffffffffffda RBX: 00007f229ebfff60 RCX: 00007f229eaecae9 [ 91.710341][ T4643] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000005 [ 91.718316][ T4643] RBP: 00007f229c8631d0 R08: 0000000000000000 R09: 0000000000000000 [ 91.726266][ T4643] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 91.734217][ T4643] R13: 00007ffd9766560f R14: 00007f229c863300 R15: 0000000000022000 [ 91.742173][ T4643] 23:47:54 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:47:54 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = dup(0xffffffffffffffff) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) [ 91.745172][ T4642] CPU: 1 PID: 4642 Comm: syz-executor.2 Not tainted 5.16.0-rc2-syzkaller #0 [ 91.753840][ T4642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 91.763883][ T4642] Call Trace: [ 91.767154][ T4642] [ 91.770077][ T4642] dump_stack_lvl+0xd6/0x122 [ 91.774674][ T4642] dump_stack+0x11/0x1b [ 91.778827][ T4642] should_fail+0x23c/0x250 [ 91.783278][ T4642] should_fail_usercopy+0x16/0x20 [ 91.788332][ T4642] _copy_from_iter+0x131/0x990 23:47:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r4 = dup(0xffffffffffffffff) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) [ 91.793110][ T4642] ? check_stack_object+0x61/0x70 [ 91.798132][ T4642] ? __virt_addr_valid+0x15a/0x1a0 [ 91.803300][ T4642] ? __check_object_size+0x253/0x310 [ 91.808586][ T4642] netlink_sendmsg+0x58d/0x7d0 [ 91.813418][ T4642] ? netlink_getsockopt+0x720/0x720 [ 91.818703][ T4642] ____sys_sendmsg+0x39a/0x510 [ 91.823562][ T4642] __sys_sendmsg+0x195/0x230 [ 91.828141][ T4642] __x64_sys_sendmsg+0x42/0x50 [ 91.832930][ T4642] do_syscall_64+0x44/0xd0 [ 91.837328][ T4642] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 91.843205][ T4642] RIP: 0033:0x7f5597032ae9 [ 91.847597][ T4642] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 91.867182][ T4642] RSP: 002b:00007f5594da9188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 91.875590][ T4642] RAX: ffffffffffffffda RBX: 00007f5597145f60 RCX: 00007f5597032ae9 [ 91.883729][ T4642] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000005 [ 91.891711][ T4642] RBP: 00007f5594da91d0 R08: 0000000000000000 R09: 0000000000000000 [ 91.899671][ T4642] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 91.907625][ T4642] R13: 00007ffc64ac697f R14: 00007f5594da9300 R15: 0000000000022000 [ 91.915588][ T4642] 23:47:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 7) 23:47:54 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) (fail_nth: 6) 23:47:54 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) (fail_nth: 6) 23:47:54 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:47:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) 23:47:54 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = dup(0xffffffffffffffff) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) [ 92.013595][ T4659] FAULT_INJECTION: forcing a failure. [ 92.013595][ T4659] name failslab, interval 1, probability 0, space 0, times 0 [ 92.016909][ T4654] FAULT_INJECTION: forcing a failure. [ 92.016909][ T4654] name failslab, interval 1, probability 0, space 0, times 0 [ 92.026579][ T4659] CPU: 0 PID: 4659 Comm: syz-executor.3 Not tainted 5.16.0-rc2-syzkaller #0 [ 92.047807][ T4659] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 92.057841][ T4659] Call Trace: [ 92.061098][ T4659] [ 92.064009][ T4659] dump_stack_lvl+0xd6/0x122 [ 92.068604][ T4659] dump_stack+0x11/0x1b [ 92.072740][ T4659] should_fail+0x23c/0x250 [ 92.077187][ T4659] ? skb_clone+0x12c/0x1f0 [ 92.081586][ T4659] __should_failslab+0x81/0x90 [ 92.086333][ T4659] should_failslab+0x5/0x20 [ 92.090892][ T4659] kmem_cache_alloc+0x4f/0x320 [ 92.095670][ T4659] skb_clone+0x12c/0x1f0 [ 92.099940][ T4659] netlink_deliver_tap+0x2da/0x510 [ 92.105101][ T4659] netlink_unicast+0x5de/0x6c0 [ 92.109851][ T4659] netlink_sendmsg+0x6e1/0x7d0 [ 92.114655][ T4659] ? netlink_getsockopt+0x720/0x720 [ 92.119837][ T4659] ____sys_sendmsg+0x39a/0x510 [ 92.124630][ T4659] __sys_sendmsg+0x195/0x230 [ 92.129210][ T4659] __x64_sys_sendmsg+0x42/0x50 [ 92.134027][ T4659] do_syscall_64+0x44/0xd0 [ 92.138441][ T4659] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 92.144317][ T4659] RIP: 0033:0x7f229eaecae9 [ 92.148713][ T4659] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 92.168360][ T4659] RSP: 002b:00007f229c863188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 92.176796][ T4659] RAX: ffffffffffffffda RBX: 00007f229ebfff60 RCX: 00007f229eaecae9 [ 92.184757][ T4659] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000005 [ 92.192708][ T4659] RBP: 00007f229c8631d0 R08: 0000000000000000 R09: 0000000000000000 [ 92.200663][ T4659] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 23:47:54 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:47:54 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = dup(0xffffffffffffffff) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) [ 92.208723][ T4659] R13: 00007ffd9766560f R14: 00007f229c863300 R15: 0000000000022000 [ 92.216685][ T4659] [ 92.219701][ T4654] CPU: 1 PID: 4654 Comm: syz-executor.2 Not tainted 5.16.0-rc2-syzkaller #0 [ 92.228370][ T4654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 92.238418][ T4654] Call Trace: [ 92.241705][ T4654] [ 92.244638][ T4654] dump_stack_lvl+0xd6/0x122 [ 92.249255][ T4654] dump_stack+0x11/0x1b [ 92.253414][ T4654] should_fail+0x23c/0x250 [ 92.257824][ T4654] ? skb_clone+0x12c/0x1f0 23:47:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) [ 92.262313][ T4654] __should_failslab+0x81/0x90 [ 92.267137][ T4654] should_failslab+0x5/0x20 [ 92.271655][ T4654] kmem_cache_alloc+0x4f/0x320 [ 92.276419][ T4654] skb_clone+0x12c/0x1f0 [ 92.280691][ T4654] netlink_deliver_tap+0x2da/0x510 [ 92.285833][ T4654] netlink_unicast+0x5de/0x6c0 [ 92.290634][ T4654] netlink_sendmsg+0x6e1/0x7d0 [ 92.295518][ T4654] ? netlink_getsockopt+0x720/0x720 [ 92.300701][ T4654] ____sys_sendmsg+0x39a/0x510 [ 92.305527][ T4654] __sys_sendmsg+0x195/0x230 [ 92.310160][ T4654] __x64_sys_sendmsg+0x42/0x50 [ 92.314984][ T4654] do_syscall_64+0x44/0xd0 [ 92.319428][ T4654] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 92.325361][ T4654] RIP: 0033:0x7f5597032ae9 [ 92.329752][ T4654] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 92.349338][ T4654] RSP: 002b:00007f5594da9188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 92.357759][ T4654] RAX: ffffffffffffffda RBX: 00007f5597145f60 RCX: 00007f5597032ae9 [ 92.365721][ T4654] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000005 [ 92.373668][ T4654] RBP: 00007f5594da91d0 R08: 0000000000000000 R09: 0000000000000000 [ 92.381655][ T4654] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 92.389618][ T4654] R13: 00007ffc64ac697f R14: 00007f5594da9300 R15: 0000000000022000 [ 92.397602][ T4654] [ 92.405426][ T4666] FAULT_INJECTION: forcing a failure. [ 92.405426][ T4666] name failslab, interval 1, probability 0, space 0, times 0 [ 92.418253][ T4666] CPU: 0 PID: 4666 Comm: syz-executor.0 Not tainted 5.16.0-rc2-syzkaller #0 [ 92.426907][ T4666] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 92.436961][ T4666] Call Trace: [ 92.440282][ T4666] [ 92.443263][ T4666] dump_stack_lvl+0xd6/0x122 [ 92.447835][ T4666] dump_stack+0x11/0x1b [ 92.452049][ T4666] should_fail+0x23c/0x250 [ 92.456633][ T4666] ? rtnl_newlink+0x59/0x13b0 [ 92.461397][ T4666] __should_failslab+0x81/0x90 [ 92.466153][ T4666] should_failslab+0x5/0x20 [ 92.470701][ T4666] kmem_cache_alloc_trace+0x52/0x350 [ 92.476089][ T4666] ? __rcu_read_unlock+0x45/0x290 [ 92.481228][ T4666] rtnl_newlink+0x59/0x13b0 [ 92.485721][ T4666] ? rb_insert_color+0x2fa/0x310 [ 92.490637][ T4666] ? enqueue_entity+0x4bf/0x6c0 [ 92.495523][ T4666] ? enqueue_task_fair+0xda/0x520 [ 92.500551][ T4666] ? check_preempt_wakeup+0x255/0x3c0 [ 92.505940][ T4666] ? _raw_spin_unlock+0x2e/0x50 [ 92.510846][ T4666] ? load_balance+0x87a/0xcc0 [ 92.515566][ T4666] ? __this_cpu_preempt_check+0x18/0x20 [ 92.521097][ T4666] ? __perf_event_task_sched_in+0x898/0x8d0 [ 92.527050][ T4666] ? __this_cpu_preempt_check+0x18/0x20 [ 92.532586][ T4666] ? xfd_validate_state+0x4e/0xf0 [ 92.537590][ T4666] ? save_fpregs_to_fpstate+0xf5/0x140 [ 92.543029][ T4666] ? _raw_spin_unlock+0x2e/0x50 [ 92.547860][ T4666] ? finish_task_switch+0xd0/0x280 [ 92.552953][ T4666] ? __schedule+0x44a/0x6a0 [ 92.557445][ T4666] ? __list_del_entry_valid+0x54/0xc0 [ 92.562796][ T4666] ? _raw_spin_unlock+0x2e/0x50 [ 92.567684][ T4666] ? __mutex_lock+0x21d/0x5a0 [ 92.572418][ T4666] ? rtnl_setlink+0x2a0/0x2a0 [ 92.577074][ T4666] rtnetlink_rcv_msg+0x745/0x7e0 [ 92.581993][ T4666] ? ___cache_free+0x46/0x300 [ 92.586671][ T4666] ? kmem_cache_free+0x65/0x110 [ 92.591585][ T4666] ? __kfree_skb+0xfe/0x150 [ 92.596073][ T4666] ? consume_skb+0x48/0x160 [ 92.600646][ T4666] ? nlmon_xmit+0x5f/0x70 [ 92.604994][ T4666] ? __this_cpu_preempt_check+0x18/0x20 [ 92.610541][ T4666] ? __local_bh_enable_ip+0x4d/0x70 [ 92.615800][ T4666] ? local_bh_enable+0x1b/0x20 [ 92.620627][ T4666] ? __dev_queue_xmit+0x597/0xf70 [ 92.625888][ T4666] ? __skb_clone+0x2db/0x300 [ 92.630460][ T4666] ? __rcu_read_unlock+0x5c/0x290 [ 92.635483][ T4666] netlink_rcv_skb+0x14e/0x250 [ 92.640232][ T4666] ? rtnetlink_bind+0x60/0x60 [ 92.645023][ T4666] rtnetlink_rcv+0x18/0x20 [ 92.649510][ T4666] netlink_unicast+0x5fc/0x6c0 [ 92.654265][ T4666] netlink_sendmsg+0x6e1/0x7d0 [ 92.659046][ T4666] ? netlink_getsockopt+0x720/0x720 [ 92.664231][ T4666] ____sys_sendmsg+0x39a/0x510 [ 92.668994][ T4666] __sys_sendmsg+0x195/0x230 [ 92.673614][ T4666] __x64_sys_sendmsg+0x42/0x50 [ 92.678370][ T4666] do_syscall_64+0x44/0xd0 [ 92.682787][ T4666] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 92.688702][ T4666] RIP: 0033:0x7f63a3dfbae9 [ 92.693188][ T4666] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 23:47:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) 23:47:55 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 92.712857][ T4666] RSP: 002b:00007f63a1b72188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 92.721253][ T4666] RAX: ffffffffffffffda RBX: 00007f63a3f0ef60 RCX: 00007f63a3dfbae9 [ 92.729222][ T4666] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 92.737211][ T4666] RBP: 00007f63a1b721d0 R08: 0000000000000000 R09: 0000000000000000 [ 92.745171][ T4666] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 92.753207][ T4666] R13: 00007ffcec81edaf R14: 00007f63a1b72300 R15: 0000000000022000 [ 92.761386][ T4666] 23:47:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 8) 23:47:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, 0x0, &(0x7f0000000180)) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8}]}}}]}, 0x40}}, 0x0) 23:47:55 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) (fail_nth: 7) [ 92.827368][ T4672] FAULT_INJECTION: forcing a failure. [ 92.827368][ T4672] name failslab, interval 1, probability 0, space 0, times 0 [ 92.840131][ T4672] CPU: 1 PID: 4672 Comm: syz-executor.0 Not tainted 5.16.0-rc2-syzkaller #0 [ 92.848820][ T4672] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 92.858921][ T4672] Call Trace: [ 92.862296][ T4672] [ 92.865209][ T4672] dump_stack_lvl+0xd6/0x122 [ 92.869785][ T4672] dump_stack+0x11/0x1b [ 92.873995][ T4672] should_fail+0x23c/0x250 [ 92.878491][ T4672] __should_failslab+0x81/0x90 [ 92.883298][ T4672] should_failslab+0x5/0x20 [ 92.887789][ T4672] kmem_cache_alloc_node_trace+0x61/0x310 [ 92.893501][ T4672] ? cred_has_capability+0x10a/0x240 [ 92.898777][ T4672] ? cred_has_capability+0x1df/0x240 [ 92.904143][ T4672] ? __kmalloc_node+0x30/0x40 [ 92.908814][ T4672] ? hsr_del_ports+0x90/0x90 [ 92.913429][ T4672] __kmalloc_node+0x30/0x40 [ 92.918102][ T4672] kvmalloc_node+0x81/0x110 [ 92.922633][ T4672] alloc_netdev_mqs+0x86/0x790 [ 92.927394][ T4672] rtnl_create_link+0x22b/0x560 [ 92.932225][ T4672] rtnl_newlink+0xd07/0x13b0 [ 92.936894][ T4672] ? __rcu_read_unlock+0x5c/0x290 [ 92.941910][ T4672] ? rtnl_setlink+0x2a0/0x2a0 [ 92.946571][ T4672] rtnetlink_rcv_msg+0x745/0x7e0 [ 92.951491][ T4672] ? ___cache_free+0x46/0x300 [ 92.956175][ T4672] ? kmem_cache_free+0x65/0x110 [ 92.961005][ T4672] ? __kfree_skb+0xfe/0x150 [ 92.965492][ T4672] ? consume_skb+0x48/0x160 [ 92.970010][ T4672] ? nlmon_xmit+0x5f/0x70 [ 92.974378][ T4672] ? __this_cpu_preempt_check+0x18/0x20 [ 92.980080][ T4672] ? __local_bh_enable_ip+0x4d/0x70 [ 92.985269][ T4672] ? local_bh_enable+0x1b/0x20 [ 92.990121][ T4672] ? __dev_queue_xmit+0x597/0xf70 [ 92.995125][ T4672] ? __skb_clone+0x2db/0x300 [ 92.999807][ T4672] ? __rcu_read_unlock+0x5c/0x290 [ 93.004829][ T4672] netlink_rcv_skb+0x14e/0x250 [ 93.009658][ T4672] ? rtnetlink_bind+0x60/0x60 [ 93.014394][ T4672] rtnetlink_rcv+0x18/0x20 [ 93.018792][ T4672] netlink_unicast+0x5fc/0x6c0 [ 93.023537][ T4672] netlink_sendmsg+0x6e1/0x7d0 [ 93.028378][ T4672] ? netlink_getsockopt+0x720/0x720 [ 93.033558][ T4672] ____sys_sendmsg+0x39a/0x510 [ 93.038404][ T4672] __sys_sendmsg+0x195/0x230 [ 93.042982][ T4672] __x64_sys_sendmsg+0x42/0x50 [ 93.047779][ T4672] do_syscall_64+0x44/0xd0 [ 93.052186][ T4672] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 93.058178][ T4672] RIP: 0033:0x7f63a3dfbae9 [ 93.062570][ T4672] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 93.082272][ T4672] RSP: 002b:00007f63a1b72188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 93.090693][ T4672] RAX: ffffffffffffffda RBX: 00007f63a3f0ef60 RCX: 00007f63a3dfbae9 [ 93.098660][ T4672] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 93.106609][ T4672] RBP: 00007f63a1b721d0 R08: 0000000000000000 R09: 0000000000000000 [ 93.114562][ T4672] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 23:47:55 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:47:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r4 = dup(0xffffffffffffffff) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) 23:47:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 9) [ 93.122584][ T4672] R13: 00007ffcec81edaf R14: 00007f63a1b72300 R15: 0000000000022000 [ 93.130572][ T4672] 23:47:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r4 = dup(0xffffffffffffffff) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) 23:47:55 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 93.207462][ T4682] FAULT_INJECTION: forcing a failure. [ 93.207462][ T4682] name failslab, interval 1, probability 0, space 0, times 0 [ 93.220409][ T4682] CPU: 0 PID: 4682 Comm: syz-executor.3 Not tainted 5.16.0-rc2-syzkaller #0 [ 93.229089][ T4682] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 93.239122][ T4682] Call Trace: [ 93.242397][ T4682] [ 93.245307][ T4682] dump_stack_lvl+0xd6/0x122 [ 93.249937][ T4682] dump_stack+0x11/0x1b [ 93.254144][ T4682] should_fail+0x23c/0x250 [ 93.258635][ T4682] ? rtnl_newlink+0x59/0x13b0 [ 93.263299][ T4682] __should_failslab+0x81/0x90 [ 93.268096][ T4682] should_failslab+0x5/0x20 [ 93.272579][ T4682] kmem_cache_alloc_trace+0x52/0x350 [ 93.277856][ T4682] rtnl_newlink+0x59/0x13b0 [ 93.282344][ T4682] ? __crc32c_le_base+0x250/0x350 [ 93.287425][ T4682] ? mb_update_avg_fragment_size+0x4e/0x260 [ 93.293353][ T4682] ? mb_set_largest_free_order+0x2e5/0x330 [ 93.299147][ T4682] ? __crc32c_le_base+0x250/0x350 [ 93.304202][ T4682] ? chksum_update+0x39/0x50 [ 93.308772][ T4682] ? crypto_shash_update+0x13c/0x1a0 [ 93.314069][ T4682] ? mark_page_accessed+0x37/0x50 [ 93.319131][ T4682] ? __find_get_block+0x785/0x9b0 [ 93.324158][ T4682] ? delay_tsc+0x96/0xe0 [ 93.328408][ T4682] ? __getblk_gfp+0x3f/0x530 [ 93.332992][ T4682] ? __rcu_read_unlock+0x5c/0x290 [ 93.338009][ T4682] ? __rcu_read_unlock+0x5c/0x290 [ 93.343016][ T4682] ? avc_has_perm_noaudit+0x1c0/0x270 [ 93.348539][ T4682] ? cred_has_capability+0x10a/0x240 [ 93.353817][ T4682] ? cred_has_capability+0x1df/0x240 [ 93.359105][ T4682] ? selinux_capable+0x34/0x40 [ 93.363851][ T4682] ? security_capable+0x91/0xa0 [ 93.368711][ T4682] ? __rcu_read_unlock+0x5c/0x290 [ 93.373732][ T4682] ? rtnl_setlink+0x2a0/0x2a0 [ 93.378454][ T4682] rtnetlink_rcv_msg+0x745/0x7e0 [ 93.383377][ T4682] ? ___cache_free+0x46/0x300 [ 93.388032][ T4682] ? kmem_cache_free+0x65/0x110 [ 93.392861][ T4682] ? __kfree_skb+0xfe/0x150 [ 93.397362][ T4682] ? consume_skb+0x48/0x160 [ 93.401864][ T4682] ? nlmon_xmit+0x5f/0x70 [ 93.406175][ T4682] ? __this_cpu_preempt_check+0x18/0x20 [ 93.411782][ T4682] ? __local_bh_enable_ip+0x4d/0x70 [ 93.416973][ T4682] ? local_bh_enable+0x1b/0x20 [ 93.421781][ T4682] ? __dev_queue_xmit+0x597/0xf70 [ 93.426800][ T4682] ? __skb_clone+0x2db/0x300 [ 93.431372][ T4682] ? __rcu_read_unlock+0x5c/0x290 [ 93.436375][ T4682] netlink_rcv_skb+0x14e/0x250 [ 93.441117][ T4682] ? rtnetlink_bind+0x60/0x60 [ 93.445865][ T4682] rtnetlink_rcv+0x18/0x20 [ 93.450307][ T4682] netlink_unicast+0x5fc/0x6c0 [ 93.455062][ T4682] netlink_sendmsg+0x6e1/0x7d0 [ 93.459847][ T4682] ? netlink_getsockopt+0x720/0x720 [ 93.465041][ T4682] ____sys_sendmsg+0x39a/0x510 [ 93.469792][ T4682] __sys_sendmsg+0x195/0x230 [ 93.474413][ T4682] __x64_sys_sendmsg+0x42/0x50 [ 93.479184][ T4682] do_syscall_64+0x44/0xd0 [ 93.483606][ T4682] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 93.489699][ T4682] RIP: 0033:0x7f229eaecae9 [ 93.494269][ T4682] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 93.513943][ T4682] RSP: 002b:00007f229c863188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 93.522346][ T4682] RAX: ffffffffffffffda RBX: 00007f229ebfff60 RCX: 00007f229eaecae9 [ 93.530296][ T4682] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000005 [ 93.538248][ T4682] RBP: 00007f229c8631d0 R08: 0000000000000000 R09: 0000000000000000 [ 93.546211][ T4682] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 23:47:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r4 = dup(0xffffffffffffffff) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) 23:47:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, 0x0, &(0x7f0000000180)) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8}]}}}]}, 0x40}}, 0x0) 23:47:56 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = dup(0xffffffffffffffff) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) [ 93.554178][ T4682] R13: 00007ffd9766560f R14: 00007f229c863300 R15: 0000000000022000 [ 93.562139][ T4682] 23:47:56 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:47:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) 23:47:56 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) (fail_nth: 8) [ 93.601130][ T4687] FAULT_INJECTION: forcing a failure. [ 93.601130][ T4687] name failslab, interval 1, probability 0, space 0, times 0 [ 93.613969][ T4687] CPU: 1 PID: 4687 Comm: syz-executor.0 Not tainted 5.16.0-rc2-syzkaller #0 [ 93.622666][ T4687] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 93.632822][ T4687] Call Trace: [ 93.636096][ T4687] [ 93.639031][ T4687] dump_stack_lvl+0xd6/0x122 [ 93.643626][ T4687] dump_stack+0x11/0x1b [ 93.647860][ T4687] should_fail+0x23c/0x250 [ 93.652344][ T4687] ? __hw_addr_add_ex+0x19c/0x460 [ 93.657443][ T4687] __should_failslab+0x81/0x90 [ 93.662301][ T4687] should_failslab+0x5/0x20 [ 93.666795][ T4687] kmem_cache_alloc_trace+0x52/0x350 [ 93.672066][ T4687] ? __rcu_read_unlock+0x5c/0x290 [ 93.677187][ T4687] __hw_addr_add_ex+0x19c/0x460 [ 93.682250][ T4687] ? hsr_del_ports+0x90/0x90 [ 93.686826][ T4687] dev_addr_init+0xae/0x120 [ 93.691316][ T4687] alloc_netdev_mqs+0xe3/0x790 [ 93.696080][ T4687] rtnl_create_link+0x22b/0x560 [ 93.700916][ T4687] rtnl_newlink+0xd07/0x13b0 [ 93.705492][ T4687] ? __rcu_read_unlock+0x5c/0x290 [ 93.710496][ T4687] ? rtnl_setlink+0x2a0/0x2a0 [ 93.715224][ T4687] rtnetlink_rcv_msg+0x745/0x7e0 [ 93.720156][ T4687] ? ___cache_free+0x46/0x300 [ 93.724863][ T4687] ? kmem_cache_free+0x65/0x110 [ 93.729696][ T4687] ? __kfree_skb+0xfe/0x150 [ 93.734258][ T4687] ? consume_skb+0x48/0x160 [ 93.738785][ T4687] ? nlmon_xmit+0x5f/0x70 [ 93.743116][ T4687] ? __this_cpu_preempt_check+0x18/0x20 [ 93.748709][ T4687] ? __local_bh_enable_ip+0x4d/0x70 [ 93.754308][ T4687] ? local_bh_enable+0x1b/0x20 [ 93.759068][ T4687] ? __dev_queue_xmit+0x597/0xf70 [ 93.764078][ T4687] ? __skb_clone+0x2db/0x300 [ 93.768650][ T4687] ? __rcu_read_unlock+0x5c/0x290 [ 93.773655][ T4687] netlink_rcv_skb+0x14e/0x250 [ 93.778501][ T4687] ? rtnetlink_bind+0x60/0x60 [ 93.783176][ T4687] rtnetlink_rcv+0x18/0x20 [ 93.787607][ T4687] netlink_unicast+0x5fc/0x6c0 [ 93.792498][ T4687] netlink_sendmsg+0x6e1/0x7d0 [ 93.797339][ T4687] ? netlink_getsockopt+0x720/0x720 [ 93.802579][ T4687] ____sys_sendmsg+0x39a/0x510 [ 93.807334][ T4687] __sys_sendmsg+0x195/0x230 [ 93.811924][ T4687] __x64_sys_sendmsg+0x42/0x50 [ 93.816846][ T4687] do_syscall_64+0x44/0xd0 [ 93.821247][ T4687] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 93.827126][ T4687] RIP: 0033:0x7f63a3dfbae9 [ 93.831640][ T4687] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 93.851278][ T4687] RSP: 002b:00007f63a1b72188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 93.859690][ T4687] RAX: ffffffffffffffda RBX: 00007f63a3f0ef60 RCX: 00007f63a3dfbae9 [ 93.867655][ T4687] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 93.875604][ T4687] RBP: 00007f63a1b721d0 R08: 0000000000000000 R09: 0000000000000000 [ 93.883574][ T4687] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 93.891524][ T4687] R13: 00007ffcec81edaf R14: 00007f63a1b72300 R15: 0000000000022000 [ 93.899571][ T4687] 23:47:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) 23:47:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 10) 23:47:56 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = dup(0xffffffffffffffff) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) 23:47:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, 0x0, &(0x7f0000000180)) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8}]}}}]}, 0x40}}, 0x0) [ 93.952150][ T4699] FAULT_INJECTION: forcing a failure. [ 93.952150][ T4699] name failslab, interval 1, probability 0, space 0, times 0 [ 93.964809][ T4699] CPU: 0 PID: 4699 Comm: syz-executor.3 Not tainted 5.16.0-rc2-syzkaller #0 [ 93.973508][ T4699] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 93.983543][ T4699] Call Trace: [ 93.986803][ T4699] [ 93.989726][ T4699] dump_stack_lvl+0xd6/0x122 [ 93.994318][ T4699] dump_stack+0x11/0x1b [ 93.998473][ T4699] should_fail+0x23c/0x250 [ 94.002968][ T4699] __should_failslab+0x81/0x90 [ 94.007744][ T4699] should_failslab+0x5/0x20 [ 94.012249][ T4699] kmem_cache_alloc_node_trace+0x61/0x310 [ 94.018068][ T4699] ? cred_has_capability+0x10a/0x240 [ 94.023401][ T4699] ? cred_has_capability+0x1df/0x240 [ 94.028700][ T4699] ? __kmalloc_node+0x30/0x40 [ 94.033361][ T4699] ? hsr_del_ports+0x90/0x90 [ 94.038148][ T4699] __kmalloc_node+0x30/0x40 [ 94.042648][ T4699] kvmalloc_node+0x81/0x110 [ 94.047137][ T4699] alloc_netdev_mqs+0x86/0x790 [ 94.051961][ T4699] rtnl_create_link+0x22b/0x560 [ 94.056809][ T4699] rtnl_newlink+0xd07/0x13b0 [ 94.061397][ T4699] ? __rcu_read_unlock+0x5c/0x290 [ 94.066458][ T4699] ? rtnl_setlink+0x2a0/0x2a0 [ 94.071200][ T4699] rtnetlink_rcv_msg+0x745/0x7e0 [ 94.076164][ T4699] ? ___cache_free+0x46/0x300 [ 94.080824][ T4699] ? kmem_cache_free+0x65/0x110 [ 94.085667][ T4699] ? __kfree_skb+0xfe/0x150 [ 94.090167][ T4699] ? consume_skb+0x48/0x160 [ 94.094893][ T4699] ? nlmon_xmit+0x5f/0x70 [ 94.099203][ T4699] ? __this_cpu_preempt_check+0x18/0x20 [ 94.104810][ T4699] ? __local_bh_enable_ip+0x4d/0x70 [ 94.110162][ T4699] ? local_bh_enable+0x1b/0x20 [ 94.115001][ T4699] ? __dev_queue_xmit+0x597/0xf70 [ 94.120026][ T4699] ? __skb_clone+0x2db/0x300 [ 94.124653][ T4699] ? __rcu_read_unlock+0x5c/0x290 [ 94.129689][ T4699] netlink_rcv_skb+0x14e/0x250 [ 94.134527][ T4699] ? rtnetlink_bind+0x60/0x60 [ 94.139249][ T4699] rtnetlink_rcv+0x18/0x20 [ 94.143653][ T4699] netlink_unicast+0x5fc/0x6c0 [ 94.148424][ T4699] netlink_sendmsg+0x6e1/0x7d0 [ 94.153234][ T4699] ? netlink_getsockopt+0x720/0x720 [ 94.158437][ T4699] ____sys_sendmsg+0x39a/0x510 [ 94.163243][ T4699] __sys_sendmsg+0x195/0x230 [ 94.167824][ T4699] __x64_sys_sendmsg+0x42/0x50 [ 94.172625][ T4699] do_syscall_64+0x44/0xd0 [ 94.177047][ T4699] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 94.182918][ T4699] RIP: 0033:0x7f229eaecae9 [ 94.187309][ T4699] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 94.206951][ T4699] RSP: 002b:00007f229c863188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 94.215430][ T4699] RAX: ffffffffffffffda RBX: 00007f229ebfff60 RCX: 00007f229eaecae9 [ 94.223401][ T4699] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000005 [ 94.231401][ T4699] RBP: 00007f229c8631d0 R08: 0000000000000000 R09: 0000000000000000 [ 94.239458][ T4699] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 23:47:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) [ 94.247406][ T4699] R13: 00007ffd9766560f R14: 00007f229c863300 R15: 0000000000022000 [ 94.255454][ T4699] [ 94.266393][ T4703] FAULT_INJECTION: forcing a failure. [ 94.266393][ T4703] name failslab, interval 1, probability 0, space 0, times 0 [ 94.279057][ T4703] CPU: 0 PID: 4703 Comm: syz-executor.0 Not tainted 5.16.0-rc2-syzkaller #0 [ 94.287735][ T4703] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 94.297783][ T4703] Call Trace: 23:47:56 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) [ 94.301055][ T4703] [ 94.303978][ T4703] dump_stack_lvl+0xd6/0x122 [ 94.308589][ T4703] dump_stack+0x11/0x1b [ 94.312826][ T4703] should_fail+0x23c/0x250 [ 94.317243][ T4703] __should_failslab+0x81/0x90 [ 94.321992][ T4703] should_failslab+0x5/0x20 [ 94.326790][ T4703] kmem_cache_alloc_node_trace+0x61/0x310 [ 94.332619][ T4703] ? __kmalloc_node+0x30/0x40 [ 94.337312][ T4703] __kmalloc_node+0x30/0x40 [ 94.341816][ T4703] kvmalloc_node+0x81/0x110 [ 94.346322][ T4703] alloc_netdev_mqs+0x416/0x790 [ 94.351173][ T4703] rtnl_create_link+0x22b/0x560 [ 94.356005][ T4703] rtnl_newlink+0xd07/0x13b0 [ 94.360661][ T4703] ? rtnl_setlink+0x2a0/0x2a0 [ 94.365515][ T4703] rtnetlink_rcv_msg+0x745/0x7e0 [ 94.370659][ T4703] ? ___cache_free+0x46/0x300 [ 94.375325][ T4703] ? kmem_cache_free+0x65/0x110 [ 94.380210][ T4703] ? __kfree_skb+0xfe/0x150 [ 94.384773][ T4703] ? consume_skb+0x48/0x160 [ 94.389273][ T4703] ? nlmon_xmit+0x5f/0x70 [ 94.393691][ T4703] ? __this_cpu_preempt_check+0x18/0x20 [ 94.399242][ T4703] ? __local_bh_enable_ip+0x4d/0x70 [ 94.404537][ T4703] ? local_bh_enable+0x1b/0x20 [ 94.409413][ T4703] ? __dev_queue_xmit+0x597/0xf70 [ 94.414416][ T4703] ? __skb_clone+0x2db/0x300 [ 94.419029][ T4703] ? __rcu_read_unlock+0x5c/0x290 [ 94.424086][ T4703] netlink_rcv_skb+0x14e/0x250 [ 94.428867][ T4703] ? rtnetlink_bind+0x60/0x60 [ 94.433554][ T4703] rtnetlink_rcv+0x18/0x20 [ 94.437991][ T4703] netlink_unicast+0x5fc/0x6c0 [ 94.442740][ T4703] netlink_sendmsg+0x6e1/0x7d0 [ 94.447577][ T4703] ? netlink_getsockopt+0x720/0x720 [ 94.452809][ T4703] ____sys_sendmsg+0x39a/0x510 [ 94.457557][ T4703] __sys_sendmsg+0x195/0x230 [ 94.462225][ T4703] __x64_sys_sendmsg+0x42/0x50 [ 94.467001][ T4703] do_syscall_64+0x44/0xd0 [ 94.471468][ T4703] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 94.477397][ T4703] RIP: 0033:0x7f63a3dfbae9 [ 94.481800][ T4703] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 94.501508][ T4703] RSP: 002b:00007f63a1b72188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 94.509904][ T4703] RAX: ffffffffffffffda RBX: 00007f63a3f0ef60 RCX: 00007f63a3dfbae9 [ 94.517980][ T4703] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 94.526006][ T4703] RBP: 00007f63a1b721d0 R08: 0000000000000000 R09: 0000000000000000 [ 94.534099][ T4703] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 94.542070][ T4703] R13: 00007ffcec81edaf R14: 00007f63a1b72300 R15: 0000000000022000 [ 94.550085][ T4703] 23:47:57 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) (fail_nth: 9) 23:47:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:47:57 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 11) 23:47:57 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = dup(0xffffffffffffffff) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) 23:47:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, 0x0, &(0x7f0000000180)) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8}]}}}]}, 0x40}}, 0x0) [ 94.602483][ T4714] FAULT_INJECTION: forcing a failure. [ 94.602483][ T4714] name failslab, interval 1, probability 0, space 0, times 0 [ 94.615153][ T4714] CPU: 1 PID: 4714 Comm: syz-executor.3 Not tainted 5.16.0-rc2-syzkaller #0 [ 94.623888][ T4714] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 94.633935][ T4714] Call Trace: [ 94.637208][ T4714] [ 94.640141][ T4714] dump_stack_lvl+0xd6/0x122 [ 94.644792][ T4714] dump_stack+0x11/0x1b [ 94.649034][ T4714] should_fail+0x23c/0x250 [ 94.653448][ T4714] ? __hw_addr_add_ex+0x19c/0x460 [ 94.658595][ T4714] __should_failslab+0x81/0x90 [ 94.663364][ T4714] should_failslab+0x5/0x20 [ 94.667881][ T4714] kmem_cache_alloc_trace+0x52/0x350 [ 94.673168][ T4714] __hw_addr_add_ex+0x19c/0x460 [ 94.678019][ T4714] ? hsr_del_ports+0x90/0x90 [ 94.682665][ T4714] dev_addr_init+0xae/0x120 [ 94.687152][ T4714] alloc_netdev_mqs+0xe3/0x790 [ 94.691912][ T4714] rtnl_create_link+0x22b/0x560 [ 94.696790][ T4714] rtnl_newlink+0xd07/0x13b0 [ 94.701379][ T4714] ? __rcu_read_unlock+0x5c/0x290 [ 94.706480][ T4714] ? rtnl_setlink+0x2a0/0x2a0 [ 94.711148][ T4714] rtnetlink_rcv_msg+0x745/0x7e0 [ 94.716134][ T4714] ? ___cache_free+0x46/0x300 [ 94.720791][ T4714] ? kmem_cache_free+0x65/0x110 [ 94.725687][ T4714] ? __kfree_skb+0xfe/0x150 [ 94.730249][ T4714] ? consume_skb+0x48/0x160 [ 94.734753][ T4714] ? nlmon_xmit+0x5f/0x70 [ 94.739082][ T4714] ? __this_cpu_preempt_check+0x18/0x20 [ 94.744629][ T4714] ? __local_bh_enable_ip+0x4d/0x70 [ 94.749838][ T4714] ? local_bh_enable+0x1b/0x20 [ 94.754645][ T4714] ? __dev_queue_xmit+0x597/0xf70 [ 94.759651][ T4714] ? __skb_clone+0x2db/0x300 [ 94.764227][ T4714] ? __rcu_read_unlock+0x5c/0x290 [ 94.769232][ T4714] netlink_rcv_skb+0x14e/0x250 [ 94.773984][ T4714] ? rtnetlink_bind+0x60/0x60 [ 94.778668][ T4714] rtnetlink_rcv+0x18/0x20 [ 94.783096][ T4714] netlink_unicast+0x5fc/0x6c0 [ 94.787907][ T4714] netlink_sendmsg+0x6e1/0x7d0 [ 94.792665][ T4714] ? netlink_getsockopt+0x720/0x720 [ 94.797901][ T4714] ____sys_sendmsg+0x39a/0x510 [ 94.802727][ T4714] __sys_sendmsg+0x195/0x230 [ 94.807387][ T4714] __x64_sys_sendmsg+0x42/0x50 [ 94.812151][ T4714] do_syscall_64+0x44/0xd0 [ 94.816633][ T4714] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 94.822580][ T4714] RIP: 0033:0x7f229eaecae9 [ 94.827050][ T4714] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 94.846688][ T4714] RSP: 002b:00007f229c863188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 94.855132][ T4714] RAX: ffffffffffffffda RBX: 00007f229ebfff60 RCX: 00007f229eaecae9 [ 94.863079][ T4714] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000005 [ 94.871089][ T4714] RBP: 00007f229c8631d0 R08: 0000000000000000 R09: 0000000000000000 [ 94.879130][ T4714] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 94.887086][ T4714] R13: 00007ffd9766560f R14: 00007f229c863300 R15: 0000000000022000 [ 94.895040][ T4714] 23:47:57 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) (fail_nth: 10) [ 94.899639][ T4718] FAULT_INJECTION: forcing a failure. [ 94.899639][ T4718] name failslab, interval 1, probability 0, space 0, times 0 [ 94.912293][ T4718] CPU: 1 PID: 4718 Comm: syz-executor.0 Not tainted 5.16.0-rc2-syzkaller #0 [ 94.920982][ T4718] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 94.931034][ T4718] Call Trace: [ 94.934313][ T4718] [ 94.937299][ T4718] dump_stack_lvl+0xd6/0x122 [ 94.946628][ T4718] dump_stack+0x11/0x1b [ 94.950809][ T4718] should_fail+0x23c/0x250 [ 94.955217][ T4718] __should_failslab+0x81/0x90 [ 94.959982][ T4718] should_failslab+0x5/0x20 [ 94.964574][ T4718] kmem_cache_alloc_node_trace+0x61/0x310 [ 94.970303][ T4718] ? __kmalloc_node+0x30/0x40 [ 94.975072][ T4718] __kmalloc_node+0x30/0x40 [ 94.979570][ T4718] kvmalloc_node+0x81/0x110 [ 94.984057][ T4718] alloc_netdev_mqs+0x59c/0x790 [ 94.988943][ T4718] rtnl_create_link+0x22b/0x560 [ 94.993800][ T4718] rtnl_newlink+0xd07/0x13b0 [ 94.998527][ T4718] ? rtnl_setlink+0x2a0/0x2a0 [ 95.003184][ T4718] rtnetlink_rcv_msg+0x745/0x7e0 [ 95.008182][ T4718] ? ___cache_free+0x46/0x300 [ 95.012896][ T4718] ? kmem_cache_free+0x65/0x110 [ 95.017852][ T4718] ? __kfree_skb+0xfe/0x150 [ 95.022417][ T4718] ? consume_skb+0x48/0x160 [ 95.027004][ T4718] ? nlmon_xmit+0x5f/0x70 [ 95.031326][ T4718] ? __this_cpu_preempt_check+0x18/0x20 [ 95.036952][ T4718] ? __local_bh_enable_ip+0x4d/0x70 [ 95.042127][ T4718] ? local_bh_enable+0x1b/0x20 [ 95.046922][ T4718] ? __dev_queue_xmit+0x597/0xf70 [ 95.051928][ T4718] ? __skb_clone+0x2db/0x300 [ 95.056524][ T4718] ? __rcu_read_unlock+0x5c/0x290 [ 95.061534][ T4718] netlink_rcv_skb+0x14e/0x250 [ 95.066355][ T4718] ? rtnetlink_bind+0x60/0x60 [ 95.071015][ T4718] rtnetlink_rcv+0x18/0x20 [ 95.075541][ T4718] netlink_unicast+0x5fc/0x6c0 [ 95.080285][ T4718] netlink_sendmsg+0x6e1/0x7d0 [ 95.085031][ T4718] ? netlink_getsockopt+0x720/0x720 [ 95.090302][ T4718] ____sys_sendmsg+0x39a/0x510 [ 95.095054][ T4718] __sys_sendmsg+0x195/0x230 [ 95.099793][ T4718] __x64_sys_sendmsg+0x42/0x50 [ 95.104580][ T4718] do_syscall_64+0x44/0xd0 [ 95.109016][ T4718] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 95.114892][ T4718] RIP: 0033:0x7f63a3dfbae9 [ 95.119293][ T4718] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 95.138887][ T4718] RSP: 002b:00007f63a1b72188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 95.147333][ T4718] RAX: ffffffffffffffda RBX: 00007f63a3f0ef60 RCX: 00007f63a3dfbae9 [ 95.155281][ T4718] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 95.163229][ T4718] RBP: 00007f63a1b721d0 R08: 0000000000000000 R09: 0000000000000000 [ 95.171222][ T4718] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 95.179189][ T4718] R13: 00007ffcec81edaf R14: 00007f63a1b72300 R15: 0000000000022000 [ 95.187214][ T4718] [ 95.198245][ T4724] FAULT_INJECTION: forcing a failure. 23:47:57 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 12) [ 95.198245][ T4724] name failslab, interval 1, probability 0, space 0, times 0 [ 95.210905][ T4724] CPU: 1 PID: 4724 Comm: syz-executor.3 Not tainted 5.16.0-rc2-syzkaller #0 [ 95.219896][ T4724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 95.229961][ T4724] Call Trace: [ 95.233235][ T4724] [ 95.236241][ T4724] dump_stack_lvl+0xd6/0x122 [ 95.240834][ T4724] dump_stack+0x11/0x1b [ 95.244988][ T4724] should_fail+0x23c/0x250 [ 95.249463][ T4724] __should_failslab+0x81/0x90 [ 95.254223][ T4724] should_failslab+0x5/0x20 [ 95.258786][ T4724] kmem_cache_alloc_node_trace+0x61/0x310 [ 95.264564][ T4724] ? __kmalloc_node+0x30/0x40 [ 95.269226][ T4724] __kmalloc_node+0x30/0x40 [ 95.273732][ T4724] kvmalloc_node+0x81/0x110 [ 95.278223][ T4724] alloc_netdev_mqs+0x416/0x790 [ 95.283084][ T4724] rtnl_create_link+0x22b/0x560 [ 95.287986][ T4724] rtnl_newlink+0xd07/0x13b0 [ 95.292625][ T4724] ? rtnl_setlink+0x2a0/0x2a0 [ 95.297314][ T4724] rtnetlink_rcv_msg+0x745/0x7e0 [ 95.302253][ T4724] ? ___cache_free+0x46/0x300 [ 95.306951][ T4724] ? debug_smp_processor_id+0x18/0x20 [ 95.312348][ T4724] ? kmem_cache_free+0x65/0x110 [ 95.317283][ T4724] ? __kfree_skb+0xfe/0x150 [ 95.321926][ T4724] ? consume_skb+0x48/0x160 [ 95.326472][ T4724] ? nlmon_xmit+0x5f/0x70 [ 95.330817][ T4724] ? __this_cpu_preempt_check+0x18/0x20 [ 95.336545][ T4724] ? __local_bh_enable_ip+0x4d/0x70 [ 95.341814][ T4724] ? local_bh_enable+0x1b/0x20 [ 95.346576][ T4724] ? __dev_queue_xmit+0x597/0xf70 [ 95.351691][ T4724] ? __skb_clone+0x2db/0x300 [ 95.356334][ T4724] ? __rcu_read_unlock+0x5c/0x290 [ 95.361356][ T4724] netlink_rcv_skb+0x14e/0x250 [ 95.366148][ T4724] ? rtnetlink_bind+0x60/0x60 [ 95.370993][ T4724] rtnetlink_rcv+0x18/0x20 [ 95.375454][ T4724] netlink_unicast+0x5fc/0x6c0 [ 95.380208][ T4724] netlink_sendmsg+0x6e1/0x7d0 [ 95.384964][ T4724] ? netlink_getsockopt+0x720/0x720 [ 95.390156][ T4724] ____sys_sendmsg+0x39a/0x510 [ 95.394987][ T4724] __sys_sendmsg+0x195/0x230 [ 95.399560][ T4724] __x64_sys_sendmsg+0x42/0x50 [ 95.404349][ T4724] do_syscall_64+0x44/0xd0 [ 95.408767][ T4724] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 95.414670][ T4724] RIP: 0033:0x7f229eaecae9 [ 95.419090][ T4724] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 95.438677][ T4724] RSP: 002b:00007f229c863188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 95.447078][ T4724] RAX: ffffffffffffffda RBX: 00007f229ebfff60 RCX: 00007f229eaecae9 [ 95.455109][ T4724] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000005 [ 95.463077][ T4724] RBP: 00007f229c8631d0 R08: 0000000000000000 R09: 0000000000000000 [ 95.471263][ T4724] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 95.479220][ T4724] R13: 00007ffd9766560f R14: 00007f229c863300 R15: 0000000000022000 [ 95.487232][ T4724] [ 95.520257][ T4726] FAULT_INJECTION: forcing a failure. [ 95.520257][ T4726] name failslab, interval 1, probability 0, space 0, times 0 [ 95.532936][ T4726] CPU: 0 PID: 4726 Comm: syz-executor.0 Not tainted 5.16.0-rc2-syzkaller #0 [ 95.541710][ T4726] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 95.551764][ T4726] Call Trace: [ 95.555045][ T4726] [ 95.557974][ T4726] dump_stack_lvl+0xd6/0x122 [ 95.562605][ T4726] dump_stack+0x11/0x1b 23:47:58 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x3, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:47:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:47:58 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) (fail_nth: 11) 23:47:58 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, 0x0, &(0x7f0000000180)) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8}]}}}]}, 0x40}}, 0x0) 23:47:58 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r4 = dup(0xffffffffffffffff) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) [ 95.566788][ T4726] should_fail+0x23c/0x250 [ 95.571203][ T4726] ? hsr_create_self_node+0x4c/0x280 [ 95.576519][ T4726] __should_failslab+0x81/0x90 [ 95.581331][ T4726] should_failslab+0x5/0x20 [ 95.585915][ T4726] kmem_cache_alloc_trace+0x52/0x350 [ 95.591250][ T4726] ? kmem_cache_alloc_node_trace+0x20f/0x310 [ 95.597324][ T4726] hsr_create_self_node+0x4c/0x280 [ 95.602436][ T4726] hsr_dev_finalize+0x19e/0x460 [ 95.607353][ T4726] hsr_newlink+0x40d/0x450 [ 95.611811][ T4726] ? hsr_get_node_list+0x450/0x450 [ 95.616934][ T4726] rtnl_newlink+0xdae/0x13b0 [ 95.621525][ T4726] ? detach_tasks+0x2d0/0x3a0 [ 95.626188][ T4726] ? rtnl_setlink+0x2a0/0x2a0 [ 95.630900][ T4726] rtnetlink_rcv_msg+0x745/0x7e0 [ 95.635822][ T4726] ? ___cache_free+0x46/0x300 [ 95.640529][ T4726] ? kmem_cache_free+0x65/0x110 [ 95.645357][ T4726] ? __kfree_skb+0xfe/0x150 [ 95.649845][ T4726] ? consume_skb+0x48/0x160 [ 95.654349][ T4726] ? nlmon_xmit+0x5f/0x70 [ 95.658693][ T4726] ? __this_cpu_preempt_check+0x18/0x20 [ 95.664223][ T4726] ? __local_bh_enable_ip+0x4d/0x70 [ 95.669494][ T4726] ? local_bh_enable+0x1b/0x20 [ 95.674261][ T4726] ? __dev_queue_xmit+0x597/0xf70 [ 95.679268][ T4726] ? __skb_clone+0x2db/0x300 [ 95.683851][ T4726] ? __rcu_read_unlock+0x5c/0x290 [ 95.688978][ T4726] netlink_rcv_skb+0x14e/0x250 [ 95.699046][ T4726] ? rtnetlink_bind+0x60/0x60 [ 95.703731][ T4726] rtnetlink_rcv+0x18/0x20 [ 95.708144][ T4726] netlink_unicast+0x5fc/0x6c0 [ 95.712916][ T4726] netlink_sendmsg+0x6e1/0x7d0 [ 95.717750][ T4726] ? netlink_getsockopt+0x720/0x720 [ 95.723014][ T4726] ____sys_sendmsg+0x39a/0x510 [ 95.727832][ T4726] __sys_sendmsg+0x195/0x230 [ 95.732408][ T4726] __x64_sys_sendmsg+0x42/0x50 [ 95.737167][ T4726] do_syscall_64+0x44/0xd0 [ 95.741624][ T4726] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 95.747582][ T4726] RIP: 0033:0x7f63a3dfbae9 [ 95.752063][ T4726] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 95.771840][ T4726] RSP: 002b:00007f63a1b72188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 95.780406][ T4726] RAX: ffffffffffffffda RBX: 00007f63a3f0ef60 RCX: 00007f63a3dfbae9 [ 95.788367][ T4726] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 95.796318][ T4726] RBP: 00007f63a1b721d0 R08: 0000000000000000 R09: 0000000000000000 [ 95.804283][ T4726] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 95.812275][ T4726] R13: 00007ffcec81edaf R14: 00007f63a1b72300 R15: 0000000000022000 23:47:58 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r4 = dup(0xffffffffffffffff) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) [ 95.820241][ T4726] [ 95.834424][ T24] kauditd_printk_skb: 5 callbacks suppressed [ 95.834481][ T24] audit: type=1400 audit(1637711278.370:152): avc: denied { unlink } for pid=1422 comm="syslogd" name="messages.0" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 95.873429][ T4738] FAULT_INJECTION: forcing a failure. [ 95.873429][ T4738] name failslab, interval 1, probability 0, space 0, times 0 [ 95.886074][ T4738] CPU: 1 PID: 4738 Comm: syz-executor.3 Not tainted 5.16.0-rc2-syzkaller #0 [ 95.894742][ T4738] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 95.904795][ T4738] Call Trace: [ 95.908069][ T4738] [ 95.910998][ T4738] dump_stack_lvl+0xd6/0x122 [ 95.915590][ T4738] dump_stack+0x11/0x1b 23:47:58 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, 0x0, &(0x7f0000000180)) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8}]}}}]}, 0x40}}, 0x0) 23:47:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:47:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 13) [ 95.919746][ T4738] should_fail+0x23c/0x250 [ 95.924167][ T4738] __should_failslab+0x81/0x90 [ 95.929036][ T4738] should_failslab+0x5/0x20 [ 95.933613][ T4738] kmem_cache_alloc_node_trace+0x61/0x310 [ 95.939335][ T4738] ? __kmalloc_node+0x30/0x40 [ 95.944008][ T4738] __kmalloc_node+0x30/0x40 [ 95.948579][ T4738] kvmalloc_node+0x81/0x110 [ 95.953220][ T4738] alloc_netdev_mqs+0x59c/0x790 [ 95.958056][ T4738] rtnl_create_link+0x22b/0x560 [ 95.962885][ T4738] rtnl_newlink+0xd07/0x13b0 [ 95.967512][ T4738] ? rtnl_setlink+0x2a0/0x2a0 [ 95.972174][ T4738] rtnetlink_rcv_msg+0x745/0x7e0 [ 95.977182][ T4738] ? check_preempt_wakeup+0x1d6/0x3c0 [ 95.982541][ T4738] ? try_to_wake_up+0x3cd/0x540 [ 95.987482][ T4738] ? __list_del_entry_valid+0x54/0xc0 [ 95.992836][ T4738] ? _raw_spin_unlock_irqrestore+0x3d/0x60 [ 95.998824][ T4738] ? __rcu_report_exp_rnp+0x108/0x110 [ 96.004210][ T4738] ? rcu_report_exp_cpu_mult+0xd8/0x140 [ 96.009746][ T4738] ? rcu_preempt_deferred_qs_irqrestore+0x160/0x5e0 [ 96.016326][ T4738] ? __rcu_read_unlock+0xdc/0x290 [ 96.021333][ T4738] netlink_rcv_skb+0x14e/0x250 [ 96.026136][ T4738] ? rtnetlink_bind+0x60/0x60 [ 96.030852][ T4738] rtnetlink_rcv+0x18/0x20 [ 96.035255][ T4738] netlink_unicast+0x5fc/0x6c0 [ 96.040077][ T4738] netlink_sendmsg+0x6e1/0x7d0 [ 96.044893][ T4738] ? netlink_getsockopt+0x720/0x720 [ 96.050106][ T4738] ____sys_sendmsg+0x39a/0x510 [ 96.054926][ T4738] __sys_sendmsg+0x195/0x230 [ 96.059531][ T4738] __x64_sys_sendmsg+0x42/0x50 [ 96.064277][ T4738] do_syscall_64+0x44/0xd0 [ 96.068694][ T4738] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 96.074572][ T4738] RIP: 0033:0x7f229eaecae9 [ 96.078981][ T4738] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 96.098612][ T4738] RSP: 002b:00007f229c863188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 96.107005][ T4738] RAX: ffffffffffffffda RBX: 00007f229ebfff60 RCX: 00007f229eaecae9 [ 96.114969][ T4738] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000005 23:47:58 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r4 = dup(0xffffffffffffffff) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) [ 96.122964][ T4738] RBP: 00007f229c8631d0 R08: 0000000000000000 R09: 0000000000000000 [ 96.130912][ T4738] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 96.138889][ T4738] R13: 00007ffd9766560f R14: 00007f229c863300 R15: 0000000000022000 [ 96.146913][ T4738] [ 96.162842][ T4745] FAULT_INJECTION: forcing a failure. 23:47:58 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) (fail_nth: 12) [ 96.162842][ T4745] name failslab, interval 1, probability 0, space 0, times 0 [ 96.175479][ T4745] CPU: 1 PID: 4745 Comm: syz-executor.0 Not tainted 5.16.0-rc2-syzkaller #0 [ 96.184148][ T4745] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 96.194196][ T4745] Call Trace: [ 96.197472][ T4745] [ 96.200396][ T4745] dump_stack_lvl+0xd6/0x122 [ 96.205009][ T4745] dump_stack+0x11/0x1b [ 96.209272][ T4745] should_fail+0x23c/0x250 [ 96.213675][ T4745] ? hsr_add_port+0x13b/0x4a0 [ 96.218355][ T4745] __should_failslab+0x81/0x90 [ 96.223106][ T4745] should_failslab+0x5/0x20 [ 96.227634][ T4745] kmem_cache_alloc_trace+0x52/0x350 [ 96.232919][ T4745] ? __this_cpu_preempt_check+0x18/0x20 [ 96.238475][ T4745] hsr_add_port+0x13b/0x4a0 [ 96.243034][ T4745] hsr_dev_finalize+0x2a3/0x460 [ 96.247866][ T4745] hsr_newlink+0x40d/0x450 [ 96.252297][ T4745] ? hsr_get_node_list+0x450/0x450 [ 96.257486][ T4745] rtnl_newlink+0xdae/0x13b0 [ 96.262083][ T4745] ? rtnl_setlink+0x2a0/0x2a0 [ 96.266809][ T4745] rtnetlink_rcv_msg+0x745/0x7e0 [ 96.271785][ T4745] ? ___cache_free+0x46/0x300 [ 96.276523][ T4745] ? kmem_cache_free+0x65/0x110 [ 96.281358][ T4745] ? __kfree_skb+0xfe/0x150 [ 96.285963][ T4745] ? consume_skb+0x48/0x160 [ 96.290454][ T4745] ? nlmon_xmit+0x5f/0x70 [ 96.294783][ T4745] ? __this_cpu_preempt_check+0x18/0x20 [ 96.300314][ T4745] ? __local_bh_enable_ip+0x4d/0x70 [ 96.305502][ T4745] ? local_bh_enable+0x1b/0x20 [ 96.310261][ T4745] ? __dev_queue_xmit+0x597/0xf70 [ 96.315451][ T4745] ? __skb_clone+0x2db/0x300 [ 96.320033][ T4745] ? __rcu_read_unlock+0x5c/0x290 [ 96.325054][ T4745] netlink_rcv_skb+0x14e/0x250 [ 96.329809][ T4745] ? rtnetlink_bind+0x60/0x60 [ 96.334492][ T4745] rtnetlink_rcv+0x18/0x20 [ 96.339033][ T4745] netlink_unicast+0x5fc/0x6c0 [ 96.343785][ T4745] netlink_sendmsg+0x6e1/0x7d0 [ 96.348546][ T4745] ? netlink_getsockopt+0x720/0x720 [ 96.353848][ T4745] ____sys_sendmsg+0x39a/0x510 [ 96.358690][ T4745] __sys_sendmsg+0x195/0x230 [ 96.363313][ T4745] __x64_sys_sendmsg+0x42/0x50 [ 96.368152][ T4745] do_syscall_64+0x44/0xd0 [ 96.372639][ T4745] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 96.378630][ T4745] RIP: 0033:0x7f63a3dfbae9 [ 96.383026][ T4745] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 96.402678][ T4745] RSP: 002b:00007f63a1b72188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 96.411099][ T4745] RAX: ffffffffffffffda RBX: 00007f63a3f0ef60 RCX: 00007f63a3dfbae9 [ 96.419054][ T4745] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 96.427009][ T4745] RBP: 00007f63a1b721d0 R08: 0000000000000000 R09: 0000000000000000 [ 96.434961][ T4745] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 96.442915][ T4745] R13: 00007ffcec81edaf R14: 00007f63a1b72300 R15: 0000000000022000 [ 96.450885][ T4745] 23:47:59 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:47:59 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x4, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:47:59 executing program 1: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r2}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) [ 96.486650][ T4750] FAULT_INJECTION: forcing a failure. [ 96.486650][ T4750] name failslab, interval 1, probability 0, space 0, times 0 [ 96.499321][ T4750] CPU: 1 PID: 4750 Comm: syz-executor.3 Not tainted 5.16.0-rc2-syzkaller #0 [ 96.508184][ T4750] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 96.518336][ T4750] Call Trace: [ 96.521608][ T4750] [ 96.524706][ T4750] dump_stack_lvl+0xd6/0x122 [ 96.529366][ T4750] dump_stack+0x11/0x1b 23:47:59 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 14) 23:47:59 executing program 1: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r2}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) 23:47:59 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) [ 96.533558][ T4750] should_fail+0x23c/0x250 [ 96.537975][ T4750] ? hsr_create_self_node+0x4c/0x280 [ 96.543260][ T4750] __should_failslab+0x81/0x90 [ 96.548022][ T4750] should_failslab+0x5/0x20 [ 96.552547][ T4750] kmem_cache_alloc_trace+0x52/0x350 [ 96.557832][ T4750] ? kmem_cache_alloc_node_trace+0x20f/0x310 [ 96.563890][ T4750] hsr_create_self_node+0x4c/0x280 [ 96.569032][ T4750] hsr_dev_finalize+0x19e/0x460 [ 96.573970][ T4750] hsr_newlink+0x40d/0x450 [ 96.578393][ T4750] ? hsr_get_node_list+0x450/0x450 23:47:59 executing program 1: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r2}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) [ 96.583574][ T4750] rtnl_newlink+0xdae/0x13b0 [ 96.588233][ T4750] ? __rcu_read_unlock+0x5c/0x290 [ 96.593258][ T4750] ? rtnl_setlink+0x2a0/0x2a0 [ 96.597975][ T4750] rtnetlink_rcv_msg+0x745/0x7e0 [ 96.602992][ T4750] ? ___cache_free+0x46/0x300 [ 96.607669][ T4750] ? kmem_cache_free+0x65/0x110 [ 96.612534][ T4750] ? __kfree_skb+0xfe/0x150 [ 96.617035][ T4750] ? consume_skb+0x48/0x160 [ 96.621586][ T4750] ? nlmon_xmit+0x5f/0x70 [ 96.626013][ T4750] ? __this_cpu_preempt_check+0x18/0x20 [ 96.631613][ T4750] ? __local_bh_enable_ip+0x4d/0x70 23:47:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, 0x0, 0x0) 23:47:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, 0x0, 0x0) [ 96.636852][ T4750] ? local_bh_enable+0x1b/0x20 [ 96.641617][ T4750] ? __dev_queue_xmit+0x597/0xf70 [ 96.646795][ T4750] ? __skb_clone+0x2db/0x300 [ 96.651385][ T4750] ? __rcu_read_unlock+0x5c/0x290 [ 96.656470][ T4750] netlink_rcv_skb+0x14e/0x250 [ 96.661237][ T4750] ? rtnetlink_bind+0x60/0x60 [ 96.665916][ T4750] rtnetlink_rcv+0x18/0x20 [ 96.670411][ T4750] netlink_unicast+0x5fc/0x6c0 [ 96.675190][ T4750] netlink_sendmsg+0x6e1/0x7d0 [ 96.680064][ T4750] ? netlink_getsockopt+0x720/0x720 23:47:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, 0x0, 0x0) [ 96.685326][ T4750] ____sys_sendmsg+0x39a/0x510 [ 96.690094][ T4750] __sys_sendmsg+0x195/0x230 [ 96.694765][ T4750] __x64_sys_sendmsg+0x42/0x50 [ 96.699532][ T4750] do_syscall_64+0x44/0xd0 [ 96.703972][ T4750] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 96.709903][ T4750] RIP: 0033:0x7f229eaecae9 [ 96.714384][ T4750] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 23:47:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 23:47:59 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) (fail_nth: 13) [ 96.733987][ T4750] RSP: 002b:00007f229c863188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 96.742404][ T4750] RAX: ffffffffffffffda RBX: 00007f229ebfff60 RCX: 00007f229eaecae9 [ 96.750395][ T4750] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000005 [ 96.758380][ T4750] RBP: 00007f229c8631d0 R08: 0000000000000000 R09: 0000000000000000 [ 96.766348][ T4750] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 96.774379][ T4750] R13: 00007ffd9766560f R14: 00007f229c863300 R15: 0000000000022000 [ 96.782336][ T4750] 23:47:59 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 96.806075][ T4767] FAULT_INJECTION: forcing a failure. [ 96.806075][ T4767] name failslab, interval 1, probability 0, space 0, times 0 [ 96.818742][ T4767] CPU: 0 PID: 4767 Comm: syz-executor.0 Not tainted 5.16.0-rc2-syzkaller #0 [ 96.827415][ T4767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 96.837488][ T4767] Call Trace: [ 96.840763][ T4767] [ 96.843736][ T4767] dump_stack_lvl+0xd6/0x122 [ 96.848349][ T4767] dump_stack+0x11/0x1b [ 96.852508][ T4767] should_fail+0x23c/0x250 [ 96.856905][ T4767] ? kzalloc+0x16/0x20 [ 96.860981][ T4767] __should_failslab+0x81/0x90 [ 96.865795][ T4767] should_failslab+0x5/0x20 [ 96.870285][ T4767] __kmalloc+0x6f/0x370 [ 96.874439][ T4767] ? hsr_fix_features+0x8a/0xa0 [ 96.879272][ T4767] kzalloc+0x16/0x20 [ 96.883223][ T4767] ethnl_default_notify+0x72/0x490 [ 96.888457][ T4767] ? fib_rules_event+0x62b/0x6a0 [ 96.893372][ T4767] ethnl_netdev_event+0x8d/0xe0 [ 96.898202][ T4767] raw_notifier_call_chain+0x53/0xb0 [ 96.903516][ T4767] netdev_update_features+0xd3/0x130 [ 96.908867][ T4767] hsr_add_port+0x307/0x4a0 [ 96.913433][ T4767] hsr_dev_finalize+0x2a3/0x460 [ 96.918300][ T4767] hsr_newlink+0x40d/0x450 [ 96.922755][ T4767] ? hsr_get_node_list+0x450/0x450 [ 96.927882][ T4767] rtnl_newlink+0xdae/0x13b0 [ 96.932516][ T4767] ? rtnl_setlink+0x2a0/0x2a0 [ 96.937173][ T4767] rtnetlink_rcv_msg+0x745/0x7e0 [ 96.942094][ T4767] ? ___cache_free+0x46/0x300 [ 96.946795][ T4767] ? kmem_cache_free+0x65/0x110 [ 96.951704][ T4767] ? __kfree_skb+0xfe/0x150 [ 96.956224][ T4767] ? consume_skb+0x48/0x160 [ 96.960828][ T4767] ? nlmon_xmit+0x5f/0x70 [ 96.965178][ T4767] ? __this_cpu_preempt_check+0x18/0x20 [ 96.970749][ T4767] ? __local_bh_enable_ip+0x4d/0x70 [ 96.975945][ T4767] ? local_bh_enable+0x1b/0x20 [ 96.980686][ T4767] ? __dev_queue_xmit+0x597/0xf70 [ 96.985692][ T4767] ? __skb_clone+0x2db/0x300 [ 96.990263][ T4767] ? __rcu_read_unlock+0x5c/0x290 [ 96.995265][ T4767] netlink_rcv_skb+0x14e/0x250 [ 97.000077][ T4767] ? rtnetlink_bind+0x60/0x60 [ 97.004735][ T4767] rtnetlink_rcv+0x18/0x20 [ 97.009232][ T4767] netlink_unicast+0x5fc/0x6c0 [ 97.014096][ T4767] netlink_sendmsg+0x6e1/0x7d0 [ 97.018847][ T4767] ? netlink_getsockopt+0x720/0x720 [ 97.024045][ T4767] ____sys_sendmsg+0x39a/0x510 [ 97.028936][ T4767] __sys_sendmsg+0x195/0x230 [ 97.033522][ T4767] __x64_sys_sendmsg+0x42/0x50 [ 97.038269][ T4767] do_syscall_64+0x44/0xd0 [ 97.042773][ T4767] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 97.048684][ T4767] RIP: 0033:0x7f63a3dfbae9 [ 97.053093][ T4767] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 97.072715][ T4767] RSP: 002b:00007f63a1b72188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 97.081104][ T4767] RAX: ffffffffffffffda RBX: 00007f63a3f0ef60 RCX: 00007f63a3dfbae9 [ 97.089057][ T4767] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 97.097105][ T4767] RBP: 00007f63a1b721d0 R08: 0000000000000000 R09: 0000000000000000 [ 97.105109][ T4767] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 97.113083][ T4767] R13: 00007ffcec81edaf R14: 00007f63a1b72300 R15: 0000000000022000 [ 97.121032][ T4767] [ 97.141405][ T4777] FAULT_INJECTION: forcing a failure. [ 97.141405][ T4777] name failslab, interval 1, probability 0, space 0, times 0 [ 97.154119][ T4777] CPU: 0 PID: 4777 Comm: syz-executor.3 Not tainted 5.16.0-rc2-syzkaller #0 [ 97.162769][ T4777] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 97.172891][ T4777] Call Trace: [ 97.176163][ T4777] [ 97.179095][ T4777] dump_stack_lvl+0xd6/0x122 [ 97.183685][ T4777] dump_stack+0x11/0x1b [ 97.187888][ T4777] should_fail+0x23c/0x250 [ 97.192318][ T4777] ? hsr_add_port+0x13b/0x4a0 [ 97.196976][ T4777] __should_failslab+0x81/0x90 [ 97.201800][ T4777] should_failslab+0x5/0x20 [ 97.206288][ T4777] kmem_cache_alloc_trace+0x52/0x350 [ 97.211628][ T4777] ? __this_cpu_preempt_check+0x18/0x20 [ 97.217239][ T4777] hsr_add_port+0x13b/0x4a0 [ 97.221745][ T4777] hsr_dev_finalize+0x2a3/0x460 [ 97.226577][ T4777] hsr_newlink+0x40d/0x450 [ 97.231037][ T4777] ? hsr_get_node_list+0x450/0x450 [ 97.236204][ T4777] rtnl_newlink+0xdae/0x13b0 [ 97.240776][ T4777] ? rb_insert_color+0x2fa/0x310 [ 97.245770][ T4777] ? rtnl_setlink+0x2a0/0x2a0 [ 97.250465][ T4777] rtnetlink_rcv_msg+0x745/0x7e0 [ 97.255440][ T4777] ? ___cache_free+0x46/0x300 [ 97.260094][ T4777] ? kmem_cache_free+0x65/0x110 [ 97.264953][ T4777] ? __kfree_skb+0xfe/0x150 [ 97.269439][ T4777] ? consume_skb+0x48/0x160 [ 97.273961][ T4777] ? nlmon_xmit+0x5f/0x70 [ 97.278318][ T4777] ? __this_cpu_preempt_check+0x18/0x20 [ 97.283902][ T4777] ? __local_bh_enable_ip+0x4d/0x70 [ 97.289127][ T4777] ? local_bh_enable+0x1b/0x20 [ 97.293939][ T4777] ? __dev_queue_xmit+0x597/0xf70 [ 97.298946][ T4777] ? __skb_clone+0x2db/0x300 [ 97.303646][ T4777] ? __rcu_read_unlock+0x5c/0x290 [ 97.308686][ T4777] netlink_rcv_skb+0x14e/0x250 [ 97.313429][ T4777] ? rtnetlink_bind+0x60/0x60 [ 97.318083][ T4777] rtnetlink_rcv+0x18/0x20 [ 97.322493][ T4777] netlink_unicast+0x5fc/0x6c0 [ 97.327305][ T4777] netlink_sendmsg+0x6e1/0x7d0 [ 97.332135][ T4777] ? netlink_getsockopt+0x720/0x720 [ 97.337387][ T4777] ____sys_sendmsg+0x39a/0x510 [ 97.342285][ T4777] __sys_sendmsg+0x195/0x230 [ 97.346905][ T4777] __x64_sys_sendmsg+0x42/0x50 [ 97.351687][ T4777] do_syscall_64+0x44/0xd0 [ 97.356106][ T4777] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 97.361979][ T4777] RIP: 0033:0x7f229eaecae9 [ 97.366397][ T4777] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 97.385982][ T4777] RSP: 002b:00007f229c863188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 97.394435][ T4777] RAX: ffffffffffffffda RBX: 00007f229ebfff60 RCX: 00007f229eaecae9 [ 97.402385][ T4777] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000005 [ 97.410363][ T4777] RBP: 00007f229c8631d0 R08: 0000000000000000 R09: 0000000000000000 [ 97.418384][ T4777] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 97.426436][ T4777] R13: 00007ffd9766560f R14: 00007f229c863300 R15: 0000000000022000 [ 97.434473][ T4777] 23:48:00 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x5, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:00 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 23:48:00 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) 23:48:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:00 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) (fail_nth: 14) 23:48:00 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 15) 23:48:00 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) [ 97.561926][ T4786] FAULT_INJECTION: forcing a failure. [ 97.561926][ T4786] name failslab, interval 1, probability 0, space 0, times 0 [ 97.574654][ T4786] CPU: 0 PID: 4786 Comm: syz-executor.0 Not tainted 5.16.0-rc2-syzkaller #0 [ 97.583364][ T4786] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 97.593421][ T4786] Call Trace: [ 97.596694][ T4786] [ 97.599676][ T4786] dump_stack_lvl+0xd6/0x122 [ 97.604274][ T4786] dump_stack+0x11/0x1b [ 97.608407][ T4786] should_fail+0x23c/0x250 [ 97.612853][ T4786] ? ethnl_default_notify+0x97/0x490 [ 97.618122][ T4786] __should_failslab+0x81/0x90 [ 97.622942][ T4786] should_failslab+0x5/0x20 [ 97.627489][ T4786] __kmalloc+0x6f/0x370 [ 97.631700][ T4786] ? kzalloc+0x16/0x20 [ 97.635759][ T4786] ethnl_default_notify+0x97/0x490 [ 97.640848][ T4786] ? fib_rules_event+0x62b/0x6a0 [ 97.645826][ T4786] ethnl_netdev_event+0x8d/0xe0 [ 97.650674][ T4786] raw_notifier_call_chain+0x53/0xb0 [ 97.656019][ T4786] netdev_update_features+0xd3/0x130 [ 97.661353][ T4786] hsr_add_port+0x307/0x4a0 [ 97.665837][ T4786] hsr_dev_finalize+0x2a3/0x460 [ 97.670704][ T4786] hsr_newlink+0x40d/0x450 [ 97.675097][ T4786] ? hsr_get_node_list+0x450/0x450 [ 97.680188][ T4786] rtnl_newlink+0xdae/0x13b0 [ 97.684780][ T4786] ? __rcu_read_unlock+0x5c/0x290 [ 97.689836][ T4786] ? rtnl_setlink+0x2a0/0x2a0 [ 97.694586][ T4786] rtnetlink_rcv_msg+0x745/0x7e0 [ 97.699510][ T4786] ? ___cache_free+0x46/0x300 [ 97.704188][ T4786] ? kmem_cache_free+0x65/0x110 [ 97.709104][ T4786] ? __kfree_skb+0xfe/0x150 [ 97.713596][ T4786] ? consume_skb+0x48/0x160 [ 97.718090][ T4786] ? nlmon_xmit+0x5f/0x70 [ 97.722400][ T4786] ? __this_cpu_preempt_check+0x18/0x20 [ 97.728007][ T4786] ? __local_bh_enable_ip+0x4d/0x70 [ 97.733203][ T4786] ? local_bh_enable+0x1b/0x20 [ 97.737947][ T4786] ? __dev_queue_xmit+0x597/0xf70 [ 97.742957][ T4786] ? __skb_clone+0x2db/0x300 [ 97.747533][ T4786] ? __rcu_read_unlock+0x5c/0x290 [ 97.752562][ T4786] netlink_rcv_skb+0x14e/0x250 [ 97.757314][ T4786] ? rtnetlink_bind+0x60/0x60 [ 97.762012][ T4786] rtnetlink_rcv+0x18/0x20 [ 97.766424][ T4786] netlink_unicast+0x5fc/0x6c0 [ 97.771181][ T4786] netlink_sendmsg+0x6e1/0x7d0 [ 97.775979][ T4786] ? netlink_getsockopt+0x720/0x720 [ 97.781224][ T4786] ____sys_sendmsg+0x39a/0x510 [ 97.785993][ T4786] __sys_sendmsg+0x195/0x230 [ 97.790621][ T4786] __x64_sys_sendmsg+0x42/0x50 [ 97.795370][ T4786] do_syscall_64+0x44/0xd0 [ 97.799798][ T4786] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 97.805694][ T4786] RIP: 0033:0x7f63a3dfbae9 [ 97.810091][ T4786] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 97.829694][ T4786] RSP: 002b:00007f63a1b72188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 97.838144][ T4786] RAX: ffffffffffffffda RBX: 00007f63a3f0ef60 RCX: 00007f63a3dfbae9 [ 97.846099][ T4786] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 97.854046][ T4786] RBP: 00007f63a1b721d0 R08: 0000000000000000 R09: 0000000000000000 23:48:00 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) [ 97.861991][ T4786] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 97.869944][ T4786] R13: 00007ffcec81edaf R14: 00007f63a1b72300 R15: 0000000000022000 [ 97.877903][ T4786] 23:48:00 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) 23:48:00 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r2}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) [ 97.906992][ T4790] FAULT_INJECTION: forcing a failure. [ 97.906992][ T4790] name failslab, interval 1, probability 0, space 0, times 0 [ 97.919746][ T4790] CPU: 1 PID: 4790 Comm: syz-executor.3 Not tainted 5.16.0-rc2-syzkaller #0 [ 97.928511][ T4790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 97.938561][ T4790] Call Trace: [ 97.941831][ T4790] [ 97.944854][ T4790] dump_stack_lvl+0xd6/0x122 [ 97.949445][ T4790] dump_stack+0x11/0x1b 23:48:00 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r2}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) 23:48:00 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r2}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) [ 97.953664][ T4790] should_fail+0x23c/0x250 [ 97.958075][ T4790] ? kzalloc+0x16/0x20 [ 97.962146][ T4790] __should_failslab+0x81/0x90 [ 97.966911][ T4790] should_failslab+0x5/0x20 [ 97.971440][ T4790] __kmalloc+0x6f/0x370 [ 97.975634][ T4790] ? hsr_fix_features+0x8a/0xa0 [ 97.980521][ T4790] kzalloc+0x16/0x20 [ 97.984417][ T4790] ethnl_default_notify+0x72/0x490 [ 97.989544][ T4790] ? fib_rules_event+0x62b/0x6a0 [ 97.994488][ T4790] ethnl_netdev_event+0x8d/0xe0 [ 97.999386][ T4790] raw_notifier_call_chain+0x53/0xb0 [ 98.004774][ T4790] netdev_update_features+0xd3/0x130 [ 98.010077][ T4790] hsr_add_port+0x307/0x4a0 [ 98.014585][ T4790] hsr_dev_finalize+0x2a3/0x460 [ 98.019492][ T4790] hsr_newlink+0x40d/0x450 [ 98.023916][ T4790] ? hsr_get_node_list+0x450/0x450 [ 98.029031][ T4790] rtnl_newlink+0xdae/0x13b0 [ 98.033639][ T4790] ? rtnl_setlink+0x2a0/0x2a0 [ 98.038383][ T4790] rtnetlink_rcv_msg+0x745/0x7e0 [ 98.043323][ T4790] ? ___cache_free+0x46/0x300 [ 98.048057][ T4790] ? kmem_cache_free+0x65/0x110 [ 98.052906][ T4790] ? __kfree_skb+0xfe/0x150 [ 98.057428][ T4790] ? consume_skb+0x48/0x160 [ 98.061914][ T4790] ? nlmon_xmit+0x5f/0x70 [ 98.066223][ T4790] ? __this_cpu_preempt_check+0x18/0x20 [ 98.071781][ T4790] ? __local_bh_enable_ip+0x4d/0x70 [ 98.077015][ T4790] ? local_bh_enable+0x1b/0x20 [ 98.081756][ T4790] ? __dev_queue_xmit+0x597/0xf70 [ 98.086770][ T4790] ? __skb_clone+0x2db/0x300 [ 98.091381][ T4790] ? __rcu_read_unlock+0x5c/0x290 [ 98.096384][ T4790] netlink_rcv_skb+0x14e/0x250 [ 98.101133][ T4790] ? rtnetlink_bind+0x60/0x60 [ 98.105885][ T4790] rtnetlink_rcv+0x18/0x20 [ 98.110359][ T4790] netlink_unicast+0x5fc/0x6c0 [ 98.115225][ T4790] netlink_sendmsg+0x6e1/0x7d0 [ 98.120021][ T4790] ? netlink_getsockopt+0x720/0x720 [ 98.125344][ T4790] ____sys_sendmsg+0x39a/0x510 [ 98.130254][ T4790] __sys_sendmsg+0x195/0x230 [ 98.134859][ T4790] __x64_sys_sendmsg+0x42/0x50 [ 98.139683][ T4790] do_syscall_64+0x44/0xd0 [ 98.144137][ T4790] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 98.150025][ T4790] RIP: 0033:0x7f229eaecae9 [ 98.154416][ T4790] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 98.174047][ T4790] RSP: 002b:00007f229c863188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 98.182439][ T4790] RAX: ffffffffffffffda RBX: 00007f229ebfff60 RCX: 00007f229eaecae9 [ 98.190397][ T4790] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000005 [ 98.198436][ T4790] RBP: 00007f229c8631d0 R08: 0000000000000000 R09: 0000000000000000 [ 98.206392][ T4790] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 98.214393][ T4790] R13: 00007ffd9766560f R14: 00007f229c863300 R15: 0000000000022000 [ 98.222343][ T4790] 23:48:00 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x6, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, 0x0, 0x0) 23:48:00 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) 23:48:00 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, 0x0, &(0x7f0000000180)) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8}]}}}]}, 0x40}}, 0x0) 23:48:00 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) 23:48:00 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) (fail_nth: 15) 23:48:00 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 16) 23:48:00 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, 0x0, &(0x7f0000000180)) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8}]}}}]}, 0x40}}, 0x0) 23:48:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, 0x0, 0x0) [ 98.358829][ T4821] FAULT_INJECTION: forcing a failure. [ 98.358829][ T4821] name failslab, interval 1, probability 0, space 0, times 0 [ 98.371514][ T4821] CPU: 0 PID: 4821 Comm: syz-executor.0 Not tainted 5.16.0-rc2-syzkaller #0 [ 98.380187][ T4821] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 98.390299][ T4821] Call Trace: [ 98.393577][ T4821] [ 98.396496][ T4821] dump_stack_lvl+0xd6/0x122 [ 98.401140][ T4821] dump_stack+0x11/0x1b [ 98.405350][ T4821] should_fail+0x23c/0x250 [ 98.409745][ T4821] __should_failslab+0x81/0x90 [ 98.414585][ T4821] should_failslab+0x5/0x20 [ 98.419119][ T4821] kmem_cache_alloc_node+0x61/0x2d0 [ 98.424295][ T4821] ? ethnl_bitset32_size+0x2e/0x1d0 [ 98.429473][ T4821] ? __alloc_skb+0xf0/0x450 [ 98.434072][ T4821] __alloc_skb+0xf0/0x450 [ 98.438425][ T4821] ethnl_default_notify+0x17e/0x490 [ 98.443608][ T4821] ethnl_netdev_event+0x8d/0xe0 [ 98.448472][ T4821] raw_notifier_call_chain+0x53/0xb0 [ 98.453736][ T4821] netdev_update_features+0xd3/0x130 [ 98.459004][ T4821] hsr_add_port+0x307/0x4a0 [ 98.463563][ T4821] hsr_dev_finalize+0x2a3/0x460 [ 98.468394][ T4821] hsr_newlink+0x40d/0x450 [ 98.472801][ T4821] ? hsr_get_node_list+0x450/0x450 [ 98.477893][ T4821] rtnl_newlink+0xdae/0x13b0 [ 98.482472][ T4821] ? __rcu_read_unlock+0x5c/0x290 [ 98.487490][ T4821] ? rtnl_setlink+0x2a0/0x2a0 [ 98.492145][ T4821] rtnetlink_rcv_msg+0x745/0x7e0 [ 98.497136][ T4821] ? ___cache_free+0x46/0x300 [ 98.501794][ T4821] ? kmem_cache_free+0x65/0x110 [ 98.506692][ T4821] ? __kfree_skb+0xfe/0x150 [ 98.511184][ T4821] ? consume_skb+0x48/0x160 [ 98.515668][ T4821] ? nlmon_xmit+0x5f/0x70 [ 98.520013][ T4821] ? __this_cpu_preempt_check+0x18/0x20 [ 98.525549][ T4821] ? __local_bh_enable_ip+0x4d/0x70 [ 98.530772][ T4821] ? local_bh_enable+0x1b/0x20 [ 98.535533][ T4821] ? __dev_queue_xmit+0x597/0xf70 [ 98.540540][ T4821] ? __skb_clone+0x2db/0x300 [ 98.545110][ T4821] ? __rcu_read_unlock+0x5c/0x290 [ 98.550135][ T4821] netlink_rcv_skb+0x14e/0x250 [ 98.554903][ T4821] ? rtnetlink_bind+0x60/0x60 [ 98.559586][ T4821] rtnetlink_rcv+0x18/0x20 [ 98.564110][ T4821] netlink_unicast+0x5fc/0x6c0 [ 98.568966][ T4821] netlink_sendmsg+0x6e1/0x7d0 [ 98.573729][ T4821] ? netlink_getsockopt+0x720/0x720 [ 98.578967][ T4821] ____sys_sendmsg+0x39a/0x510 [ 98.583765][ T4821] __sys_sendmsg+0x195/0x230 [ 98.588517][ T4821] __x64_sys_sendmsg+0x42/0x50 [ 98.593269][ T4821] do_syscall_64+0x44/0xd0 [ 98.597705][ T4821] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 98.603580][ T4821] RIP: 0033:0x7f63a3dfbae9 [ 98.607970][ T4821] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 98.627570][ T4821] RSP: 002b:00007f63a1b72188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 98.635957][ T4821] RAX: ffffffffffffffda RBX: 00007f63a3f0ef60 RCX: 00007f63a3dfbae9 [ 98.643948][ T4821] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 98.651894][ T4821] RBP: 00007f63a1b721d0 R08: 0000000000000000 R09: 0000000000000000 23:48:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, 0x0, 0x0) [ 98.659909][ T4821] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 98.667874][ T4821] R13: 00007ffcec81edaf R14: 00007f63a1b72300 R15: 0000000000022000 [ 98.675918][ T4821] 23:48:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) [ 98.702887][ T4824] FAULT_INJECTION: forcing a failure. [ 98.702887][ T4824] name failslab, interval 1, probability 0, space 0, times 0 [ 98.715556][ T4824] CPU: 1 PID: 4824 Comm: syz-executor.3 Not tainted 5.16.0-rc2-syzkaller #0 [ 98.724291][ T4824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 98.734431][ T4824] Call Trace: [ 98.737710][ T4824] [ 98.740701][ T4824] dump_stack_lvl+0xd6/0x122 [ 98.745367][ T4824] dump_stack+0x11/0x1b [ 98.749529][ T4824] should_fail+0x23c/0x250 [ 98.753993][ T4824] ? ethnl_default_notify+0x97/0x490 [ 98.759740][ T4824] __should_failslab+0x81/0x90 [ 98.764518][ T4824] should_failslab+0x5/0x20 [ 98.769020][ T4824] __kmalloc+0x6f/0x370 [ 98.773357][ T4824] ? kzalloc+0x16/0x20 [ 98.777403][ T4824] ethnl_default_notify+0x97/0x490 [ 98.782610][ T4824] ? fib_rules_event+0x62b/0x6a0 [ 98.787600][ T4824] ethnl_netdev_event+0x8d/0xe0 [ 98.792431][ T4824] raw_notifier_call_chain+0x53/0xb0 [ 98.797784][ T4824] netdev_update_features+0xd3/0x130 [ 98.803066][ T4824] hsr_add_port+0x307/0x4a0 [ 98.807555][ T4824] hsr_dev_finalize+0x2a3/0x460 [ 98.812397][ T4824] hsr_newlink+0x40d/0x450 [ 98.816793][ T4824] ? hsr_get_node_list+0x450/0x450 [ 98.821948][ T4824] rtnl_newlink+0xdae/0x13b0 [ 98.826569][ T4824] ? rtnl_setlink+0x2a0/0x2a0 [ 98.831285][ T4824] rtnetlink_rcv_msg+0x745/0x7e0 [ 98.836287][ T4824] ? ___cache_free+0x46/0x300 [ 98.840966][ T4824] ? kmem_cache_free+0x65/0x110 [ 98.845890][ T4824] ? __kfree_skb+0xfe/0x150 [ 98.850372][ T4824] ? consume_skb+0x48/0x160 [ 98.854861][ T4824] ? nlmon_xmit+0x5f/0x70 [ 98.859180][ T4824] ? __this_cpu_preempt_check+0x18/0x20 [ 98.864723][ T4824] ? __local_bh_enable_ip+0x4d/0x70 [ 98.869918][ T4824] ? local_bh_enable+0x1b/0x20 [ 98.874793][ T4824] ? __dev_queue_xmit+0x597/0xf70 [ 98.879792][ T4824] ? __skb_clone+0x2db/0x300 [ 98.884528][ T4824] ? __rcu_read_unlock+0x5c/0x290 [ 98.889539][ T4824] netlink_rcv_skb+0x14e/0x250 [ 98.894331][ T4824] ? rtnetlink_bind+0x60/0x60 [ 98.899025][ T4824] rtnetlink_rcv+0x18/0x20 [ 98.903433][ T4824] netlink_unicast+0x5fc/0x6c0 [ 98.908202][ T4824] netlink_sendmsg+0x6e1/0x7d0 [ 98.912950][ T4824] ? netlink_getsockopt+0x720/0x720 [ 98.918125][ T4824] ____sys_sendmsg+0x39a/0x510 [ 98.922962][ T4824] __sys_sendmsg+0x195/0x230 [ 98.927611][ T4824] __x64_sys_sendmsg+0x42/0x50 [ 98.932411][ T4824] do_syscall_64+0x44/0xd0 [ 98.936829][ T4824] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 98.942710][ T4824] RIP: 0033:0x7f229eaecae9 [ 98.947200][ T4824] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 98.966810][ T4824] RSP: 002b:00007f229c863188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 98.975198][ T4824] RAX: ffffffffffffffda RBX: 00007f229ebfff60 RCX: 00007f229eaecae9 [ 98.983146][ T4824] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000005 [ 98.991101][ T4824] RBP: 00007f229c8631d0 R08: 0000000000000000 R09: 0000000000000000 23:48:01 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x7, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 23:48:01 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, 0x0, &(0x7f0000000180)) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8}]}}}]}, 0x40}}, 0x0) [ 98.999060][ T4824] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 99.007021][ T4824] R13: 00007ffd9766560f R14: 00007f229c863300 R15: 0000000000022000 [ 99.014972][ T4824] 23:48:01 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) (fail_nth: 16) 23:48:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 17) 23:48:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 23:48:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x20, 0x10, 0x705}, 0x20}}, 0x0) [ 99.104610][ T4841] FAULT_INJECTION: forcing a failure. [ 99.104610][ T4841] name failslab, interval 1, probability 0, space 0, times 0 [ 99.117253][ T4841] CPU: 1 PID: 4841 Comm: syz-executor.0 Not tainted 5.16.0-rc2-syzkaller #0 [ 99.126018][ T4841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 99.136069][ T4841] Call Trace: [ 99.139341][ T4841] [ 99.142264][ T4841] dump_stack_lvl+0xd6/0x122 [ 99.146861][ T4841] dump_stack+0x11/0x1b 23:48:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) [ 99.151215][ T4841] should_fail+0x23c/0x250 [ 99.155628][ T4841] __should_failslab+0x81/0x90 [ 99.160426][ T4841] should_failslab+0x5/0x20 [ 99.164940][ T4841] kmem_cache_alloc_node_trace+0x61/0x310 [ 99.170687][ T4841] ? __kmalloc_node_track_caller+0x30/0x40 [ 99.176586][ T4841] __kmalloc_node_track_caller+0x30/0x40 [ 99.182229][ T4841] ? ethnl_default_notify+0x17e/0x490 [ 99.187601][ T4841] __alloc_skb+0x19d/0x450 [ 99.192130][ T4841] ethnl_default_notify+0x17e/0x490 [ 99.197331][ T4841] ethnl_netdev_event+0x8d/0xe0 23:48:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) 23:48:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) [ 99.202185][ T4841] raw_notifier_call_chain+0x53/0xb0 [ 99.207672][ T4841] netdev_update_features+0xd3/0x130 [ 99.213223][ T4841] hsr_add_port+0x307/0x4a0 [ 99.217739][ T4841] hsr_dev_finalize+0x2a3/0x460 [ 99.222662][ T4841] hsr_newlink+0x40d/0x450 [ 99.227083][ T4841] ? hsr_get_node_list+0x450/0x450 [ 99.232329][ T4841] rtnl_newlink+0xdae/0x13b0 [ 99.237014][ T4841] ? __rcu_read_unlock+0x5c/0x290 [ 99.242040][ T4841] ? rtnl_setlink+0x2a0/0x2a0 [ 99.246720][ T4841] rtnetlink_rcv_msg+0x745/0x7e0 [ 99.251786][ T4841] ? ___cache_free+0x46/0x300 [ 99.256469][ T4841] ? kmem_cache_free+0x65/0x110 [ 99.261313][ T4841] ? __kfree_skb+0xfe/0x150 [ 99.265908][ T4841] ? consume_skb+0x48/0x160 [ 99.270463][ T4841] ? nlmon_xmit+0x5f/0x70 [ 99.274791][ T4841] ? __this_cpu_preempt_check+0x18/0x20 [ 99.280337][ T4841] ? __local_bh_enable_ip+0x4d/0x70 [ 99.285531][ T4841] ? local_bh_enable+0x1b/0x20 [ 99.290277][ T4841] ? __dev_queue_xmit+0x597/0xf70 [ 99.295290][ T4841] ? __skb_clone+0x2db/0x300 [ 99.299880][ T4841] ? __rcu_read_unlock+0x5c/0x290 [ 99.304892][ T4841] netlink_rcv_skb+0x14e/0x250 [ 99.309666][ T4841] ? rtnetlink_bind+0x60/0x60 [ 99.314364][ T4841] rtnetlink_rcv+0x18/0x20 [ 99.318846][ T4841] netlink_unicast+0x5fc/0x6c0 [ 99.323699][ T4841] netlink_sendmsg+0x6e1/0x7d0 [ 99.328556][ T4841] ? netlink_getsockopt+0x720/0x720 [ 99.333751][ T4841] ____sys_sendmsg+0x39a/0x510 [ 99.338532][ T4841] __sys_sendmsg+0x195/0x230 [ 99.343155][ T4841] __x64_sys_sendmsg+0x42/0x50 [ 99.347942][ T4841] do_syscall_64+0x44/0xd0 [ 99.352378][ T4841] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 99.358320][ T4841] RIP: 0033:0x7f63a3dfbae9 [ 99.362712][ T4841] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 99.382347][ T4841] RSP: 002b:00007f63a1b72188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 99.390785][ T4841] RAX: ffffffffffffffda RBX: 00007f63a3f0ef60 RCX: 00007f63a3dfbae9 [ 99.398751][ T4841] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 99.406705][ T4841] RBP: 00007f63a1b721d0 R08: 0000000000000000 R09: 0000000000000000 [ 99.414697][ T4841] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 99.422650][ T4841] R13: 00007ffcec81edaf R14: 00007f63a1b72300 R15: 0000000000022000 [ 99.430617][ T4841] [ 99.438915][ T4847] FAULT_INJECTION: forcing a failure. [ 99.438915][ T4847] name failslab, interval 1, probability 0, space 0, times 0 [ 99.451606][ T4847] CPU: 0 PID: 4847 Comm: syz-executor.3 Not tainted 5.16.0-rc2-syzkaller #0 [ 99.460299][ T4847] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 99.470378][ T4847] Call Trace: [ 99.473640][ T4847] [ 99.476557][ T4847] dump_stack_lvl+0xd6/0x122 [ 99.481135][ T4847] dump_stack+0x11/0x1b [ 99.485352][ T4847] should_fail+0x23c/0x250 [ 99.489826][ T4847] __should_failslab+0x81/0x90 [ 99.494613][ T4847] should_failslab+0x5/0x20 [ 99.499141][ T4847] kmem_cache_alloc_node+0x61/0x2d0 [ 99.504347][ T4847] ? ethnl_bitset32_size+0x2e/0x1d0 [ 99.509612][ T4847] ? __alloc_skb+0xf0/0x450 [ 99.514259][ T4847] __alloc_skb+0xf0/0x450 [ 99.518576][ T4847] ethnl_default_notify+0x17e/0x490 [ 99.523762][ T4847] ethnl_netdev_event+0x8d/0xe0 [ 99.528599][ T4847] raw_notifier_call_chain+0x53/0xb0 [ 99.533887][ T4847] netdev_update_features+0xd3/0x130 [ 99.539172][ T4847] hsr_add_port+0x307/0x4a0 [ 99.543734][ T4847] hsr_dev_finalize+0x2a3/0x460 [ 99.548569][ T4847] hsr_newlink+0x40d/0x450 [ 99.553054][ T4847] ? hsr_get_node_list+0x450/0x450 [ 99.558201][ T4847] rtnl_newlink+0xdae/0x13b0 [ 99.562880][ T4847] ? rtnl_setlink+0x2a0/0x2a0 [ 99.567538][ T4847] rtnetlink_rcv_msg+0x745/0x7e0 [ 99.572563][ T4847] ? ___cache_free+0x46/0x300 [ 99.577229][ T4847] ? kmem_cache_free+0x65/0x110 [ 99.582068][ T4847] ? __kfree_skb+0xfe/0x150 [ 99.586637][ T4847] ? consume_skb+0x48/0x160 [ 99.591124][ T4847] ? nlmon_xmit+0x5f/0x70 [ 99.595444][ T4847] ? __this_cpu_preempt_check+0x18/0x20 [ 99.600974][ T4847] ? __local_bh_enable_ip+0x4d/0x70 [ 99.606159][ T4847] ? local_bh_enable+0x1b/0x20 [ 99.610944][ T4847] ? __dev_queue_xmit+0x597/0xf70 [ 99.615959][ T4847] ? __skb_clone+0x2db/0x300 [ 99.620670][ T4847] ? __rcu_read_unlock+0x5c/0x290 [ 99.625762][ T4847] netlink_rcv_skb+0x14e/0x250 [ 99.630509][ T4847] ? rtnetlink_bind+0x60/0x60 [ 99.635173][ T4847] rtnetlink_rcv+0x18/0x20 [ 99.639643][ T4847] netlink_unicast+0x5fc/0x6c0 [ 99.644466][ T4847] netlink_sendmsg+0x6e1/0x7d0 [ 99.649215][ T4847] ? netlink_getsockopt+0x720/0x720 [ 99.654407][ T4847] ____sys_sendmsg+0x39a/0x510 [ 99.659158][ T4847] __sys_sendmsg+0x195/0x230 [ 99.663748][ T4847] __x64_sys_sendmsg+0x42/0x50 [ 99.668528][ T4847] do_syscall_64+0x44/0xd0 [ 99.673036][ T4847] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 99.678973][ T4847] RIP: 0033:0x7f229eaecae9 [ 99.683404][ T4847] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 99.703044][ T4847] RSP: 002b:00007f229c863188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 99.711458][ T4847] RAX: ffffffffffffffda RBX: 00007f229ebfff60 RCX: 00007f229eaecae9 [ 99.719418][ T4847] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000005 [ 99.727426][ T4847] RBP: 00007f229c8631d0 R08: 0000000000000000 R09: 0000000000000000 [ 99.735379][ T4847] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 99.743329][ T4847] R13: 00007ffd9766560f R14: 00007f229c863300 R15: 0000000000022000 [ 99.751356][ T4847] 23:48:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x20, 0x10, 0x705}, 0x20}}, 0x0) 23:48:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:02 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:02 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x8, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:02 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 18) 23:48:02 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) (fail_nth: 17) 23:48:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x20, 0x10, 0x705}, 0x20}}, 0x0) [ 99.870013][ T4866] FAULT_INJECTION: forcing a failure. [ 99.870013][ T4866] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 99.883291][ T4866] CPU: 0 PID: 4866 Comm: syz-executor.0 Not tainted 5.16.0-rc2-syzkaller #0 [ 99.892026][ T4866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 99.902160][ T4866] Call Trace: [ 99.905432][ T4866] [ 99.908367][ T4866] dump_stack_lvl+0xd6/0x122 [ 99.912955][ T4866] dump_stack+0x11/0x1b [ 99.917221][ T4866] should_fail+0x23c/0x250 [ 99.921644][ T4866] __alloc_pages+0x102/0x330 [ 99.926484][ T4866] alloc_pages+0x382/0x3d0 [ 99.930930][ T4866] get_zeroed_page+0x13/0x40 [ 99.935558][ T4866] dev_alloc_name_ns+0x30d/0x630 [ 99.940526][ T4866] ? dev_set_mtu_ext+0x16a/0x5f0 [ 99.945514][ T4866] register_netdevice+0x26e/0x10b0 [ 99.950730][ T4866] hsr_dev_finalize+0x2da/0x460 [ 99.955621][ T4866] hsr_newlink+0x40d/0x450 [ 99.960087][ T4866] ? hsr_get_node_list+0x450/0x450 [ 99.965289][ T4866] rtnl_newlink+0xdae/0x13b0 [ 99.969917][ T4866] ? __rcu_read_unlock+0x5c/0x290 [ 99.975016][ T4866] ? rtnl_setlink+0x2a0/0x2a0 [ 99.979677][ T4866] rtnetlink_rcv_msg+0x745/0x7e0 [ 99.984608][ T4866] ? ___cache_free+0x46/0x300 [ 99.989353][ T4866] ? kmem_cache_free+0x65/0x110 [ 99.994348][ T4866] ? __kfree_skb+0xfe/0x150 [ 99.998918][ T4866] ? consume_skb+0x48/0x160 [ 100.003475][ T4866] ? nlmon_xmit+0x5f/0x70 [ 100.007836][ T4866] ? __this_cpu_preempt_check+0x18/0x20 [ 100.013383][ T4866] ? __local_bh_enable_ip+0x4d/0x70 [ 100.018578][ T4866] ? local_bh_enable+0x1b/0x20 [ 100.023321][ T4866] ? __dev_queue_xmit+0x597/0xf70 [ 100.028339][ T4866] ? __skb_clone+0x2db/0x300 [ 100.032916][ T4866] ? __rcu_read_unlock+0x5c/0x290 [ 100.037918][ T4866] netlink_rcv_skb+0x14e/0x250 [ 100.042763][ T4866] ? rtnetlink_bind+0x60/0x60 [ 100.047481][ T4866] rtnetlink_rcv+0x18/0x20 [ 100.051888][ T4866] netlink_unicast+0x5fc/0x6c0 [ 100.056637][ T4866] netlink_sendmsg+0x6e1/0x7d0 [ 100.061519][ T4866] ? netlink_getsockopt+0x720/0x720 [ 100.066711][ T4866] ____sys_sendmsg+0x39a/0x510 [ 100.071470][ T4866] __sys_sendmsg+0x195/0x230 [ 100.076047][ T4866] __x64_sys_sendmsg+0x42/0x50 [ 100.080808][ T4866] do_syscall_64+0x44/0xd0 [ 100.085273][ T4866] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 100.091153][ T4866] RIP: 0033:0x7f63a3dfbae9 [ 100.095543][ T4866] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 100.115177][ T4866] RSP: 002b:00007f63a1b72188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 100.123564][ T4866] RAX: ffffffffffffffda RBX: 00007f63a3f0ef60 RCX: 00007f63a3dfbae9 [ 100.131564][ T4866] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 100.139515][ T4866] RBP: 00007f63a1b721d0 R08: 0000000000000000 R09: 0000000000000000 [ 100.147468][ T4866] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 100.155503][ T4866] R13: 00007ffcec81edaf R14: 00007f63a1b72300 R15: 0000000000022000 [ 100.163456][ T4866] 23:48:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x20, 0x10, 0x705}, 0x20}}, 0x0) 23:48:02 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:02 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 19) [ 100.183208][ T4874] FAULT_INJECTION: forcing a failure. [ 100.183208][ T4874] name failslab, interval 1, probability 0, space 0, times 0 [ 100.195895][ T4874] CPU: 1 PID: 4874 Comm: syz-executor.3 Not tainted 5.16.0-rc2-syzkaller #0 [ 100.204591][ T4874] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 100.214729][ T4874] Call Trace: [ 100.218003][ T4874] [ 100.220932][ T4874] dump_stack_lvl+0xd6/0x122 [ 100.225523][ T4874] dump_stack+0x11/0x1b [ 100.229707][ T4874] should_fail+0x23c/0x250 [ 100.234148][ T4874] __should_failslab+0x81/0x90 [ 100.238914][ T4874] should_failslab+0x5/0x20 [ 100.243457][ T4874] kmem_cache_alloc_node_trace+0x61/0x310 [ 100.249177][ T4874] ? __kmalloc_node_track_caller+0x30/0x40 [ 100.254982][ T4874] __kmalloc_node_track_caller+0x30/0x40 [ 100.260602][ T4874] ? ethnl_default_notify+0x17e/0x490 [ 100.266111][ T4874] __alloc_skb+0x19d/0x450 [ 100.270676][ T4874] ethnl_default_notify+0x17e/0x490 [ 100.275955][ T4874] ethnl_netdev_event+0x8d/0xe0 [ 100.280813][ T4874] raw_notifier_call_chain+0x53/0xb0 [ 100.286090][ T4874] netdev_update_features+0xd3/0x130 [ 100.291431][ T4874] hsr_add_port+0x307/0x4a0 [ 100.296065][ T4874] hsr_dev_finalize+0x2a3/0x460 [ 100.300902][ T4874] hsr_newlink+0x40d/0x450 [ 100.305344][ T4874] ? hsr_get_node_list+0x450/0x450 [ 100.310493][ T4874] rtnl_newlink+0xdae/0x13b0 [ 100.315080][ T4874] ? rtnl_setlink+0x2a0/0x2a0 [ 100.319784][ T4874] rtnetlink_rcv_msg+0x745/0x7e0 [ 100.324821][ T4874] ? ___cache_free+0x46/0x300 [ 100.329501][ T4874] ? kmem_cache_free+0x65/0x110 [ 100.334334][ T4874] ? __kfree_skb+0xfe/0x150 [ 100.338822][ T4874] ? consume_skb+0x48/0x160 [ 100.343347][ T4874] ? nlmon_xmit+0x5f/0x70 [ 100.348614][ T4874] ? __this_cpu_preempt_check+0x18/0x20 [ 100.354143][ T4874] ? __local_bh_enable_ip+0x4d/0x70 [ 100.359335][ T4874] ? local_bh_enable+0x1b/0x20 [ 100.364081][ T4874] ? __dev_queue_xmit+0x597/0xf70 [ 100.369138][ T4874] ? __skb_clone+0x2db/0x300 [ 100.373807][ T4874] ? __rcu_read_unlock+0x5c/0x290 [ 100.378823][ T4874] netlink_rcv_skb+0x14e/0x250 [ 100.383754][ T4874] ? rtnetlink_bind+0x60/0x60 [ 100.388420][ T4874] rtnetlink_rcv+0x18/0x20 [ 100.392823][ T4874] netlink_unicast+0x5fc/0x6c0 [ 100.397643][ T4874] netlink_sendmsg+0x6e1/0x7d0 [ 100.402500][ T4874] ? netlink_getsockopt+0x720/0x720 [ 100.407708][ T4874] ____sys_sendmsg+0x39a/0x510 [ 100.412484][ T4874] __sys_sendmsg+0x195/0x230 [ 100.417143][ T4874] __x64_sys_sendmsg+0x42/0x50 [ 100.421900][ T4874] do_syscall_64+0x44/0xd0 [ 100.426356][ T4874] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 100.432260][ T4874] RIP: 0033:0x7f229eaecae9 [ 100.436660][ T4874] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 100.456255][ T4874] RSP: 002b:00007f229c863188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 100.464688][ T4874] RAX: ffffffffffffffda RBX: 00007f229ebfff60 RCX: 00007f229eaecae9 [ 100.472822][ T4874] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000005 23:48:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x20, 0x10, 0x705}, 0x20}}, 0x0) [ 100.480874][ T4874] RBP: 00007f229c8631d0 R08: 0000000000000000 R09: 0000000000000000 [ 100.488831][ T4874] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 100.496793][ T4874] R13: 00007ffd9766560f R14: 00007f229c863300 R15: 0000000000022000 [ 100.504751][ T4874] [ 100.529087][ T4880] FAULT_INJECTION: forcing a failure. [ 100.529087][ T4880] name failslab, interval 1, probability 0, space 0, times 0 [ 100.541951][ T4880] CPU: 0 PID: 4880 Comm: syz-executor.0 Not tainted 5.16.0-rc2-syzkaller #0 [ 100.550653][ T4880] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 100.560764][ T4880] Call Trace: [ 100.564020][ T4880] [ 100.566939][ T4880] dump_stack_lvl+0xd6/0x122 [ 100.571513][ T4880] dump_stack+0x11/0x1b [ 100.575646][ T4880] should_fail+0x23c/0x250 [ 100.580047][ T4880] ? register_netdevice+0x369/0x10b0 [ 100.585317][ T4880] __should_failslab+0x81/0x90 [ 100.590063][ T4880] should_failslab+0x5/0x20 [ 100.594582][ T4880] kmem_cache_alloc_trace+0x52/0x350 [ 100.599856][ T4880] register_netdevice+0x369/0x10b0 [ 100.604946][ T4880] hsr_dev_finalize+0x2da/0x460 [ 100.609792][ T4880] hsr_newlink+0x40d/0x450 [ 100.614185][ T4880] ? hsr_get_node_list+0x450/0x450 [ 100.619338][ T4880] rtnl_newlink+0xdae/0x13b0 [ 100.623906][ T4880] ? rb_insert_color+0x2fa/0x310 [ 100.628847][ T4880] ? rtnl_setlink+0x2a0/0x2a0 [ 100.633508][ T4880] rtnetlink_rcv_msg+0x745/0x7e0 [ 100.638477][ T4880] ? ___cache_free+0x46/0x300 [ 100.643309][ T4880] ? kmem_cache_free+0x65/0x110 [ 100.648148][ T4880] ? __kfree_skb+0xfe/0x150 [ 100.652673][ T4880] ? consume_skb+0x48/0x160 [ 100.657222][ T4880] ? nlmon_xmit+0x5f/0x70 [ 100.661615][ T4880] ? __this_cpu_preempt_check+0x18/0x20 [ 100.667141][ T4880] ? __local_bh_enable_ip+0x4d/0x70 [ 100.672319][ T4880] ? local_bh_enable+0x1b/0x20 [ 100.677134][ T4880] ? __dev_queue_xmit+0x597/0xf70 [ 100.682141][ T4880] ? __skb_clone+0x2db/0x300 [ 100.686721][ T4880] ? __rcu_read_unlock+0x5c/0x290 [ 100.691769][ T4880] netlink_rcv_skb+0x14e/0x250 [ 100.696592][ T4880] ? rtnetlink_bind+0x60/0x60 [ 100.701395][ T4880] rtnetlink_rcv+0x18/0x20 [ 100.705803][ T4880] netlink_unicast+0x5fc/0x6c0 [ 100.710623][ T4880] netlink_sendmsg+0x6e1/0x7d0 [ 100.715432][ T4880] ? netlink_getsockopt+0x720/0x720 [ 100.720614][ T4880] ____sys_sendmsg+0x39a/0x510 [ 100.725360][ T4880] __sys_sendmsg+0x195/0x230 [ 100.729941][ T4880] __x64_sys_sendmsg+0x42/0x50 [ 100.734925][ T4880] do_syscall_64+0x44/0xd0 [ 100.739339][ T4880] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 100.745240][ T4880] RIP: 0033:0x7f63a3dfbae9 [ 100.749665][ T4880] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 100.769248][ T4880] RSP: 002b:00007f63a1b72188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 23:48:03 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x9, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) [ 100.777641][ T4880] RAX: ffffffffffffffda RBX: 00007f63a3f0ef60 RCX: 00007f63a3dfbae9 [ 100.785592][ T4880] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 100.793572][ T4880] RBP: 00007f63a1b721d0 R08: 0000000000000000 R09: 0000000000000000 [ 100.801547][ T4880] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 100.809560][ T4880] R13: 00007ffcec81edaf R14: 00007f63a1b72300 R15: 0000000000022000 [ 100.817519][ T4880] 23:48:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @hsr={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}]}}}]}, 0x38}}, 0x0) 23:48:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x20, 0x10, 0x705}, 0x20}}, 0x0) 23:48:03 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) (fail_nth: 18) 23:48:03 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 20) [ 100.847217][ T4874] syz-executor.3 (4874) used greatest stack depth: 10264 bytes left 23:48:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @hsr={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}]}}}]}, 0x38}}, 0x0) 23:48:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @hsr={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}]}}}]}, 0x38}}, 0x0) 23:48:03 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0xa, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) [ 100.917078][ T4894] FAULT_INJECTION: forcing a failure. [ 100.917078][ T4894] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 100.930352][ T4894] CPU: 0 PID: 4894 Comm: syz-executor.3 Not tainted 5.16.0-rc2-syzkaller #0 [ 100.939109][ T4894] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 100.949162][ T4894] Call Trace: [ 100.952430][ T4894] [ 100.955353][ T4894] dump_stack_lvl+0xd6/0x122 [ 100.959945][ T4894] dump_stack+0x11/0x1b [ 100.964094][ T4894] should_fail+0x23c/0x250 [ 100.968520][ T4894] __alloc_pages+0x102/0x330 [ 100.973091][ T4894] alloc_pages+0x382/0x3d0 [ 100.977482][ T4894] get_zeroed_page+0x13/0x40 [ 100.982080][ T4894] dev_alloc_name_ns+0x30d/0x630 [ 100.987144][ T4894] ? dev_set_mtu_ext+0x16a/0x5f0 [ 100.992083][ T4894] register_netdevice+0x26e/0x10b0 [ 100.997267][ T4894] hsr_dev_finalize+0x2da/0x460 [ 101.002097][ T4894] hsr_newlink+0x40d/0x450 [ 101.006512][ T4894] ? hsr_get_node_list+0x450/0x450 [ 101.011611][ T4894] rtnl_newlink+0xdae/0x13b0 [ 101.016240][ T4894] ? __rcu_read_unlock+0x5c/0x290 [ 101.021239][ T4894] ? rtnl_setlink+0x2a0/0x2a0 [ 101.025954][ T4894] rtnetlink_rcv_msg+0x745/0x7e0 [ 101.031042][ T4894] ? ___cache_free+0x46/0x300 [ 101.035748][ T4894] ? kmem_cache_free+0x65/0x110 [ 101.040610][ T4894] ? __kfree_skb+0xfe/0x150 [ 101.045093][ T4894] ? consume_skb+0x48/0x160 [ 101.049578][ T4894] ? nlmon_xmit+0x5f/0x70 [ 101.053966][ T4894] ? __this_cpu_preempt_check+0x18/0x20 [ 101.059566][ T4894] ? __local_bh_enable_ip+0x4d/0x70 [ 101.064746][ T4894] ? local_bh_enable+0x1b/0x20 [ 101.069486][ T4894] ? __dev_queue_xmit+0x597/0xf70 [ 101.074503][ T4894] ? __skb_clone+0x2db/0x300 [ 101.079088][ T4894] ? __rcu_read_unlock+0x5c/0x290 [ 101.084135][ T4894] netlink_rcv_skb+0x14e/0x250 [ 101.088908][ T4894] ? rtnetlink_bind+0x60/0x60 [ 101.093581][ T4894] rtnetlink_rcv+0x18/0x20 [ 101.097977][ T4894] netlink_unicast+0x5fc/0x6c0 [ 101.102720][ T4894] netlink_sendmsg+0x6e1/0x7d0 [ 101.107536][ T4894] ? netlink_getsockopt+0x720/0x720 [ 101.112734][ T4894] ____sys_sendmsg+0x39a/0x510 [ 101.117499][ T4894] __sys_sendmsg+0x195/0x230 [ 101.122084][ T4894] __x64_sys_sendmsg+0x42/0x50 [ 101.126896][ T4894] do_syscall_64+0x44/0xd0 [ 101.131363][ T4894] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 101.137303][ T4894] RIP: 0033:0x7f229eaecae9 [ 101.141782][ T4894] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 23:48:03 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 101.161468][ T4894] RSP: 002b:00007f229c863188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 101.169872][ T4894] RAX: ffffffffffffffda RBX: 00007f229ebfff60 RCX: 00007f229eaecae9 [ 101.177823][ T4894] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000005 [ 101.185857][ T4894] RBP: 00007f229c8631d0 R08: 0000000000000000 R09: 0000000000000000 [ 101.193804][ T4894] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 101.201761][ T4894] R13: 00007ffd9766560f R14: 00007f229c863300 R15: 0000000000022000 [ 101.209730][ T4894] 23:48:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @hsr={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}]}}}]}, 0x38}}, 0x0) 23:48:03 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) (fail_nth: 19) [ 101.233618][ T4896] FAULT_INJECTION: forcing a failure. [ 101.233618][ T4896] name failslab, interval 1, probability 0, space 0, times 0 [ 101.246457][ T4896] CPU: 1 PID: 4896 Comm: syz-executor.0 Not tainted 5.16.0-rc2-syzkaller #0 [ 101.255130][ T4896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 101.265182][ T4896] Call Trace: [ 101.268456][ T4896] [ 101.271383][ T4896] dump_stack_lvl+0xd6/0x122 [ 101.276011][ T4896] dump_stack+0x11/0x1b [ 101.280252][ T4896] should_fail+0x23c/0x250 [ 101.284797][ T4896] ? kvasprintf_const+0xec/0x100 [ 101.289844][ T4896] __should_failslab+0x81/0x90 [ 101.294592][ T4896] should_failslab+0x5/0x20 [ 101.299092][ T4896] __kmalloc_track_caller+0x6d/0x370 [ 101.304361][ T4896] ? addrconf_notify+0x1a3/0x1960 [ 101.309485][ T4896] kstrdup_const+0x51/0x90 [ 101.313888][ T4896] kvasprintf_const+0xec/0x100 [ 101.318655][ T4896] kobject_set_name_vargs+0x43/0xe0 [ 101.323831][ T4896] dev_set_name+0x80/0xa0 [ 101.328224][ T4896] ? hrtimer_init+0xfc/0x1d0 [ 101.332963][ T4896] ? netdev_register_kobject+0x5f/0x230 [ 101.338546][ T4896] ? device_initialize+0x23f/0x260 [ 101.343695][ T4896] netdev_register_kobject+0x7a/0x230 [ 101.349099][ T4896] register_netdevice+0xba5/0x10b0 [ 101.354241][ T4896] hsr_dev_finalize+0x2da/0x460 [ 101.359083][ T4896] hsr_newlink+0x40d/0x450 [ 101.363493][ T4896] ? hsr_get_node_list+0x450/0x450 [ 101.368583][ T4896] rtnl_newlink+0xdae/0x13b0 [ 101.373225][ T4896] ? rtnl_setlink+0x2a0/0x2a0 [ 101.377892][ T4896] rtnetlink_rcv_msg+0x745/0x7e0 [ 101.382930][ T4896] ? ___cache_free+0x46/0x300 [ 101.387585][ T4896] ? kmem_cache_free+0x65/0x110 [ 101.392413][ T4896] ? __kfree_skb+0xfe/0x150 [ 101.396927][ T4896] ? consume_skb+0x48/0x160 [ 101.401431][ T4896] ? nlmon_xmit+0x5f/0x70 [ 101.405760][ T4896] ? __this_cpu_preempt_check+0x18/0x20 [ 101.411287][ T4896] ? __local_bh_enable_ip+0x4d/0x70 [ 101.416464][ T4896] ? local_bh_enable+0x1b/0x20 [ 101.421209][ T4896] ? __dev_queue_xmit+0x597/0xf70 [ 101.426229][ T4896] ? __skb_clone+0x2db/0x300 [ 101.430814][ T4896] ? __rcu_read_unlock+0x5c/0x290 [ 101.435818][ T4896] netlink_rcv_skb+0x14e/0x250 [ 101.440564][ T4896] ? rtnetlink_bind+0x60/0x60 [ 101.445259][ T4896] rtnetlink_rcv+0x18/0x20 [ 101.449724][ T4896] netlink_unicast+0x5fc/0x6c0 [ 101.454600][ T4896] netlink_sendmsg+0x6e1/0x7d0 [ 101.459394][ T4896] ? netlink_getsockopt+0x720/0x720 [ 101.464576][ T4896] ____sys_sendmsg+0x39a/0x510 [ 101.469326][ T4896] __sys_sendmsg+0x195/0x230 [ 101.473914][ T4896] __x64_sys_sendmsg+0x42/0x50 [ 101.478665][ T4896] do_syscall_64+0x44/0xd0 [ 101.483424][ T4896] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 101.489327][ T4896] RIP: 0033:0x7f63a3dfbae9 [ 101.493755][ T4896] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 101.513405][ T4896] RSP: 002b:00007f63a1b72188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 101.521941][ T4896] RAX: ffffffffffffffda RBX: 00007f63a3f0ef60 RCX: 00007f63a3dfbae9 23:48:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @hsr={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}]}}}]}, 0x38}}, 0x0) 23:48:04 executing program 4: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r2}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) 23:48:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8}]}}}]}, 0x40}}, 0x0) [ 101.529942][ T4896] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 101.537890][ T4896] RBP: 00007f63a1b721d0 R08: 0000000000000000 R09: 0000000000000000 [ 101.545936][ T4896] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 101.553891][ T4896] R13: 00007ffcec81edaf R14: 00007f63a1b72300 R15: 0000000000022000 [ 101.561862][ T4896] 23:48:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8}]}}}]}, 0x40}}, 0x0) [ 101.623291][ T4908] FAULT_INJECTION: forcing a failure. [ 101.623291][ T4908] name failslab, interval 1, probability 0, space 0, times 0 [ 101.636058][ T4908] CPU: 1 PID: 4908 Comm: syz-executor.3 Not tainted 5.16.0-rc2-syzkaller #0 [ 101.644827][ T4908] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 101.654873][ T4908] Call Trace: [ 101.658141][ T4908] [ 101.661125][ T4908] dump_stack_lvl+0xd6/0x122 [ 101.665776][ T4908] dump_stack+0x11/0x1b 23:48:04 executing program 4: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r2}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) 23:48:04 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 21) 23:48:04 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0xb, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:04 executing program 4: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r2}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) [ 101.669971][ T4908] should_fail+0x23c/0x250 [ 101.671656][ T4896] syz-executor.0 (4896) used greatest stack depth: 10256 bytes left [ 101.674379][ T4908] ? register_netdevice+0x369/0x10b0 [ 101.687610][ T4908] __should_failslab+0x81/0x90 [ 101.692455][ T4908] should_failslab+0x5/0x20 [ 101.696965][ T4908] kmem_cache_alloc_trace+0x52/0x350 [ 101.702253][ T4908] register_netdevice+0x369/0x10b0 [ 101.707398][ T4908] hsr_dev_finalize+0x2da/0x460 [ 101.712276][ T4908] hsr_newlink+0x40d/0x450 [ 101.716692][ T4908] ? hsr_get_node_list+0x450/0x450 23:48:04 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, 0x0, 0x0) 23:48:04 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, 0x0, 0x0) [ 101.721799][ T4908] rtnl_newlink+0xdae/0x13b0 [ 101.726413][ T4908] ? rtnl_setlink+0x2a0/0x2a0 [ 101.731106][ T4908] rtnetlink_rcv_msg+0x745/0x7e0 [ 101.736045][ T4908] ? ___cache_free+0x46/0x300 [ 101.740719][ T4908] ? kmem_cache_free+0x65/0x110 [ 101.745591][ T4908] ? __kfree_skb+0xfe/0x150 [ 101.750169][ T4908] ? consume_skb+0x48/0x160 [ 101.754680][ T4908] ? nlmon_xmit+0x5f/0x70 [ 101.759005][ T4908] ? __this_cpu_preempt_check+0x18/0x20 [ 101.764549][ T4908] ? __local_bh_enable_ip+0x4d/0x70 23:48:04 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, 0x0, 0x0) [ 101.769751][ T4908] ? local_bh_enable+0x1b/0x20 [ 101.774512][ T4908] ? __dev_queue_xmit+0x597/0xf70 [ 101.779533][ T4908] ? __skb_clone+0x2db/0x300 [ 101.784155][ T4908] ? __rcu_read_unlock+0x5c/0x290 [ 101.789235][ T4908] netlink_rcv_skb+0x14e/0x250 [ 101.794005][ T4908] ? rtnetlink_bind+0x60/0x60 [ 101.798754][ T4908] rtnetlink_rcv+0x18/0x20 [ 101.803170][ T4908] netlink_unicast+0x5fc/0x6c0 [ 101.807949][ T4908] netlink_sendmsg+0x6e1/0x7d0 [ 101.812736][ T4908] ? netlink_getsockopt+0x720/0x720 [ 101.817934][ T4908] ____sys_sendmsg+0x39a/0x510 [ 101.822762][ T4908] __sys_sendmsg+0x195/0x230 [ 101.827393][ T4908] __x64_sys_sendmsg+0x42/0x50 [ 101.832223][ T4908] do_syscall_64+0x44/0xd0 [ 101.836716][ T4908] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 101.842609][ T4908] RIP: 0033:0x7f229eaecae9 [ 101.847077][ T4908] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 101.866682][ T4908] RSP: 002b:00007f229c863188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 101.875075][ T4908] RAX: ffffffffffffffda RBX: 00007f229ebfff60 RCX: 00007f229eaecae9 [ 101.883037][ T4908] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000005 [ 101.891001][ T4908] RBP: 00007f229c8631d0 R08: 0000000000000000 R09: 0000000000000000 [ 101.898948][ T4908] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 101.906897][ T4908] R13: 00007ffd9766560f R14: 00007f229c863300 R15: 0000000000022000 [ 101.914853][ T4908] [ 101.929090][ T4921] FAULT_INJECTION: forcing a failure. [ 101.929090][ T4921] name failslab, interval 1, probability 0, space 0, times 0 [ 101.941748][ T4921] CPU: 0 PID: 4921 Comm: syz-executor.0 Not tainted 5.16.0-rc2-syzkaller #0 [ 101.950459][ T4921] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 101.960576][ T4921] Call Trace: [ 101.963841][ T4921] [ 101.966812][ T4921] dump_stack_lvl+0xd6/0x122 [ 101.971459][ T4921] dump_stack+0x11/0x1b [ 101.975611][ T4921] should_fail+0x23c/0x250 [ 101.980016][ T4921] ? device_add+0x96/0xf40 [ 101.984465][ T4921] __should_failslab+0x81/0x90 [ 101.989207][ T4921] should_failslab+0x5/0x20 [ 101.993706][ T4921] kmem_cache_alloc_trace+0x52/0x350 [ 101.999032][ T4921] ? kfree_const+0x35/0x40 [ 102.003773][ T4921] device_add+0x96/0xf40 [ 102.007992][ T4921] ? hrtimer_init+0xfc/0x1d0 [ 102.012631][ T4921] ? netdev_register_kobject+0x5f/0x230 [ 102.018250][ T4921] netdev_register_kobject+0xfd/0x230 [ 102.023677][ T4921] register_netdevice+0xba5/0x10b0 [ 102.028853][ T4921] hsr_dev_finalize+0x2da/0x460 [ 102.033733][ T4921] hsr_newlink+0x40d/0x450 [ 102.038157][ T4921] ? hsr_get_node_list+0x450/0x450 [ 102.043242][ T4921] rtnl_newlink+0xdae/0x13b0 [ 102.047862][ T4921] ? rtnl_setlink+0x2a0/0x2a0 [ 102.052518][ T4921] rtnetlink_rcv_msg+0x745/0x7e0 [ 102.057446][ T4921] ? ___cache_free+0x46/0x300 [ 102.062185][ T4921] ? delay_tsc+0x96/0xe0 [ 102.066462][ T4921] ? kmem_cache_free+0x65/0x110 [ 102.071290][ T4921] ? __kfree_skb+0xfe/0x150 [ 102.075841][ T4921] ? consume_skb+0x48/0x160 [ 102.080396][ T4921] ? nlmon_xmit+0x5f/0x70 [ 102.084830][ T4921] ? __this_cpu_preempt_check+0x18/0x20 [ 102.090409][ T4921] ? __local_bh_enable_ip+0x4d/0x70 [ 102.095594][ T4921] ? local_bh_enable+0x1b/0x20 [ 102.100348][ T4921] ? __dev_queue_xmit+0x597/0xf70 [ 102.105371][ T4921] ? __skb_clone+0x2db/0x300 [ 102.110095][ T4921] ? __rcu_read_unlock+0x5c/0x290 [ 102.115114][ T4921] netlink_rcv_skb+0x14e/0x250 [ 102.119861][ T4921] ? rtnetlink_bind+0x60/0x60 [ 102.124528][ T4921] rtnetlink_rcv+0x18/0x20 [ 102.128937][ T4921] netlink_unicast+0x5fc/0x6c0 [ 102.133693][ T4921] netlink_sendmsg+0x6e1/0x7d0 [ 102.138501][ T4921] ? netlink_getsockopt+0x720/0x720 [ 102.143692][ T4921] ____sys_sendmsg+0x39a/0x510 [ 102.148472][ T4921] __sys_sendmsg+0x195/0x230 [ 102.153171][ T4921] __x64_sys_sendmsg+0x42/0x50 [ 102.157918][ T4921] do_syscall_64+0x44/0xd0 [ 102.162353][ T4921] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 102.168357][ T4921] RIP: 0033:0x7f63a3dfbae9 [ 102.173012][ T4921] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 102.192693][ T4921] RSP: 002b:00007f63a1b72188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 102.201130][ T4921] RAX: ffffffffffffffda RBX: 00007f63a3f0ef60 RCX: 00007f63a3dfbae9 [ 102.209080][ T4921] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 102.217047][ T4921] RBP: 00007f63a1b721d0 R08: 0000000000000000 R09: 0000000000000000 23:48:04 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) (fail_nth: 20) 23:48:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @hsr={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}]}}}]}, 0x38}}, 0x0) 23:48:04 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 23:48:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8}]}}}]}, 0x40}}, 0x0) [ 102.225037][ T4921] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 102.233061][ T4921] R13: 00007ffcec81edaf R14: 00007f63a1b72300 R15: 0000000000022000 [ 102.241011][ T4921] [ 102.284629][ T4933] FAULT_INJECTION: forcing a failure. [ 102.284629][ T4933] name failslab, interval 1, probability 0, space 0, times 0 [ 102.297290][ T4933] CPU: 1 PID: 4933 Comm: syz-executor.3 Not tainted 5.16.0-rc2-syzkaller #0 [ 102.305965][ T4933] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 102.316064][ T4933] Call Trace: [ 102.319432][ T4933] [ 102.322434][ T4933] dump_stack_lvl+0xd6/0x122 [ 102.327033][ T4933] dump_stack+0x11/0x1b 23:48:04 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 22) 23:48:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @hsr={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x38}}, 0x0) 23:48:04 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) [ 102.331283][ T4933] should_fail+0x23c/0x250 [ 102.335712][ T4933] ? kvasprintf_const+0xec/0x100 [ 102.340730][ T4933] __should_failslab+0x81/0x90 [ 102.345571][ T4933] should_failslab+0x5/0x20 [ 102.350108][ T4933] __kmalloc_track_caller+0x6d/0x370 [ 102.355393][ T4933] ? addrconf_notify+0x1a3/0x1960 [ 102.360413][ T4933] kstrdup_const+0x51/0x90 [ 102.364899][ T4933] kvasprintf_const+0xec/0x100 [ 102.369755][ T4933] kobject_set_name_vargs+0x43/0xe0 [ 102.374980][ T4933] dev_set_name+0x80/0xa0 [ 102.379313][ T4933] ? hrtimer_init+0xfc/0x1d0 [ 102.383938][ T4933] ? netdev_register_kobject+0x5f/0x230 [ 102.389535][ T4933] ? device_initialize+0x23f/0x260 [ 102.394720][ T4933] netdev_register_kobject+0x7a/0x230 [ 102.400190][ T4933] register_netdevice+0xba5/0x10b0 [ 102.405332][ T4933] hsr_dev_finalize+0x2da/0x460 [ 102.410244][ T4933] hsr_newlink+0x40d/0x450 [ 102.414748][ T4933] ? hsr_get_node_list+0x450/0x450 [ 102.419854][ T4933] rtnl_newlink+0xdae/0x13b0 [ 102.424511][ T4933] ? rtnl_setlink+0x2a0/0x2a0 [ 102.429194][ T4933] rtnetlink_rcv_msg+0x745/0x7e0 [ 102.434143][ T4933] ? ___cache_free+0x46/0x300 [ 102.438826][ T4933] ? kmem_cache_free+0x65/0x110 [ 102.443765][ T4933] ? __kfree_skb+0xfe/0x150 [ 102.448280][ T4933] ? consume_skb+0x48/0x160 [ 102.452770][ T4933] ? nlmon_xmit+0x5f/0x70 [ 102.457100][ T4933] ? __this_cpu_preempt_check+0x18/0x20 [ 102.462640][ T4933] ? __local_bh_enable_ip+0x4d/0x70 [ 102.467833][ T4933] ? local_bh_enable+0x1b/0x20 [ 102.472593][ T4933] ? __dev_queue_xmit+0x597/0xf70 [ 102.477599][ T4933] ? __skb_clone+0x2db/0x300 [ 102.482269][ T4933] ? __rcu_read_unlock+0x5c/0x290 [ 102.487272][ T4933] netlink_rcv_skb+0x14e/0x250 [ 102.492019][ T4933] ? rtnetlink_bind+0x60/0x60 [ 102.496781][ T4933] rtnetlink_rcv+0x18/0x20 [ 102.501259][ T4933] netlink_unicast+0x5fc/0x6c0 [ 102.506024][ T4933] netlink_sendmsg+0x6e1/0x7d0 [ 102.510909][ T4933] ? netlink_getsockopt+0x720/0x720 [ 102.516213][ T4933] ____sys_sendmsg+0x39a/0x510 [ 102.520963][ T4933] __sys_sendmsg+0x195/0x230 [ 102.525585][ T4933] __x64_sys_sendmsg+0x42/0x50 [ 102.530398][ T4933] do_syscall_64+0x44/0xd0 [ 102.534912][ T4933] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 102.540799][ T4933] RIP: 0033:0x7f229eaecae9 [ 102.545221][ T4933] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 102.564814][ T4933] RSP: 002b:00007f229c863188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 102.573211][ T4933] RAX: ffffffffffffffda RBX: 00007f229ebfff60 RCX: 00007f229eaecae9 [ 102.581178][ T4933] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000005 [ 102.589128][ T4933] RBP: 00007f229c8631d0 R08: 0000000000000000 R09: 0000000000000000 [ 102.597100][ T4933] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 102.605090][ T4933] R13: 00007ffd9766560f R14: 00007f229c863300 R15: 0000000000022000 [ 102.613113][ T4933] [ 102.617682][ T4941] FAULT_INJECTION: forcing a failure. [ 102.617682][ T4941] name failslab, interval 1, probability 0, space 0, times 0 [ 102.630316][ T4941] CPU: 1 PID: 4941 Comm: syz-executor.0 Not tainted 5.16.0-rc2-syzkaller #0 [ 102.638986][ T4941] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 102.649152][ T4941] Call Trace: [ 102.652427][ T4941] [ 102.655349][ T4941] dump_stack_lvl+0xd6/0x122 [ 102.655562][ T4933] syz-executor.3 (4933) used greatest stack depth: 10200 bytes left [ 102.659937][ T4941] dump_stack+0x11/0x1b [ 102.659958][ T4941] should_fail+0x23c/0x250 [ 102.659976][ T4941] ? __kernfs_new_node+0x41/0x340 [ 102.659998][ T4941] __should_failslab+0x81/0x90 [ 102.660018][ T4941] should_failslab+0x5/0x20 [ 102.691128][ T4941] __kmalloc_track_caller+0x6d/0x370 [ 102.696412][ T4941] kstrdup_const+0x51/0x90 [ 102.700857][ T4941] __kernfs_new_node+0x41/0x340 [ 102.705735][ T4941] ? make_kgid+0x127/0x180 [ 102.710205][ T4941] ? net_ns_get_ownership+0xaa/0xc0 [ 102.715479][ T4941] ? net_namespace+0x20/0x20 [ 102.720049][ T4941] kernfs_create_dir_ns+0x5e/0x140 [ 102.725150][ T4941] sysfs_create_dir_ns+0xa3/0x1a0 [ 102.730211][ T4941] kobject_add_internal+0x456/0x840 [ 102.735492][ T4941] kobject_add+0xd7/0x150 [ 102.739807][ T4941] ? device_add+0x30d/0xf40 [ 102.744291][ T4941] ? get_device_parent+0x1f8/0x310 [ 102.749379][ T4941] device_add+0x31d/0xf40 [ 102.753687][ T4941] ? hrtimer_init+0xfc/0x1d0 [ 102.758353][ T4941] ? netdev_register_kobject+0x5f/0x230 [ 102.763925][ T4941] netdev_register_kobject+0xfd/0x230 [ 102.769309][ T4941] register_netdevice+0xba5/0x10b0 [ 102.774459][ T4941] hsr_dev_finalize+0x2da/0x460 [ 102.779357][ T4941] hsr_newlink+0x40d/0x450 [ 102.783773][ T4941] ? hsr_get_node_list+0x450/0x450 [ 102.788875][ T4941] rtnl_newlink+0xdae/0x13b0 [ 102.793461][ T4941] ? rb_insert_color+0x2fa/0x310 [ 102.798799][ T4941] ? rtnl_setlink+0x2a0/0x2a0 [ 102.803459][ T4941] rtnetlink_rcv_msg+0x745/0x7e0 [ 102.808438][ T4941] ? ___cache_free+0x46/0x300 [ 102.814105][ T4941] ? kmem_cache_free+0x65/0x110 [ 102.819013][ T4941] ? __kfree_skb+0xfe/0x150 [ 102.823522][ T4941] ? consume_skb+0x48/0x160 [ 102.828005][ T4941] ? nlmon_xmit+0x5f/0x70 [ 102.832330][ T4941] ? __this_cpu_preempt_check+0x18/0x20 [ 102.837866][ T4941] ? __local_bh_enable_ip+0x4d/0x70 [ 102.843090][ T4941] ? local_bh_enable+0x1b/0x20 [ 102.847863][ T4941] ? __dev_queue_xmit+0x597/0xf70 [ 102.852878][ T4941] ? __skb_clone+0x2db/0x300 [ 102.857448][ T4941] ? __rcu_read_unlock+0x5c/0x290 [ 102.862523][ T4941] netlink_rcv_skb+0x14e/0x250 [ 102.867277][ T4941] ? rtnetlink_bind+0x60/0x60 [ 102.871940][ T4941] rtnetlink_rcv+0x18/0x20 [ 102.876347][ T4941] netlink_unicast+0x5fc/0x6c0 [ 102.881089][ T4941] netlink_sendmsg+0x6e1/0x7d0 [ 102.885920][ T4941] ? netlink_getsockopt+0x720/0x720 [ 102.891115][ T4941] ____sys_sendmsg+0x39a/0x510 [ 102.895904][ T4941] __sys_sendmsg+0x195/0x230 [ 102.900512][ T4941] __x64_sys_sendmsg+0x42/0x50 [ 102.905350][ T4941] do_syscall_64+0x44/0xd0 [ 102.909769][ T4941] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 102.915684][ T4941] RIP: 0033:0x7f63a3dfbae9 [ 102.920089][ T4941] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 102.939715][ T4941] RSP: 002b:00007f63a1b72188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 102.948115][ T4941] RAX: ffffffffffffffda RBX: 00007f63a3f0ef60 RCX: 00007f63a3dfbae9 [ 102.956078][ T4941] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 102.964081][ T4941] RBP: 00007f63a1b721d0 R08: 0000000000000000 R09: 0000000000000000 [ 102.972028][ T4941] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 102.980048][ T4941] R13: 00007ffcec81edaf R14: 00007f63a1b72300 R15: 0000000000022000 23:48:05 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0xc, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:05 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 23:48:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8}]}}}]}, 0x40}}, 0x0) 23:48:05 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) (fail_nth: 21) [ 102.987996][ T4941] [ 102.991158][ T4941] kobject_add_internal failed for hsr1 (error: -12 parent: net) [ 103.032049][ T4953] FAULT_INJECTION: forcing a failure. [ 103.032049][ T4953] name failslab, interval 1, probability 0, space 0, times 0 [ 103.044684][ T4953] CPU: 0 PID: 4953 Comm: syz-executor.3 Not tainted 5.16.0-rc2-syzkaller #0 [ 103.053495][ T4953] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 103.063551][ T4953] Call Trace: [ 103.066836][ T4953] [ 103.069830][ T4953] dump_stack_lvl+0xd6/0x122 [ 103.074495][ T4953] dump_stack+0x11/0x1b [ 103.078704][ T4953] should_fail+0x23c/0x250 [ 103.083104][ T4953] ? device_add+0x96/0xf40 [ 103.087502][ T4953] __should_failslab+0x81/0x90 [ 103.092425][ T4953] should_failslab+0x5/0x20 [ 103.096931][ T4953] kmem_cache_alloc_trace+0x52/0x350 [ 103.102206][ T4953] ? kfree_const+0x35/0x40 [ 103.106650][ T4953] device_add+0x96/0xf40 [ 103.110950][ T4953] ? hrtimer_init+0xfc/0x1d0 [ 103.115525][ T4953] ? netdev_register_kobject+0x5f/0x230 [ 103.121050][ T4953] netdev_register_kobject+0xfd/0x230 [ 103.126476][ T4953] register_netdevice+0xba5/0x10b0 [ 103.131649][ T4953] hsr_dev_finalize+0x2da/0x460 [ 103.136494][ T4953] hsr_newlink+0x40d/0x450 [ 103.140928][ T4953] ? hsr_get_node_list+0x450/0x450 [ 103.146036][ T4953] rtnl_newlink+0xdae/0x13b0 [ 103.150686][ T4953] ? __rcu_read_unlock+0x5c/0x290 [ 103.155687][ T4953] ? rtnl_setlink+0x2a0/0x2a0 [ 103.160359][ T4953] rtnetlink_rcv_msg+0x745/0x7e0 [ 103.165311][ T4953] ? ___cache_free+0x46/0x300 [ 103.170002][ T4953] ? kmem_cache_free+0x65/0x110 [ 103.174840][ T4953] ? __kfree_skb+0xfe/0x150 [ 103.179331][ T4953] ? consume_skb+0x48/0x160 [ 103.183889][ T4953] ? nlmon_xmit+0x5f/0x70 [ 103.188259][ T4953] ? __this_cpu_preempt_check+0x18/0x20 [ 103.193782][ T4953] ? __local_bh_enable_ip+0x4d/0x70 [ 103.198973][ T4953] ? local_bh_enable+0x1b/0x20 [ 103.203744][ T4953] ? __dev_queue_xmit+0x597/0xf70 [ 103.208817][ T4953] ? __skb_clone+0x2db/0x300 [ 103.213383][ T4953] ? __rcu_read_unlock+0x5c/0x290 [ 103.218532][ T4953] netlink_rcv_skb+0x14e/0x250 [ 103.223272][ T4953] ? rtnetlink_bind+0x60/0x60 [ 103.227936][ T4953] rtnetlink_rcv+0x18/0x20 [ 103.232404][ T4953] netlink_unicast+0x5fc/0x6c0 [ 103.237147][ T4953] netlink_sendmsg+0x6e1/0x7d0 [ 103.241910][ T4953] ? netlink_getsockopt+0x720/0x720 [ 103.247184][ T4953] ____sys_sendmsg+0x39a/0x510 [ 103.251980][ T4953] __sys_sendmsg+0x195/0x230 [ 103.256552][ T4953] __x64_sys_sendmsg+0x42/0x50 [ 103.261335][ T4953] do_syscall_64+0x44/0xd0 [ 103.265729][ T4953] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 103.271632][ T4953] RIP: 0033:0x7f229eaecae9 [ 103.276022][ T4953] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 103.295615][ T4953] RSP: 002b:00007f229c863188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 103.304003][ T4953] RAX: ffffffffffffffda RBX: 00007f229ebfff60 RCX: 00007f229eaecae9 [ 103.311949][ T4953] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000005 [ 103.319969][ T4953] RBP: 00007f229c8631d0 R08: 0000000000000000 R09: 0000000000000000 23:48:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8}]}}}]}, 0x40}}, 0x0) 23:48:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @hsr={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x38}}, 0x0) 23:48:05 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) [ 103.327930][ T4953] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 103.335891][ T4953] R13: 00007ffd9766560f R14: 00007f229c863300 R15: 0000000000022000 [ 103.343923][ T4953] 23:48:05 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 23) 23:48:05 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) (fail_nth: 22) 23:48:05 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) 23:48:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @hsr={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x38}}, 0x0) 23:48:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8}]}}}]}, 0x40}}, 0x0) [ 103.379907][ T4941] syz-executor.0 (4941) used greatest stack depth: 9800 bytes left 23:48:05 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0xd, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:06 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) [ 103.434473][ T4965] FAULT_INJECTION: forcing a failure. [ 103.434473][ T4965] name failslab, interval 1, probability 0, space 0, times 0 [ 103.447244][ T4965] CPU: 1 PID: 4965 Comm: syz-executor.0 Not tainted 5.16.0-rc2-syzkaller #0 [ 103.456214][ T4965] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 103.466388][ T4965] Call Trace: [ 103.469661][ T4965] [ 103.472594][ T4965] dump_stack_lvl+0xd6/0x122 [ 103.477263][ T4965] dump_stack+0x11/0x1b 23:48:06 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 103.481888][ T4965] should_fail+0x23c/0x250 [ 103.486325][ T4965] ? __kernfs_new_node+0x6a/0x340 [ 103.491365][ T4965] __should_failslab+0x81/0x90 [ 103.496131][ T4965] should_failslab+0x5/0x20 [ 103.500634][ T4965] kmem_cache_alloc+0x4f/0x320 [ 103.505481][ T4965] __kernfs_new_node+0x6a/0x340 [ 103.510334][ T4965] ? make_kgid+0x127/0x180 [ 103.514820][ T4965] ? rmqueue+0x4a/0xd20 [ 103.519067][ T4965] ? net_ns_get_ownership+0xaa/0xc0 [ 103.524360][ T4965] ? net_namespace+0x20/0x20 [ 103.528960][ T4965] kernfs_create_dir_ns+0x5e/0x140 23:48:06 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:06 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 103.534077][ T4965] sysfs_create_dir_ns+0xa3/0x1a0 [ 103.539100][ T4965] kobject_add_internal+0x456/0x840 [ 103.544303][ T4965] kobject_add+0xd7/0x150 [ 103.548637][ T4965] ? device_add+0x30d/0xf40 [ 103.553145][ T4965] ? get_device_parent+0x1f8/0x310 [ 103.558434][ T4965] device_add+0x31d/0xf40 [ 103.562766][ T4965] ? hrtimer_init+0xfc/0x1d0 [ 103.567415][ T4965] ? netdev_register_kobject+0x5f/0x230 [ 103.572966][ T4965] netdev_register_kobject+0xfd/0x230 [ 103.578421][ T4965] register_netdevice+0xba5/0x10b0 23:48:06 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x20, 0x10, 0x705}, 0x20}}, 0x0) [ 103.583620][ T4965] hsr_dev_finalize+0x2da/0x460 [ 103.588498][ T4965] hsr_newlink+0x40d/0x450 [ 103.592976][ T4965] ? hsr_get_node_list+0x450/0x450 [ 103.598143][ T4965] rtnl_newlink+0xdae/0x13b0 [ 103.602753][ T4965] ? __rcu_read_unlock+0x5c/0x290 [ 103.607778][ T4965] ? rtnl_setlink+0x2a0/0x2a0 [ 103.612461][ T4965] rtnetlink_rcv_msg+0x745/0x7e0 [ 103.617426][ T4965] ? ___cache_free+0x46/0x300 [ 103.622099][ T4965] ? kmem_cache_free+0x65/0x110 [ 103.626979][ T4965] ? __kfree_skb+0xfe/0x150 [ 103.631545][ T4965] ? consume_skb+0x48/0x160 [ 103.636035][ T4965] ? nlmon_xmit+0x5f/0x70 [ 103.640346][ T4965] ? __this_cpu_preempt_check+0x18/0x20 [ 103.645923][ T4965] ? __local_bh_enable_ip+0x4d/0x70 [ 103.651107][ T4965] ? local_bh_enable+0x1b/0x20 [ 103.655945][ T4965] ? __dev_queue_xmit+0x597/0xf70 [ 103.660955][ T4965] ? __skb_clone+0x2db/0x300 [ 103.665625][ T4965] ? __rcu_read_unlock+0x5c/0x290 [ 103.670752][ T4965] netlink_rcv_skb+0x14e/0x250 [ 103.675505][ T4965] ? rtnetlink_bind+0x60/0x60 [ 103.680232][ T4965] rtnetlink_rcv+0x18/0x20 [ 103.684721][ T4965] netlink_unicast+0x5fc/0x6c0 [ 103.689481][ T4965] netlink_sendmsg+0x6e1/0x7d0 [ 103.694237][ T4965] ? netlink_getsockopt+0x720/0x720 [ 103.699479][ T4965] ____sys_sendmsg+0x39a/0x510 [ 103.704297][ T4965] __sys_sendmsg+0x195/0x230 [ 103.708890][ T4965] __x64_sys_sendmsg+0x42/0x50 [ 103.713690][ T4965] do_syscall_64+0x44/0xd0 [ 103.718098][ T4965] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 103.724057][ T4965] RIP: 0033:0x7f63a3dfbae9 [ 103.728455][ T4965] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 103.748107][ T4965] RSP: 002b:00007f63a1b72188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 103.756501][ T4965] RAX: ffffffffffffffda RBX: 00007f63a3f0ef60 RCX: 00007f63a3dfbae9 [ 103.764451][ T4965] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 103.772420][ T4965] RBP: 00007f63a1b721d0 R08: 0000000000000000 R09: 0000000000000000 [ 103.780422][ T4965] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 103.788395][ T4965] R13: 00007ffcec81edaf R14: 00007f63a1b72300 R15: 0000000000022000 [ 103.796374][ T4965] [ 103.799443][ T4965] kobject_add_internal failed for hsr1 (error: -12 parent: net) [ 103.811539][ T4974] FAULT_INJECTION: forcing a failure. [ 103.811539][ T4974] name failslab, interval 1, probability 0, space 0, times 0 [ 103.824241][ T4974] CPU: 0 PID: 4974 Comm: syz-executor.3 Not tainted 5.16.0-rc2-syzkaller #0 [ 103.832912][ T4974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 103.843038][ T4974] Call Trace: [ 103.846298][ T4974] [ 103.849210][ T4974] dump_stack_lvl+0xd6/0x122 [ 103.853818][ T4974] dump_stack+0x11/0x1b [ 103.857994][ T4974] should_fail+0x23c/0x250 [ 103.862412][ T4974] ? __kernfs_new_node+0x41/0x340 [ 103.867560][ T4974] __should_failslab+0x81/0x90 [ 103.872371][ T4974] should_failslab+0x5/0x20 [ 103.876902][ T4974] __kmalloc_track_caller+0x6d/0x370 [ 103.882215][ T4974] kstrdup_const+0x51/0x90 [ 103.886612][ T4974] __kernfs_new_node+0x41/0x340 [ 103.891453][ T4974] ? make_kgid+0x127/0x180 [ 103.895849][ T4974] ? rmqueue+0x4a/0xd20 [ 103.900066][ T4974] ? net_ns_get_ownership+0xaa/0xc0 [ 103.905243][ T4974] ? net_namespace+0x20/0x20 [ 103.909929][ T4974] kernfs_create_dir_ns+0x5e/0x140 [ 103.915036][ T4974] sysfs_create_dir_ns+0xa3/0x1a0 [ 103.920055][ T4974] kobject_add_internal+0x456/0x840 [ 103.925393][ T4974] kobject_add+0xd7/0x150 [ 103.929705][ T4974] ? device_add+0x30d/0xf40 [ 103.934244][ T4974] ? get_device_parent+0x1f8/0x310 [ 103.939447][ T4974] device_add+0x31d/0xf40 [ 103.943770][ T4974] ? hrtimer_init+0xfc/0x1d0 [ 103.948405][ T4974] ? netdev_register_kobject+0x5f/0x230 [ 103.953945][ T4974] netdev_register_kobject+0xfd/0x230 [ 103.959453][ T4974] register_netdevice+0xba5/0x10b0 [ 103.964579][ T4974] hsr_dev_finalize+0x2da/0x460 [ 103.969467][ T4974] hsr_newlink+0x40d/0x450 [ 103.974009][ T4974] ? hsr_get_node_list+0x450/0x450 [ 103.979144][ T4974] rtnl_newlink+0xdae/0x13b0 [ 103.983764][ T4974] ? rtnl_setlink+0x2a0/0x2a0 [ 103.988469][ T4974] rtnetlink_rcv_msg+0x745/0x7e0 [ 103.993423][ T4974] ? ___cache_free+0x46/0x300 [ 103.998143][ T4974] ? kmem_cache_free+0x65/0x110 [ 104.002979][ T4974] ? __kfree_skb+0xfe/0x150 [ 104.007512][ T4974] ? consume_skb+0x48/0x160 [ 104.012004][ T4974] ? nlmon_xmit+0x5f/0x70 [ 104.016320][ T4974] ? __this_cpu_preempt_check+0x18/0x20 [ 104.021866][ T4974] ? __local_bh_enable_ip+0x4d/0x70 [ 104.027069][ T4974] ? local_bh_enable+0x1b/0x20 [ 104.031846][ T4974] ? __dev_queue_xmit+0x597/0xf70 [ 104.036865][ T4974] ? __skb_clone+0x2db/0x300 [ 104.041475][ T4974] ? __rcu_read_unlock+0x5c/0x290 [ 104.046534][ T4974] netlink_rcv_skb+0x14e/0x250 [ 104.051323][ T4974] ? rtnetlink_bind+0x60/0x60 [ 104.055977][ T4974] rtnetlink_rcv+0x18/0x20 [ 104.060371][ T4974] netlink_unicast+0x5fc/0x6c0 [ 104.065148][ T4974] netlink_sendmsg+0x6e1/0x7d0 [ 104.069938][ T4974] ? netlink_getsockopt+0x720/0x720 [ 104.075178][ T4974] ____sys_sendmsg+0x39a/0x510 [ 104.080069][ T4974] __sys_sendmsg+0x195/0x230 [ 104.084736][ T4974] __x64_sys_sendmsg+0x42/0x50 [ 104.089519][ T4974] do_syscall_64+0x44/0xd0 [ 104.093918][ T4974] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 104.099819][ T4974] RIP: 0033:0x7f229eaecae9 [ 104.104284][ T4974] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 104.124116][ T4974] RSP: 002b:00007f229c863188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 23:48:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @hsr={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x38}}, 0x0) [ 104.132522][ T4974] RAX: ffffffffffffffda RBX: 00007f229ebfff60 RCX: 00007f229eaecae9 [ 104.140918][ T4974] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000005 [ 104.148880][ T4974] RBP: 00007f229c8631d0 R08: 0000000000000000 R09: 0000000000000000 [ 104.156829][ T4974] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 104.164835][ T4974] R13: 00007ffd9766560f R14: 00007f229c863300 R15: 0000000000022000 [ 104.172848][ T4974] [ 104.175905][ T4974] kobject_add_internal failed for hsr1 (error: -12 parent: net) 23:48:06 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 24) 23:48:06 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) (fail_nth: 23) 23:48:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) 23:48:06 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x20, 0x10, 0x705}, 0x20}}, 0x0) 23:48:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @hsr={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x38}}, 0x0) [ 104.201971][ T4965] syz-executor.0 (4965) used greatest stack depth: 9736 bytes left [ 104.258875][ T4993] FAULT_INJECTION: forcing a failure. [ 104.258875][ T4993] name failslab, interval 1, probability 0, space 0, times 0 [ 104.271555][ T4993] CPU: 1 PID: 4993 Comm: syz-executor.0 Not tainted 5.16.0-rc2-syzkaller #0 [ 104.280240][ T4993] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 104.290462][ T4993] Call Trace: [ 104.293736][ T4993] [ 104.296671][ T4993] dump_stack_lvl+0xd6/0x122 [ 104.302879][ T4993] dump_stack+0x11/0x1b [ 104.307041][ T4993] should_fail+0x23c/0x250 [ 104.311439][ T4993] ? radix_tree_node_alloc+0x142/0x200 [ 104.316909][ T4993] __should_failslab+0x81/0x90 [ 104.321655][ T4993] should_failslab+0x5/0x20 [ 104.326265][ T4993] kmem_cache_alloc+0x4f/0x320 [ 104.331017][ T4993] radix_tree_node_alloc+0x142/0x200 [ 104.336303][ T4993] idr_get_free+0x22a/0x5d0 [ 104.340824][ T4993] idr_alloc_cyclic+0xf4/0x2f0 [ 104.345637][ T4993] __kernfs_new_node+0xb4/0x340 [ 104.350504][ T4993] ? make_kgid+0x127/0x180 [ 104.354963][ T4993] ? net_ns_get_ownership+0xaa/0xc0 [ 104.360163][ T4993] ? net_namespace+0x20/0x20 [ 104.364740][ T4993] kernfs_create_dir_ns+0x5e/0x140 [ 104.369836][ T4993] sysfs_create_dir_ns+0xa3/0x1a0 [ 104.375453][ T4993] kobject_add_internal+0x456/0x840 [ 104.380658][ T4993] kobject_add+0xd7/0x150 [ 104.385057][ T4993] ? device_add+0x30d/0xf40 [ 104.389578][ T4993] ? get_device_parent+0x1f8/0x310 [ 104.394679][ T4993] device_add+0x31d/0xf40 [ 104.399050][ T4993] ? hrtimer_init+0xfc/0x1d0 [ 104.403647][ T4993] ? netdev_register_kobject+0x5f/0x230 [ 104.409176][ T4993] netdev_register_kobject+0xfd/0x230 [ 104.414566][ T4993] register_netdevice+0xba5/0x10b0 [ 104.419674][ T4993] hsr_dev_finalize+0x2da/0x460 [ 104.424529][ T4993] hsr_newlink+0x40d/0x450 [ 104.429019][ T4993] ? hsr_get_node_list+0x450/0x450 [ 104.434132][ T4993] rtnl_newlink+0xdae/0x13b0 [ 104.438761][ T4993] ? __rcu_read_unlock+0x5c/0x290 [ 104.443784][ T4993] ? rtnl_setlink+0x2a0/0x2a0 [ 104.448459][ T4993] rtnetlink_rcv_msg+0x745/0x7e0 [ 104.453392][ T4993] ? ___cache_free+0x46/0x300 [ 104.458052][ T4993] ? kmem_cache_free+0x65/0x110 [ 104.462905][ T4993] ? __kfree_skb+0xfe/0x150 [ 104.467492][ T4993] ? consume_skb+0x48/0x160 [ 104.471992][ T4993] ? nlmon_xmit+0x5f/0x70 [ 104.476363][ T4993] ? __this_cpu_preempt_check+0x18/0x20 [ 104.482101][ T4993] ? __local_bh_enable_ip+0x4d/0x70 [ 104.487327][ T4993] ? local_bh_enable+0x1b/0x20 [ 104.492079][ T4993] ? __dev_queue_xmit+0x597/0xf70 [ 104.497090][ T4993] ? __skb_clone+0x2db/0x300 [ 104.501685][ T4993] ? __rcu_read_unlock+0x5c/0x290 [ 104.506756][ T4993] netlink_rcv_skb+0x14e/0x250 [ 104.511548][ T4993] ? rtnetlink_bind+0x60/0x60 [ 104.516246][ T4993] rtnetlink_rcv+0x18/0x20 [ 104.520732][ T4993] netlink_unicast+0x5fc/0x6c0 [ 104.525503][ T4993] netlink_sendmsg+0x6e1/0x7d0 [ 104.530272][ T4993] ? netlink_getsockopt+0x720/0x720 [ 104.535534][ T4993] ____sys_sendmsg+0x39a/0x510 [ 104.540285][ T4993] __sys_sendmsg+0x195/0x230 [ 104.544903][ T4993] __x64_sys_sendmsg+0x42/0x50 [ 104.549712][ T4993] do_syscall_64+0x44/0xd0 [ 104.554131][ T4993] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 104.560270][ T4993] RIP: 0033:0x7f63a3dfbae9 [ 104.564693][ T4993] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 104.584291][ T4993] RSP: 002b:00007f63a1b72188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 104.592683][ T4993] RAX: ffffffffffffffda RBX: 00007f63a3f0ef60 RCX: 00007f63a3dfbae9 [ 104.600649][ T4993] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 104.608624][ T4993] RBP: 00007f63a1b721d0 R08: 0000000000000000 R09: 0000000000000000 [ 104.616665][ T4993] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 104.624653][ T4993] R13: 00007ffcec81edaf R14: 00007f63a1b72300 R15: 0000000000022000 [ 104.632674][ T4993] [ 104.641181][ T4994] FAULT_INJECTION: forcing a failure. [ 104.641181][ T4994] name failslab, interval 1, probability 0, space 0, times 0 [ 104.653998][ T4994] CPU: 0 PID: 4994 Comm: syz-executor.3 Not tainted 5.16.0-rc2-syzkaller #0 [ 104.662665][ T4994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 104.672718][ T4994] Call Trace: [ 104.675988][ T4994] [ 104.678969][ T4994] dump_stack_lvl+0xd6/0x122 [ 104.683662][ T4994] dump_stack+0x11/0x1b [ 104.687816][ T4994] should_fail+0x23c/0x250 [ 104.692250][ T4994] ? __kernfs_new_node+0x6a/0x340 [ 104.697331][ T4994] __should_failslab+0x81/0x90 [ 104.702146][ T4994] should_failslab+0x5/0x20 [ 104.706714][ T4994] kmem_cache_alloc+0x4f/0x320 [ 104.711472][ T4994] __kernfs_new_node+0x6a/0x340 [ 104.716322][ T4994] ? make_kgid+0x127/0x180 [ 104.720754][ T4994] ? rmqueue+0x4a/0xd20 [ 104.724888][ T4994] ? net_ns_get_ownership+0xaa/0xc0 [ 104.730062][ T4994] ? net_namespace+0x20/0x20 [ 104.734626][ T4994] kernfs_create_dir_ns+0x5e/0x140 [ 104.739789][ T4994] sysfs_create_dir_ns+0xa3/0x1a0 [ 104.744805][ T4994] kobject_add_internal+0x456/0x840 [ 104.749981][ T4994] kobject_add+0xd7/0x150 [ 104.754326][ T4994] ? device_add+0x30d/0xf40 [ 104.758807][ T4994] ? get_device_parent+0x1f8/0x310 [ 104.763894][ T4994] device_add+0x31d/0xf40 [ 104.768199][ T4994] ? hrtimer_init+0xfc/0x1d0 [ 104.772817][ T4994] ? netdev_register_kobject+0x5f/0x230 [ 104.778410][ T4994] netdev_register_kobject+0xfd/0x230 [ 104.783780][ T4994] register_netdevice+0xba5/0x10b0 [ 104.788880][ T4994] hsr_dev_finalize+0x2da/0x460 [ 104.793728][ T4994] hsr_newlink+0x40d/0x450 [ 104.798246][ T4994] ? hsr_get_node_list+0x450/0x450 [ 104.803347][ T4994] rtnl_newlink+0xdae/0x13b0 [ 104.807919][ T4994] ? rb_insert_color+0x2fa/0x310 [ 104.812840][ T4994] ? rtnl_setlink+0x2a0/0x2a0 [ 104.817507][ T4994] rtnetlink_rcv_msg+0x745/0x7e0 [ 104.822473][ T4994] ? ___cache_free+0x46/0x300 [ 104.827160][ T4994] ? kmem_cache_free+0x65/0x110 [ 104.831987][ T4994] ? __kfree_skb+0xfe/0x150 [ 104.836543][ T4994] ? consume_skb+0x48/0x160 [ 104.841026][ T4994] ? nlmon_xmit+0x5f/0x70 [ 104.845341][ T4994] ? __this_cpu_preempt_check+0x18/0x20 [ 104.850873][ T4994] ? __local_bh_enable_ip+0x4d/0x70 [ 104.856104][ T4994] ? local_bh_enable+0x1b/0x20 [ 104.860936][ T4994] ? __dev_queue_xmit+0x597/0xf70 [ 104.865997][ T4994] ? __skb_clone+0x2db/0x300 [ 104.870607][ T4994] ? __rcu_read_unlock+0x5c/0x290 [ 104.875680][ T4994] netlink_rcv_skb+0x14e/0x250 [ 104.880510][ T4994] ? rtnetlink_bind+0x60/0x60 [ 104.885184][ T4994] rtnetlink_rcv+0x18/0x20 [ 104.889683][ T4994] netlink_unicast+0x5fc/0x6c0 [ 104.894528][ T4994] netlink_sendmsg+0x6e1/0x7d0 [ 104.899295][ T4994] ? netlink_getsockopt+0x720/0x720 [ 104.904487][ T4994] ____sys_sendmsg+0x39a/0x510 [ 104.909269][ T4994] __sys_sendmsg+0x195/0x230 [ 104.913912][ T4994] __x64_sys_sendmsg+0x42/0x50 [ 104.918658][ T4994] do_syscall_64+0x44/0xd0 [ 104.923123][ T4994] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 104.929001][ T4994] RIP: 0033:0x7f229eaecae9 [ 104.933536][ T4994] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 104.953121][ T4994] RSP: 002b:00007f229c863188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 104.961565][ T4994] RAX: ffffffffffffffda RBX: 00007f229ebfff60 RCX: 00007f229eaecae9 [ 104.969518][ T4994] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000005 [ 104.977545][ T4994] RBP: 00007f229c8631d0 R08: 0000000000000000 R09: 0000000000000000 [ 104.985531][ T4994] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 104.993491][ T4994] R13: 00007ffd9766560f R14: 00007f229c863300 R15: 0000000000022000 [ 105.001530][ T4994] [ 105.004624][ T4994] kobject_add_internal failed for hsr1 (error: -12 parent: net) 23:48:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @hsr={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x38}}, 0x0) 23:48:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) 23:48:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x20, 0x10, 0x705}, 0x20}}, 0x0) 23:48:07 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0xe, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:07 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) (fail_nth: 24) 23:48:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) 23:48:07 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 25) 23:48:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) [ 105.088354][ T4993] syz-executor.0 (4993) used greatest stack depth: 9496 bytes left 23:48:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @hsr={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}]}}}]}, 0x38}}, 0x0) [ 105.142698][ T5013] FAULT_INJECTION: forcing a failure. [ 105.142698][ T5013] name failslab, interval 1, probability 0, space 0, times 0 [ 105.155441][ T5013] CPU: 0 PID: 5013 Comm: syz-executor.0 Not tainted 5.16.0-rc2-syzkaller #0 [ 105.164119][ T5013] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 105.174170][ T5013] Call Trace: [ 105.177455][ T5013] [ 105.180371][ T5013] dump_stack_lvl+0xd6/0x122 [ 105.185111][ T5013] dump_stack+0x11/0x1b [ 105.189336][ T5013] should_fail+0x23c/0x250 [ 105.193773][ T5013] ? radix_tree_node_alloc+0x142/0x200 [ 105.199232][ T5013] __should_failslab+0x81/0x90 [ 105.204000][ T5013] should_failslab+0x5/0x20 [ 105.208481][ T5013] kmem_cache_alloc+0x4f/0x320 [ 105.213234][ T5013] ? radix_tree_node_alloc+0x142/0x200 [ 105.218677][ T5013] radix_tree_node_alloc+0x142/0x200 [ 105.223958][ T5013] idr_get_free+0x22a/0x5d0 [ 105.228511][ T5013] idr_alloc_cyclic+0xf4/0x2f0 [ 105.233360][ T5013] __kernfs_new_node+0xb4/0x340 [ 105.238315][ T5013] ? make_kgid+0x127/0x180 [ 105.242735][ T5013] ? net_ns_get_ownership+0xaa/0xc0 [ 105.248037][ T5013] ? net_namespace+0x20/0x20 [ 105.252625][ T5013] kernfs_create_dir_ns+0x5e/0x140 [ 105.257826][ T5013] sysfs_create_dir_ns+0xa3/0x1a0 [ 105.262863][ T5013] kobject_add_internal+0x456/0x840 [ 105.268061][ T5013] kobject_add+0xd7/0x150 [ 105.272375][ T5013] ? device_add+0x30d/0xf40 [ 105.277494][ T5013] ? get_device_parent+0x1f8/0x310 [ 105.282593][ T5013] device_add+0x31d/0xf40 [ 105.286910][ T5013] ? hrtimer_init+0xfc/0x1d0 [ 105.291501][ T5013] ? netdev_register_kobject+0x5f/0x230 [ 105.297054][ T5013] netdev_register_kobject+0xfd/0x230 [ 105.302523][ T5013] register_netdevice+0xba5/0x10b0 [ 105.307661][ T5013] hsr_dev_finalize+0x2da/0x460 [ 105.312512][ T5013] hsr_newlink+0x40d/0x450 [ 105.316959][ T5013] ? hsr_get_node_list+0x450/0x450 [ 105.322279][ T5013] rtnl_newlink+0xdae/0x13b0 [ 105.327042][ T5013] ? rtnl_setlink+0x2a0/0x2a0 [ 105.331778][ T5013] rtnetlink_rcv_msg+0x745/0x7e0 [ 105.336791][ T5013] ? ___cache_free+0x46/0x300 [ 105.341549][ T5013] ? delay_tsc+0x96/0xe0 [ 105.345955][ T5013] ? kmem_cache_free+0x65/0x110 [ 105.351237][ T5013] ? __kfree_skb+0xfe/0x150 [ 105.356002][ T5013] ? consume_skb+0x48/0x160 [ 105.360499][ T5013] ? nlmon_xmit+0x5f/0x70 [ 105.364907][ T5013] ? __this_cpu_preempt_check+0x18/0x20 [ 105.370439][ T5013] ? __local_bh_enable_ip+0x4d/0x70 [ 105.375697][ T5013] ? local_bh_enable+0x1b/0x20 [ 105.380457][ T5013] ? __dev_queue_xmit+0x597/0xf70 [ 105.385588][ T5013] ? __skb_clone+0x2db/0x300 [ 105.390186][ T5013] ? __rcu_read_unlock+0x5c/0x290 [ 105.395213][ T5013] netlink_rcv_skb+0x14e/0x250 [ 105.400051][ T5013] ? rtnetlink_bind+0x60/0x60 [ 105.404811][ T5013] rtnetlink_rcv+0x18/0x20 [ 105.409227][ T5013] netlink_unicast+0x5fc/0x6c0 [ 105.414021][ T5013] netlink_sendmsg+0x6e1/0x7d0 [ 105.418807][ T5013] ? netlink_getsockopt+0x720/0x720 [ 105.424134][ T5013] ____sys_sendmsg+0x39a/0x510 [ 105.428882][ T5013] __sys_sendmsg+0x195/0x230 [ 105.433478][ T5013] __x64_sys_sendmsg+0x42/0x50 [ 105.438302][ T5013] do_syscall_64+0x44/0xd0 [ 105.442743][ T5013] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 105.448662][ T5013] RIP: 0033:0x7f63a3dfbae9 [ 105.453060][ T5013] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 105.472674][ T5013] RSP: 002b:00007f63a1b72188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 105.481071][ T5013] RAX: ffffffffffffffda RBX: 00007f63a3f0ef60 RCX: 00007f63a3dfbae9 [ 105.489087][ T5013] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 105.497067][ T5013] RBP: 00007f63a1b721d0 R08: 0000000000000000 R09: 0000000000000000 [ 105.505031][ T5013] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 105.513012][ T5013] R13: 00007ffcec81edaf R14: 00007f63a1b72300 R15: 0000000000022000 [ 105.520994][ T5013] [ 105.537292][ T5006] FAULT_INJECTION: forcing a failure. [ 105.537292][ T5006] name failslab, interval 1, probability 0, space 0, times 0 [ 105.549975][ T5006] CPU: 1 PID: 5006 Comm: syz-executor.3 Not tainted 5.16.0-rc2-syzkaller #0 [ 105.558741][ T5006] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 105.568978][ T5006] Call Trace: [ 105.572277][ T5006] [ 105.575223][ T5006] dump_stack_lvl+0xd6/0x122 [ 105.579823][ T5006] dump_stack+0x11/0x1b [ 105.583968][ T5006] should_fail+0x23c/0x250 [ 105.588379][ T5006] ? radix_tree_node_alloc+0x142/0x200 [ 105.593926][ T5006] __should_failslab+0x81/0x90 [ 105.598678][ T5006] should_failslab+0x5/0x20 [ 105.603481][ T5006] kmem_cache_alloc+0x4f/0x320 [ 105.608229][ T5006] radix_tree_node_alloc+0x142/0x200 [ 105.613572][ T5006] idr_get_free+0x22a/0x5d0 [ 105.618088][ T5006] idr_alloc_cyclic+0xf4/0x2f0 [ 105.622934][ T5006] __kernfs_new_node+0xb4/0x340 [ 105.627929][ T5006] ? make_kgid+0x127/0x180 [ 105.632336][ T5006] ? net_ns_get_ownership+0xaa/0xc0 [ 105.637544][ T5006] ? net_namespace+0x20/0x20 [ 105.642145][ T5006] kernfs_create_dir_ns+0x5e/0x140 [ 105.647287][ T5006] sysfs_create_dir_ns+0xa3/0x1a0 [ 105.652296][ T5006] kobject_add_internal+0x456/0x840 [ 105.657655][ T5006] kobject_add+0xd7/0x150 [ 105.661972][ T5006] ? device_add+0x30d/0xf40 [ 105.666521][ T5006] ? get_device_parent+0x1f8/0x310 [ 105.671648][ T5006] device_add+0x31d/0xf40 [ 105.675974][ T5006] ? hrtimer_init+0xfc/0x1d0 [ 105.680565][ T5006] ? netdev_register_kobject+0x5f/0x230 [ 105.686200][ T5006] netdev_register_kobject+0xfd/0x230 [ 105.691621][ T5006] register_netdevice+0xba5/0x10b0 [ 105.696947][ T5006] hsr_dev_finalize+0x2da/0x460 [ 105.701814][ T5006] hsr_newlink+0x40d/0x450 [ 105.706248][ T5006] ? hsr_get_node_list+0x450/0x450 [ 105.711347][ T5006] rtnl_newlink+0xdae/0x13b0 [ 105.715947][ T5006] ? rtnl_setlink+0x2a0/0x2a0 [ 105.720714][ T5006] rtnetlink_rcv_msg+0x745/0x7e0 [ 105.725645][ T5006] ? ___cache_free+0x46/0x300 [ 105.730358][ T5006] ? kmem_cache_free+0x65/0x110 [ 105.735200][ T5006] ? __kfree_skb+0xfe/0x150 [ 105.739791][ T5006] ? consume_skb+0x48/0x160 [ 105.744355][ T5006] ? nlmon_xmit+0x5f/0x70 [ 105.748703][ T5006] ? __this_cpu_preempt_check+0x18/0x20 [ 105.754338][ T5006] ? __local_bh_enable_ip+0x4d/0x70 [ 105.759713][ T5006] ? local_bh_enable+0x1b/0x20 [ 105.764458][ T5006] ? __dev_queue_xmit+0x597/0xf70 [ 105.769494][ T5006] ? __skb_clone+0x2db/0x300 [ 105.774090][ T5006] ? __rcu_read_unlock+0x5c/0x290 [ 105.779157][ T5006] netlink_rcv_skb+0x14e/0x250 [ 105.783923][ T5006] ? rtnetlink_bind+0x60/0x60 [ 105.788682][ T5006] rtnetlink_rcv+0x18/0x20 [ 105.793159][ T5006] netlink_unicast+0x5fc/0x6c0 [ 105.797962][ T5006] netlink_sendmsg+0x6e1/0x7d0 [ 105.802751][ T5006] ? netlink_getsockopt+0x720/0x720 [ 105.807938][ T5006] ____sys_sendmsg+0x39a/0x510 [ 105.812710][ T5006] __sys_sendmsg+0x195/0x230 [ 105.817361][ T5006] __x64_sys_sendmsg+0x42/0x50 [ 105.822194][ T5006] do_syscall_64+0x44/0xd0 [ 105.826691][ T5006] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 105.832576][ T5006] RIP: 0033:0x7f229eaecae9 [ 105.836981][ T5006] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 105.856613][ T5006] RSP: 002b:00007f229c863188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 105.865076][ T5006] RAX: ffffffffffffffda RBX: 00007f229ebfff60 RCX: 00007f229eaecae9 [ 105.873031][ T5006] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000005 [ 105.880991][ T5006] RBP: 00007f229c8631d0 R08: 0000000000000000 R09: 0000000000000000 23:48:08 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @hsr={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}]}}}]}, 0x38}}, 0x0) 23:48:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) [ 105.888960][ T5006] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 105.896998][ T5006] R13: 00007ffd9766560f R14: 00007f229c863300 R15: 0000000000022000 [ 105.904956][ T5006] 23:48:08 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0xf, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:08 executing program 1: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r2}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) 23:48:08 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:08 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 26) 23:48:08 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x7, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:08 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @hsr={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}]}}}]}, 0x38}}, 0x0) 23:48:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) [ 106.032107][ T5032] FAULT_INJECTION: forcing a failure. [ 106.032107][ T5032] name failslab, interval 1, probability 0, space 0, times 0 [ 106.044838][ T5032] CPU: 1 PID: 5032 Comm: syz-executor.0 Not tainted 5.16.0-rc2-syzkaller #0 [ 106.053572][ T5032] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 106.063767][ T5032] Call Trace: [ 106.067044][ T5032] [ 106.069973][ T5032] dump_stack_lvl+0xd6/0x122 [ 106.074564][ T5032] dump_stack+0x11/0x1b [ 106.078799][ T5032] should_fail+0x23c/0x250 [ 106.083212][ T5032] ? __kernfs_new_node+0x6a/0x340 [ 106.088238][ T5032] __should_failslab+0x81/0x90 [ 106.093060][ T5032] should_failslab+0x5/0x20 [ 106.097550][ T5032] kmem_cache_alloc+0x4f/0x320 [ 106.102424][ T5032] __kernfs_new_node+0x6a/0x340 [ 106.107282][ T5032] ? kernfs_activate+0x2b9/0x2d0 [ 106.112252][ T5032] ? kernfs_add_one+0x356/0x3c0 [ 106.117141][ T5032] kernfs_new_node+0x5b/0xd0 [ 106.121781][ T5032] __kernfs_create_file+0x45/0x1a0 [ 106.126892][ T5032] ? dev_attr_show+0x90/0x90 [ 106.131533][ T5032] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 106.136958][ T5032] sysfs_create_file_ns+0x98/0xd0 [ 106.142019][ T5032] device_create_file+0xa7/0x110 [ 106.146986][ T5032] device_add+0x38e/0xf40 [ 106.151307][ T5032] ? hrtimer_init+0xfc/0x1d0 [ 106.155915][ T5032] ? netdev_register_kobject+0x5f/0x230 [ 106.161455][ T5032] netdev_register_kobject+0xfd/0x230 [ 106.166823][ T5032] register_netdevice+0xba5/0x10b0 [ 106.171968][ T5032] hsr_dev_finalize+0x2da/0x460 [ 106.176813][ T5032] hsr_newlink+0x40d/0x450 [ 106.181263][ T5032] ? hsr_get_node_list+0x450/0x450 [ 106.186389][ T5032] rtnl_newlink+0xdae/0x13b0 [ 106.191063][ T5032] ? __rcu_read_unlock+0x5c/0x290 [ 106.196087][ T5032] ? rtnl_setlink+0x2a0/0x2a0 [ 106.200747][ T5032] rtnetlink_rcv_msg+0x745/0x7e0 [ 106.205668][ T5032] ? ___cache_free+0x46/0x300 [ 106.210328][ T5032] ? kmem_cache_free+0x65/0x110 [ 106.215203][ T5032] ? __kfree_skb+0xfe/0x150 [ 106.219820][ T5032] ? consume_skb+0x48/0x160 [ 106.224304][ T5032] ? nlmon_xmit+0x5f/0x70 [ 106.228635][ T5032] ? __this_cpu_preempt_check+0x18/0x20 [ 106.234162][ T5032] ? __local_bh_enable_ip+0x4d/0x70 [ 106.239385][ T5032] ? local_bh_enable+0x1b/0x20 [ 106.244131][ T5032] ? __dev_queue_xmit+0x597/0xf70 [ 106.249149][ T5032] ? __skb_clone+0x2db/0x300 [ 106.253760][ T5032] ? __rcu_read_unlock+0x5c/0x290 [ 106.258778][ T5032] netlink_rcv_skb+0x14e/0x250 [ 106.263558][ T5032] ? rtnetlink_bind+0x60/0x60 [ 106.268299][ T5032] rtnetlink_rcv+0x18/0x20 [ 106.272699][ T5032] netlink_unicast+0x5fc/0x6c0 [ 106.277447][ T5032] netlink_sendmsg+0x6e1/0x7d0 [ 106.282201][ T5032] ? netlink_getsockopt+0x720/0x720 [ 106.287394][ T5032] ____sys_sendmsg+0x39a/0x510 [ 106.292183][ T5032] __sys_sendmsg+0x195/0x230 [ 106.296862][ T5032] __x64_sys_sendmsg+0x42/0x50 [ 106.301613][ T5032] do_syscall_64+0x44/0xd0 [ 106.306012][ T5032] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 106.311900][ T5032] RIP: 0033:0x7f63a3dfbae9 [ 106.316305][ T5032] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 106.335904][ T5032] RSP: 002b:00007f63a1b72188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 106.344298][ T5032] RAX: ffffffffffffffda RBX: 00007f63a3f0ef60 RCX: 00007f63a3dfbae9 [ 106.352251][ T5032] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 106.360211][ T5032] RBP: 00007f63a1b721d0 R08: 0000000000000000 R09: 0000000000000000 [ 106.368163][ T5032] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 23:48:08 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 27) [ 106.376114][ T5032] R13: 00007ffcec81edaf R14: 00007f63a1b72300 R15: 0000000000022000 [ 106.384171][ T5032] 23:48:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:08 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x10, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:08 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8}]}}}]}, 0x40}}, 0x0) 23:48:09 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) [ 106.437630][ T5039] FAULT_INJECTION: forcing a failure. [ 106.437630][ T5039] name failslab, interval 1, probability 0, space 0, times 0 [ 106.450466][ T5039] CPU: 1 PID: 5039 Comm: syz-executor.0 Not tainted 5.16.0-rc2-syzkaller #0 [ 106.459146][ T5039] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 106.469313][ T5039] Call Trace: [ 106.472591][ T5039] [ 106.475516][ T5039] dump_stack_lvl+0xd6/0x122 [ 106.480132][ T5039] dump_stack+0x11/0x1b 23:48:09 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0xf, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) [ 106.484292][ T5039] should_fail+0x23c/0x250 [ 106.488852][ T5039] ? __kernfs_new_node+0x6a/0x340 [ 106.493887][ T5039] __should_failslab+0x81/0x90 [ 106.498653][ T5039] should_failslab+0x5/0x20 [ 106.503174][ T5039] kmem_cache_alloc+0x4f/0x320 [ 106.508012][ T5039] __kernfs_new_node+0x6a/0x340 [ 106.512907][ T5039] ? kernfs_add_one+0x356/0x3c0 [ 106.517885][ T5039] ? __kernfs_create_file+0x189/0x1a0 [ 106.523292][ T5039] kernfs_new_node+0x5b/0xd0 [ 106.527987][ T5039] kernfs_create_link+0x68/0x120 [ 106.532913][ T5039] sysfs_do_create_link_sd+0x6b/0xf0 [ 106.538181][ T5039] sysfs_create_link+0x4d/0x60 [ 106.543031][ T5039] device_add+0x42e/0xf40 [ 106.547343][ T5039] ? hrtimer_init+0xfc/0x1d0 [ 106.552003][ T5039] netdev_register_kobject+0xfd/0x230 [ 106.557355][ T5039] register_netdevice+0xba5/0x10b0 [ 106.562510][ T5039] hsr_dev_finalize+0x2da/0x460 [ 106.567345][ T5039] hsr_newlink+0x40d/0x450 [ 106.571796][ T5039] ? hsr_get_node_list+0x450/0x450 [ 106.576945][ T5039] rtnl_newlink+0xdae/0x13b0 [ 106.581556][ T5039] ? __rcu_read_unlock+0x5c/0x290 [ 106.586590][ T5039] ? rtnl_setlink+0x2a0/0x2a0 [ 106.591246][ T5039] rtnetlink_rcv_msg+0x745/0x7e0 [ 106.596177][ T5039] ? ___cache_free+0x46/0x300 [ 106.600835][ T5039] ? kmem_cache_free+0x65/0x110 [ 106.605682][ T5039] ? __kfree_skb+0xfe/0x150 [ 106.610231][ T5039] ? consume_skb+0x48/0x160 [ 106.614807][ T5039] ? nlmon_xmit+0x5f/0x70 [ 106.619176][ T5039] ? __this_cpu_preempt_check+0x18/0x20 [ 106.624703][ T5039] ? __local_bh_enable_ip+0x4d/0x70 [ 106.629883][ T5039] ? local_bh_enable+0x1b/0x20 [ 106.634625][ T5039] ? __dev_queue_xmit+0x597/0xf70 [ 106.639710][ T5039] ? __skb_clone+0x2db/0x300 [ 106.644283][ T5039] ? __rcu_read_unlock+0x5c/0x290 [ 106.649388][ T5039] netlink_rcv_skb+0x14e/0x250 [ 106.654211][ T5039] ? rtnetlink_bind+0x60/0x60 [ 106.658885][ T5039] rtnetlink_rcv+0x18/0x20 [ 106.663290][ T5039] netlink_unicast+0x5fc/0x6c0 [ 106.668102][ T5039] netlink_sendmsg+0x6e1/0x7d0 [ 106.672936][ T5039] ? netlink_getsockopt+0x720/0x720 [ 106.678209][ T5039] ____sys_sendmsg+0x39a/0x510 [ 106.683013][ T5039] __sys_sendmsg+0x195/0x230 [ 106.687588][ T5039] __x64_sys_sendmsg+0x42/0x50 [ 106.692828][ T5039] do_syscall_64+0x44/0xd0 [ 106.697225][ T5039] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 106.703102][ T5039] RIP: 0033:0x7f63a3dfbae9 [ 106.707510][ T5039] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 106.727129][ T5039] RSP: 002b:00007f63a1b72188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 23:48:09 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 28) [ 106.735574][ T5039] RAX: ffffffffffffffda RBX: 00007f63a3f0ef60 RCX: 00007f63a3dfbae9 [ 106.743554][ T5039] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 106.751615][ T5039] RBP: 00007f63a1b721d0 R08: 0000000000000000 R09: 0000000000000000 [ 106.759612][ T5039] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 106.767589][ T5039] R13: 00007ffcec81edaf R14: 00007f63a1b72300 R15: 0000000000022000 [ 106.775548][ T5039] 23:48:09 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x6, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:09 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8}]}}}]}, 0x40}}, 0x0) [ 106.820839][ T5051] FAULT_INJECTION: forcing a failure. [ 106.820839][ T5051] name failslab, interval 1, probability 0, space 0, times 0 [ 106.833510][ T5051] CPU: 1 PID: 5051 Comm: syz-executor.0 Not tainted 5.16.0-rc2-syzkaller #0 [ 106.842187][ T5051] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 106.852242][ T5051] Call Trace: [ 106.855505][ T5051] [ 106.858426][ T5051] dump_stack_lvl+0xd6/0x122 [ 106.863000][ T5051] dump_stack+0x11/0x1b [ 106.867253][ T5051] should_fail+0x23c/0x250 [ 106.871679][ T5051] ? __kernfs_new_node+0x41/0x340 [ 106.876717][ T5051] __should_failslab+0x81/0x90 [ 106.881477][ T5051] should_failslab+0x5/0x20 [ 106.885964][ T5051] __kmalloc_track_caller+0x6d/0x370 [ 106.891287][ T5051] kstrdup_const+0x51/0x90 [ 106.895789][ T5051] __kernfs_new_node+0x41/0x340 [ 106.900642][ T5051] ? up_write+0x25/0xc0 [ 106.904813][ T5051] kernfs_new_node+0x5b/0xd0 [ 106.909461][ T5051] kernfs_create_link+0x68/0x120 [ 106.914407][ T5051] sysfs_do_create_link_sd+0x6b/0xf0 [ 106.919693][ T5051] sysfs_create_link+0x4d/0x60 [ 106.924511][ T5051] device_add+0x586/0xf40 [ 106.928828][ T5051] ? hrtimer_init+0xfc/0x1d0 [ 106.933426][ T5051] netdev_register_kobject+0xfd/0x230 [ 106.938953][ T5051] register_netdevice+0xba5/0x10b0 [ 106.944106][ T5051] hsr_dev_finalize+0x2da/0x460 [ 106.949053][ T5051] hsr_newlink+0x40d/0x450 [ 106.953456][ T5051] ? hsr_get_node_list+0x450/0x450 [ 106.958687][ T5051] rtnl_newlink+0xdae/0x13b0 [ 106.963282][ T5051] ? __rcu_read_unlock+0x5c/0x290 [ 106.968367][ T5051] ? rtnl_setlink+0x2a0/0x2a0 [ 106.973106][ T5051] rtnetlink_rcv_msg+0x745/0x7e0 [ 106.978151][ T5051] ? ___cache_free+0x46/0x300 [ 106.982888][ T5051] ? kmem_cache_free+0x65/0x110 [ 106.987726][ T5051] ? __kfree_skb+0xfe/0x150 [ 106.992222][ T5051] ? consume_skb+0x48/0x160 [ 106.996794][ T5051] ? nlmon_xmit+0x5f/0x70 [ 107.001112][ T5051] ? __this_cpu_preempt_check+0x18/0x20 [ 107.006720][ T5051] ? __local_bh_enable_ip+0x4d/0x70 [ 107.011969][ T5051] ? local_bh_enable+0x1b/0x20 [ 107.016861][ T5051] ? __dev_queue_xmit+0x597/0xf70 [ 107.022016][ T5051] ? __skb_clone+0x2db/0x300 [ 107.026600][ T5051] ? __rcu_read_unlock+0x5c/0x290 [ 107.031609][ T5051] netlink_rcv_skb+0x14e/0x250 [ 107.036365][ T5051] ? rtnetlink_bind+0x60/0x60 [ 107.041052][ T5051] rtnetlink_rcv+0x18/0x20 [ 107.045455][ T5051] netlink_unicast+0x5fc/0x6c0 [ 107.050228][ T5051] netlink_sendmsg+0x6e1/0x7d0 [ 107.054997][ T5051] ? netlink_getsockopt+0x720/0x720 [ 107.060220][ T5051] ____sys_sendmsg+0x39a/0x510 [ 107.065106][ T5051] __sys_sendmsg+0x195/0x230 [ 107.069745][ T5051] __x64_sys_sendmsg+0x42/0x50 [ 107.074520][ T5051] do_syscall_64+0x44/0xd0 [ 107.078915][ T5051] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 107.084789][ T5051] RIP: 0033:0x7f63a3dfbae9 [ 107.089182][ T5051] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 107.108837][ T5051] RSP: 002b:00007f63a1b72188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 23:48:09 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 29) 23:48:09 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8}]}}}]}, 0x40}}, 0x0) [ 107.117502][ T5051] RAX: ffffffffffffffda RBX: 00007f63a3f0ef60 RCX: 00007f63a3dfbae9 [ 107.125453][ T5051] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 107.133403][ T5051] RBP: 00007f63a1b721d0 R08: 0000000000000000 R09: 0000000000000000 [ 107.141356][ T5051] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 107.149388][ T5051] R13: 00007ffcec81edaf R14: 00007f63a1b72300 R15: 0000000000022000 [ 107.157363][ T5051] 23:48:09 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x11, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) [ 107.197186][ T5058] FAULT_INJECTION: forcing a failure. [ 107.197186][ T5058] name failslab, interval 1, probability 0, space 0, times 0 [ 107.209826][ T5058] CPU: 1 PID: 5058 Comm: syz-executor.0 Not tainted 5.16.0-rc2-syzkaller #0 [ 107.218503][ T5058] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 107.228792][ T5058] Call Trace: [ 107.232052][ T5058] [ 107.234987][ T5058] dump_stack_lvl+0xd6/0x122 [ 107.239561][ T5058] dump_stack+0x11/0x1b [ 107.243770][ T5058] should_fail+0x23c/0x250 [ 107.248257][ T5058] ? __kernfs_new_node+0x6a/0x340 [ 107.253269][ T5058] __should_failslab+0x81/0x90 [ 107.258054][ T5058] should_failslab+0x5/0x20 [ 107.262619][ T5058] kmem_cache_alloc+0x4f/0x320 [ 107.267538][ T5058] __kernfs_new_node+0x6a/0x340 [ 107.272389][ T5058] ? up_write+0x25/0xc0 [ 107.276634][ T5058] kernfs_new_node+0x5b/0xd0 [ 107.281232][ T5058] kernfs_create_link+0x68/0x120 [ 107.286169][ T5058] sysfs_do_create_link_sd+0x6b/0xf0 [ 107.291451][ T5058] sysfs_create_link+0x4d/0x60 [ 107.296269][ T5058] device_add+0x586/0xf40 [ 107.300581][ T5058] ? hrtimer_init+0xfc/0x1d0 [ 107.305239][ T5058] netdev_register_kobject+0xfd/0x230 [ 107.310716][ T5058] register_netdevice+0xba5/0x10b0 [ 107.315814][ T5058] hsr_dev_finalize+0x2da/0x460 [ 107.320659][ T5058] hsr_newlink+0x40d/0x450 [ 107.325073][ T5058] ? hsr_get_node_list+0x450/0x450 [ 107.330253][ T5058] rtnl_newlink+0xdae/0x13b0 [ 107.334839][ T5058] ? __rcu_read_unlock+0x5c/0x290 [ 107.339845][ T5058] ? rtnl_setlink+0x2a0/0x2a0 [ 107.344601][ T5058] rtnetlink_rcv_msg+0x745/0x7e0 [ 107.349539][ T5058] ? ___cache_free+0x46/0x300 [ 107.354391][ T5058] ? kmem_cache_free+0x65/0x110 [ 107.359238][ T5058] ? __kfree_skb+0xfe/0x150 [ 107.363805][ T5058] ? consume_skb+0x48/0x160 [ 107.368362][ T5058] ? nlmon_xmit+0x5f/0x70 [ 107.372753][ T5058] ? __this_cpu_preempt_check+0x18/0x20 [ 107.378315][ T5058] ? __local_bh_enable_ip+0x4d/0x70 [ 107.383507][ T5058] ? local_bh_enable+0x1b/0x20 [ 107.388279][ T5058] ? __dev_queue_xmit+0x597/0xf70 [ 107.393295][ T5058] ? __skb_clone+0x2db/0x300 [ 107.397867][ T5058] ? __rcu_read_unlock+0x5c/0x290 [ 107.402878][ T5058] netlink_rcv_skb+0x14e/0x250 [ 107.407710][ T5058] ? rtnetlink_bind+0x60/0x60 [ 107.412461][ T5058] rtnetlink_rcv+0x18/0x20 [ 107.416856][ T5058] netlink_unicast+0x5fc/0x6c0 [ 107.421604][ T5058] netlink_sendmsg+0x6e1/0x7d0 [ 107.426354][ T5058] ? netlink_getsockopt+0x720/0x720 [ 107.431531][ T5058] ____sys_sendmsg+0x39a/0x510 [ 107.436297][ T5058] __sys_sendmsg+0x195/0x230 [ 107.440884][ T5058] __x64_sys_sendmsg+0x42/0x50 [ 107.445727][ T5058] do_syscall_64+0x44/0xd0 [ 107.450189][ T5058] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 107.456199][ T5058] RIP: 0033:0x7f63a3dfbae9 [ 107.460608][ T5058] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 107.480489][ T5058] RSP: 002b:00007f63a1b72188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 107.488936][ T5058] RAX: ffffffffffffffda RBX: 00007f63a3f0ef60 RCX: 00007f63a3dfbae9 23:48:10 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0xf, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:10 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 30) [ 107.496886][ T5058] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 107.504870][ T5058] RBP: 00007f63a1b721d0 R08: 0000000000000000 R09: 0000000000000000 [ 107.512989][ T5058] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 107.520949][ T5058] R13: 00007ffcec81edaf R14: 00007f63a1b72300 R15: 0000000000022000 [ 107.528910][ T5058] 23:48:10 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @hsr={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x38}}, 0x0) [ 107.574042][ T5064] FAULT_INJECTION: forcing a failure. [ 107.574042][ T5064] name failslab, interval 1, probability 0, space 0, times 0 [ 107.586703][ T5064] CPU: 1 PID: 5064 Comm: syz-executor.0 Not tainted 5.16.0-rc2-syzkaller #0 [ 107.595378][ T5064] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 107.605500][ T5064] Call Trace: [ 107.608787][ T5064] [ 107.611875][ T5064] dump_stack_lvl+0xd6/0x122 [ 107.616473][ T5064] dump_stack+0x11/0x1b [ 107.620627][ T5064] should_fail+0x23c/0x250 [ 107.625031][ T5064] ? radix_tree_node_alloc+0x142/0x200 [ 107.630478][ T5064] __should_failslab+0x81/0x90 [ 107.635291][ T5064] should_failslab+0x5/0x20 [ 107.639811][ T5064] kmem_cache_alloc+0x4f/0x320 [ 107.644575][ T5064] radix_tree_node_alloc+0x142/0x200 [ 107.649838][ T5064] ? delete_node+0x45c/0x480 [ 107.654530][ T5064] idr_get_free+0x22a/0x5d0 [ 107.659017][ T5064] idr_alloc_cyclic+0xf4/0x2f0 [ 107.663776][ T5064] __kernfs_new_node+0xb4/0x340 [ 107.668647][ T5064] ? up_write+0x25/0xc0 [ 107.672900][ T5064] kernfs_new_node+0x5b/0xd0 [ 107.677472][ T5064] kernfs_create_link+0x68/0x120 [ 107.682446][ T5064] sysfs_do_create_link_sd+0x6b/0xf0 [ 107.687832][ T5064] sysfs_create_link+0x4d/0x60 [ 107.692585][ T5064] device_add+0x586/0xf40 [ 107.696976][ T5064] ? hrtimer_init+0xfc/0x1d0 [ 107.701562][ T5064] netdev_register_kobject+0xfd/0x230 [ 107.706954][ T5064] register_netdevice+0xba5/0x10b0 [ 107.712093][ T5064] hsr_dev_finalize+0x2da/0x460 [ 107.716986][ T5064] hsr_newlink+0x40d/0x450 [ 107.721415][ T5064] ? hsr_get_node_list+0x450/0x450 [ 107.726575][ T5064] rtnl_newlink+0xdae/0x13b0 [ 107.731227][ T5064] ? __rcu_read_unlock+0x5c/0x290 [ 107.736288][ T5064] ? rtnl_setlink+0x2a0/0x2a0 [ 107.741002][ T5064] rtnetlink_rcv_msg+0x745/0x7e0 [ 107.745930][ T5064] ? ___cache_free+0x46/0x300 [ 107.750618][ T5064] ? kmem_cache_free+0x65/0x110 [ 107.755570][ T5064] ? __kfree_skb+0xfe/0x150 [ 107.760151][ T5064] ? consume_skb+0x48/0x160 [ 107.764701][ T5064] ? nlmon_xmit+0x5f/0x70 [ 107.769013][ T5064] ? __this_cpu_preempt_check+0x18/0x20 [ 107.774596][ T5064] ? __local_bh_enable_ip+0x4d/0x70 [ 107.779818][ T5064] ? local_bh_enable+0x1b/0x20 [ 107.784567][ T5064] ? __dev_queue_xmit+0x597/0xf70 [ 107.789632][ T5064] ? __skb_clone+0x2db/0x300 [ 107.794264][ T5064] ? __rcu_read_unlock+0x5c/0x290 [ 107.799341][ T5064] netlink_rcv_skb+0x14e/0x250 [ 107.804092][ T5064] ? rtnetlink_bind+0x60/0x60 [ 107.808767][ T5064] rtnetlink_rcv+0x18/0x20 [ 107.813181][ T5064] netlink_unicast+0x5fc/0x6c0 [ 107.817943][ T5064] netlink_sendmsg+0x6e1/0x7d0 [ 107.822700][ T5064] ? netlink_getsockopt+0x720/0x720 [ 107.827886][ T5064] ____sys_sendmsg+0x39a/0x510 [ 107.832741][ T5064] __sys_sendmsg+0x195/0x230 [ 107.837332][ T5064] __x64_sys_sendmsg+0x42/0x50 [ 107.842081][ T5064] do_syscall_64+0x44/0xd0 [ 107.846485][ T5064] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 107.852394][ T5064] RIP: 0033:0x7f63a3dfbae9 [ 107.856796][ T5064] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 107.876432][ T5064] RSP: 002b:00007f63a1b72188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 107.885099][ T5064] RAX: ffffffffffffffda RBX: 00007f63a3f0ef60 RCX: 00007f63a3dfbae9 [ 107.893120][ T5064] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 107.901074][ T5064] RBP: 00007f63a1b721d0 R08: 0000000000000000 R09: 0000000000000000 [ 107.909040][ T5064] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 107.917027][ T5064] R13: 00007ffcec81edaf R14: 00007f63a1b72300 R15: 0000000000022000 23:48:10 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @hsr={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x38}}, 0x0) [ 107.924996][ T5064] 23:48:10 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:10 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:10 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @hsr={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x38}}, 0x0) 23:48:10 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x12, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:10 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:10 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 31) 23:48:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r4 = dup(0xffffffffffffffff) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) 23:48:10 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) [ 108.089091][ T5085] FAULT_INJECTION: forcing a failure. [ 108.089091][ T5085] name failslab, interval 1, probability 0, space 0, times 0 [ 108.101875][ T5085] CPU: 0 PID: 5085 Comm: syz-executor.0 Not tainted 5.16.0-rc2-syzkaller #0 [ 108.110561][ T5085] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 108.120614][ T5085] Call Trace: [ 108.123875][ T5085] [ 108.126831][ T5085] dump_stack_lvl+0xd6/0x122 [ 108.131533][ T5085] dump_stack+0x11/0x1b [ 108.135671][ T5085] should_fail+0x23c/0x250 [ 108.140136][ T5085] ? __kernfs_new_node+0x6a/0x340 [ 108.145144][ T5085] __should_failslab+0x81/0x90 [ 108.149908][ T5085] should_failslab+0x5/0x20 [ 108.154435][ T5085] kmem_cache_alloc+0x4f/0x320 [ 108.159194][ T5085] ? __down_write_common+0x42/0x860 [ 108.164378][ T5085] __kernfs_new_node+0x6a/0x340 [ 108.169244][ T5085] ? up_write+0x25/0xc0 [ 108.173587][ T5085] kernfs_new_node+0x5b/0xd0 [ 108.178177][ T5085] __kernfs_create_file+0x45/0x1a0 [ 108.183273][ T5085] ? dev_attr_show+0x90/0x90 [ 108.187889][ T5085] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 108.193340][ T5085] internal_create_group+0x2dd/0x840 [ 108.198611][ T5085] sysfs_create_groups+0x3d/0xf0 [ 108.203558][ T5085] device_add+0x606/0xf40 [ 108.207897][ T5085] ? hrtimer_init+0xfc/0x1d0 [ 108.212477][ T5085] netdev_register_kobject+0xfd/0x230 [ 108.218076][ T5085] register_netdevice+0xba5/0x10b0 [ 108.223237][ T5085] hsr_dev_finalize+0x2da/0x460 [ 108.228085][ T5085] hsr_newlink+0x40d/0x450 [ 108.232486][ T5085] ? hsr_get_node_list+0x450/0x450 [ 108.237584][ T5085] rtnl_newlink+0xdae/0x13b0 [ 108.242161][ T5085] ? rtnl_setlink+0x2a0/0x2a0 [ 108.246845][ T5085] rtnetlink_rcv_msg+0x745/0x7e0 [ 108.251766][ T5085] ? ___cache_free+0x46/0x300 [ 108.256422][ T5085] ? kmem_cache_free+0x65/0x110 [ 108.261310][ T5085] ? __kfree_skb+0xfe/0x150 [ 108.265902][ T5085] ? consume_skb+0x48/0x160 [ 108.270445][ T5085] ? nlmon_xmit+0x5f/0x70 [ 108.274799][ T5085] ? __this_cpu_preempt_check+0x18/0x20 [ 108.280393][ T5085] ? __local_bh_enable_ip+0x4d/0x70 [ 108.285660][ T5085] ? local_bh_enable+0x1b/0x20 [ 108.290507][ T5085] ? __dev_queue_xmit+0x597/0xf70 [ 108.295588][ T5085] ? __skb_clone+0x2db/0x300 [ 108.300173][ T5085] ? __rcu_read_unlock+0x5c/0x290 [ 108.305198][ T5085] netlink_rcv_skb+0x14e/0x250 [ 108.309994][ T5085] ? rtnetlink_bind+0x60/0x60 [ 108.314692][ T5085] rtnetlink_rcv+0x18/0x20 [ 108.319110][ T5085] netlink_unicast+0x5fc/0x6c0 [ 108.323877][ T5085] netlink_sendmsg+0x6e1/0x7d0 [ 108.328696][ T5085] ? netlink_getsockopt+0x720/0x720 [ 108.333935][ T5085] ____sys_sendmsg+0x39a/0x510 [ 108.338699][ T5085] __sys_sendmsg+0x195/0x230 [ 108.343503][ T5085] __x64_sys_sendmsg+0x42/0x50 [ 108.348345][ T5085] do_syscall_64+0x44/0xd0 [ 108.352872][ T5085] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 108.358751][ T5085] RIP: 0033:0x7f63a3dfbae9 [ 108.363178][ T5085] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 23:48:11 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 32) 23:48:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 1) [ 108.382811][ T5085] RSP: 002b:00007f63a1b72188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 108.391251][ T5085] RAX: ffffffffffffffda RBX: 00007f63a3f0ef60 RCX: 00007f63a3dfbae9 [ 108.399284][ T5085] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 108.407326][ T5085] RBP: 00007f63a1b721d0 R08: 0000000000000000 R09: 0000000000000000 [ 108.415291][ T5085] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 108.423243][ T5085] R13: 00007ffcec81edaf R14: 00007f63a1b72300 R15: 0000000000022000 [ 108.431291][ T5085] [ 108.482515][ T5093] FAULT_INJECTION: forcing a failure. [ 108.482515][ T5093] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 108.495679][ T5093] CPU: 1 PID: 5093 Comm: syz-executor.5 Not tainted 5.16.0-rc2-syzkaller #0 [ 108.501084][ T5099] FAULT_INJECTION: forcing a failure. [ 108.501084][ T5099] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 108.504397][ T5093] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 108.504411][ T5093] Call Trace: [ 108.504417][ T5093] [ 108.504423][ T5093] dump_stack_lvl+0xd6/0x122 [ 108.538417][ T5093] dump_stack+0x11/0x1b [ 108.542584][ T5093] should_fail+0x23c/0x250 [ 108.546983][ T5093] should_fail_usercopy+0x16/0x20 [ 108.552100][ T5093] _copy_from_user+0x1c/0xd0 [ 108.556686][ T5093] sendmsg_copy_msghdr+0x60/0x2a0 [ 108.561710][ T5093] __sys_sendmsg+0x166/0x230 [ 108.566362][ T5093] __x64_sys_sendmsg+0x42/0x50 [ 108.571142][ T5093] do_syscall_64+0x44/0xd0 [ 108.575586][ T5093] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 108.581476][ T5093] RIP: 0033:0x7f77265f3ae9 [ 108.585877][ T5093] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 108.605468][ T5093] RSP: 002b:00007f772436a188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 108.613886][ T5093] RAX: ffffffffffffffda RBX: 00007f7726706f60 RCX: 00007f77265f3ae9 [ 108.621845][ T5093] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 23:48:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 1) [ 108.629803][ T5093] RBP: 00007f772436a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 108.637757][ T5093] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 108.645709][ T5093] R13: 00007fff989ea7df R14: 00007f772436a300 R15: 0000000000022000 [ 108.653713][ T5093] [ 108.656714][ T5099] CPU: 0 PID: 5099 Comm: syz-executor.1 Not tainted 5.16.0-rc2-syzkaller #0 [ 108.665392][ T5099] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 108.675482][ T5099] Call Trace: [ 108.678835][ T5099] [ 108.681761][ T5099] dump_stack_lvl+0xd6/0x122 [ 108.686355][ T5099] dump_stack+0x11/0x1b [ 108.690513][ T5099] should_fail+0x23c/0x250 [ 108.694973][ T5099] should_fail_usercopy+0x16/0x20 [ 108.700101][ T5099] _copy_from_user+0x1c/0xd0 [ 108.704717][ T5099] sendmsg_copy_msghdr+0x60/0x2a0 [ 108.709791][ T5099] __sys_sendmsg+0x166/0x230 [ 108.714448][ T5099] __x64_sys_sendmsg+0x42/0x50 [ 108.719279][ T5099] do_syscall_64+0x44/0xd0 [ 108.723686][ T5099] entry_SYSCALL_64_after_hwframe+0x44/0xae 23:48:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 2) [ 108.729589][ T5099] RIP: 0033:0x7f0c576cbae9 [ 108.733985][ T5099] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 108.753595][ T5099] RSP: 002b:00007f0c55442188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 108.762101][ T5099] RAX: ffffffffffffffda RBX: 00007f0c577def60 RCX: 00007f0c576cbae9 [ 108.770072][ T5099] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 108.778026][ T5099] RBP: 00007f0c554421d0 R08: 0000000000000000 R09: 0000000000000000 [ 108.786019][ T5099] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 108.787616][ T5101] FAULT_INJECTION: forcing a failure. [ 108.787616][ T5101] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 108.794013][ T5099] R13: 00007fff6eee1fff R14: 00007f0c55442300 R15: 0000000000022000 [ 108.794032][ T5099] [ 108.798442][ T5096] FAULT_INJECTION: forcing a failure. [ 108.798442][ T5096] name failslab, interval 1, probability 0, space 0, times 0 [ 108.807293][ T5101] CPU: 1 PID: 5101 Comm: syz-executor.5 Not tainted 5.16.0-rc2-syzkaller #0 [ 108.839441][ T5101] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 108.849479][ T5101] Call Trace: [ 108.852823][ T5101] [ 108.855735][ T5101] dump_stack_lvl+0xd6/0x122 [ 108.860441][ T5101] dump_stack+0x11/0x1b [ 108.864595][ T5101] should_fail+0x23c/0x250 [ 108.868998][ T5101] should_fail_usercopy+0x16/0x20 [ 108.874007][ T5101] _copy_from_user+0x1c/0xd0 [ 108.878585][ T5101] iovec_from_user+0xc4/0x2e0 [ 108.883313][ T5101] __import_iovec+0x57/0x2d0 [ 108.887889][ T5101] import_iovec+0xb8/0xd0 [ 108.892309][ T5101] sendmsg_copy_msghdr+0x275/0x2a0 [ 108.897482][ T5101] __sys_sendmsg+0x166/0x230 [ 108.902097][ T5101] __x64_sys_sendmsg+0x42/0x50 [ 108.906878][ T5101] do_syscall_64+0x44/0xd0 [ 108.911281][ T5101] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 108.917169][ T5101] RIP: 0033:0x7f77265f3ae9 [ 108.921567][ T5101] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 108.941154][ T5101] RSP: 002b:00007f772436a188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 108.949698][ T5101] RAX: ffffffffffffffda RBX: 00007f7726706f60 RCX: 00007f77265f3ae9 [ 108.957647][ T5101] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 108.965597][ T5101] RBP: 00007f772436a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 108.973633][ T5101] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 108.981755][ T5101] R13: 00007fff989ea7df R14: 00007f772436a300 R15: 0000000000022000 [ 108.989795][ T5101] [ 108.992847][ T5096] CPU: 0 PID: 5096 Comm: syz-executor.0 Not tainted 5.16.0-rc2-syzkaller #0 [ 109.001519][ T5096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 109.011570][ T5096] Call Trace: [ 109.014842][ T5096] [ 109.017782][ T5096] dump_stack_lvl+0xd6/0x122 [ 109.022376][ T5096] dump_stack+0x11/0x1b [ 109.026555][ T5096] should_fail+0x23c/0x250 [ 109.030990][ T5096] ? __kernfs_new_node+0x6a/0x340 [ 109.036018][ T5096] __should_failslab+0x81/0x90 [ 109.040798][ T5096] should_failslab+0x5/0x20 [ 109.045379][ T5096] kmem_cache_alloc+0x4f/0x320 [ 109.050146][ T5096] ? __down_write_common+0x42/0x860 [ 109.055399][ T5096] __kernfs_new_node+0x6a/0x340 [ 109.060630][ T5096] ? up_write+0x25/0xc0 [ 109.064768][ T5096] kernfs_new_node+0x5b/0xd0 [ 109.069410][ T5096] __kernfs_create_file+0x45/0x1a0 [ 109.074509][ T5096] ? dev_attr_show+0x90/0x90 [ 109.079082][ T5096] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 109.084440][ T5096] internal_create_group+0x2dd/0x840 [ 109.089802][ T5096] sysfs_create_groups+0x3d/0xf0 [ 109.094717][ T5096] device_add+0x606/0xf40 [ 109.099031][ T5096] ? hrtimer_init+0xfc/0x1d0 [ 109.103682][ T5096] netdev_register_kobject+0xfd/0x230 [ 109.109122][ T5096] register_netdevice+0xba5/0x10b0 [ 109.114261][ T5096] hsr_dev_finalize+0x2da/0x460 [ 109.119096][ T5096] hsr_newlink+0x40d/0x450 [ 109.123511][ T5096] ? hsr_get_node_list+0x450/0x450 [ 109.128636][ T5096] rtnl_newlink+0xdae/0x13b0 [ 109.133249][ T5096] ? __rcu_read_unlock+0x5c/0x290 [ 109.138317][ T5096] ? rtnl_setlink+0x2a0/0x2a0 [ 109.142981][ T5096] rtnetlink_rcv_msg+0x745/0x7e0 [ 109.147961][ T5096] ? ___cache_free+0x46/0x300 [ 109.152659][ T5096] ? kmem_cache_free+0x65/0x110 [ 109.157491][ T5096] ? __kfree_skb+0xfe/0x150 [ 109.161987][ T5096] ? consume_skb+0x48/0x160 [ 109.166495][ T5096] ? nlmon_xmit+0x5f/0x70 [ 109.170802][ T5096] ? __this_cpu_preempt_check+0x18/0x20 [ 109.176392][ T5096] ? __local_bh_enable_ip+0x4d/0x70 [ 109.181568][ T5096] ? local_bh_enable+0x1b/0x20 [ 109.186365][ T5096] ? __dev_queue_xmit+0x597/0xf70 [ 109.191378][ T5096] ? __skb_clone+0x2db/0x300 [ 109.195973][ T5096] ? __rcu_read_unlock+0x5c/0x290 [ 109.201022][ T5096] netlink_rcv_skb+0x14e/0x250 [ 109.205830][ T5096] ? rtnetlink_bind+0x60/0x60 [ 109.210486][ T5096] rtnetlink_rcv+0x18/0x20 [ 109.214923][ T5096] netlink_unicast+0x5fc/0x6c0 [ 109.219664][ T5096] netlink_sendmsg+0x6e1/0x7d0 [ 109.224410][ T5096] ? netlink_getsockopt+0x720/0x720 [ 109.229712][ T5096] ____sys_sendmsg+0x39a/0x510 [ 109.234626][ T5096] __sys_sendmsg+0x195/0x230 [ 109.239361][ T5096] __x64_sys_sendmsg+0x42/0x50 [ 109.244214][ T5096] do_syscall_64+0x44/0xd0 [ 109.248657][ T5096] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 109.254532][ T5096] RIP: 0033:0x7f63a3dfbae9 [ 109.258956][ T5096] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 23:48:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 2) 23:48:11 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x3, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:11 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) 23:48:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 3) 23:48:11 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x15, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:11 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 109.278546][ T5096] RSP: 002b:00007f63a1b72188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 109.287053][ T5096] RAX: ffffffffffffffda RBX: 00007f63a3f0ef60 RCX: 00007f63a3dfbae9 [ 109.295015][ T5096] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 109.302983][ T5096] RBP: 00007f63a1b721d0 R08: 0000000000000000 R09: 0000000000000000 [ 109.310948][ T5096] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 109.318955][ T5096] R13: 00007ffcec81edaf R14: 00007f63a1b72300 R15: 0000000000022000 [ 109.326991][ T5096] [ 109.363236][ T5104] FAULT_INJECTION: forcing a failure. [ 109.363236][ T5104] name failslab, interval 1, probability 0, space 0, times 0 [ 109.375898][ T5104] CPU: 0 PID: 5104 Comm: syz-executor.5 Not tainted 5.16.0-rc2-syzkaller #0 [ 109.384597][ T5104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 109.394642][ T5104] Call Trace: [ 109.397900][ T5104] [ 109.400808][ T5104] dump_stack_lvl+0xd6/0x122 [ 109.405381][ T5104] dump_stack+0x11/0x1b [ 109.409555][ T5104] should_fail+0x23c/0x250 [ 109.413947][ T5104] __should_failslab+0x81/0x90 [ 109.418693][ T5104] should_failslab+0x5/0x20 [ 109.423435][ T5104] kmem_cache_alloc_node+0x61/0x2d0 [ 109.425801][ T5112] FAULT_INJECTION: forcing a failure. [ 109.425801][ T5112] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 109.428671][ T5104] ? __alloc_skb+0xf0/0x450 [ 109.446288][ T5104] __alloc_skb+0xf0/0x450 [ 109.450610][ T5104] netlink_sendmsg+0x4d5/0x7d0 [ 109.455421][ T5104] ? netlink_getsockopt+0x720/0x720 [ 109.460607][ T5104] ____sys_sendmsg+0x39a/0x510 [ 109.465374][ T5104] __sys_sendmsg+0x195/0x230 [ 109.469955][ T5104] __x64_sys_sendmsg+0x42/0x50 [ 109.474726][ T5104] do_syscall_64+0x44/0xd0 [ 109.479135][ T5104] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 109.485127][ T5104] RIP: 0033:0x7f77265f3ae9 [ 109.489531][ T5104] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 109.509121][ T5104] RSP: 002b:00007f772436a188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 109.517544][ T5104] RAX: ffffffffffffffda RBX: 00007f7726706f60 RCX: 00007f77265f3ae9 [ 109.525515][ T5104] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 109.533487][ T5104] RBP: 00007f772436a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 109.541467][ T5104] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 109.549461][ T5104] R13: 00007fff989ea7df R14: 00007f772436a300 R15: 0000000000022000 [ 109.557463][ T5104] [ 109.560461][ T5112] CPU: 1 PID: 5112 Comm: syz-executor.1 Not tainted 5.16.0-rc2-syzkaller #0 [ 109.569177][ T5112] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 109.579229][ T5112] Call Trace: [ 109.582566][ T5112] [ 109.585504][ T5112] dump_stack_lvl+0xd6/0x122 [ 109.590131][ T5112] dump_stack+0x11/0x1b [ 109.594320][ T5112] should_fail+0x23c/0x250 [ 109.598737][ T5112] should_fail_usercopy+0x16/0x20 [ 109.603836][ T5112] _copy_from_user+0x1c/0xd0 [ 109.608448][ T5112] kstrtouint_from_user+0x7e/0x170 23:48:12 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}]}, 0x40}}, 0x0) 23:48:12 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 4) [ 109.613593][ T5112] proc_fail_nth_write+0x4b/0x150 [ 109.618627][ T5112] ? proc_fail_nth_read+0x150/0x150 [ 109.623831][ T5112] vfs_write+0x2af/0x950 [ 109.628100][ T5112] ? __fget_light+0x219/0x260 [ 109.630464][ T5119] FAULT_INJECTION: forcing a failure. [ 109.630464][ T5119] name failslab, interval 1, probability 0, space 0, times 0 [ 109.632779][ T5112] ksys_write+0xd9/0x190 [ 109.649584][ T5112] __x64_sys_write+0x3e/0x50 [ 109.654169][ T5112] do_syscall_64+0x44/0xd0 [ 109.658684][ T5112] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 109.664576][ T5112] RIP: 0033:0x7f0c5767e5ff [ 109.669016][ T5112] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 109.688712][ T5112] RSP: 002b:00007f0c55421170 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 109.697160][ T5112] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0c5767e5ff [ 109.705113][ T5112] RDX: 0000000000000001 RSI: 00007f0c554211e0 RDI: 0000000000000009 [ 109.713065][ T5112] RBP: 00007f0c554211d0 R08: 0000000000000000 R09: 0000000000000000 [ 109.721015][ T5112] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 109.729049][ T5112] R13: 00007fff6eee1fff R14: 00007f0c55421300 R15: 0000000000022000 [ 109.737026][ T5112] [ 109.740031][ T5119] CPU: 0 PID: 5119 Comm: syz-executor.5 Not tainted 5.16.0-rc2-syzkaller #0 [ 109.748712][ T5119] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 109.758754][ T5119] Call Trace: [ 109.762035][ T5119] [ 109.764952][ T5119] dump_stack_lvl+0xd6/0x122 [ 109.769538][ T5119] dump_stack+0x11/0x1b [ 109.773672][ T5119] should_fail+0x23c/0x250 [ 109.778069][ T5119] __should_failslab+0x81/0x90 [ 109.782884][ T5119] should_failslab+0x5/0x20 [ 109.787419][ T5119] kmem_cache_alloc_node_trace+0x61/0x310 [ 109.793168][ T5119] ? __kmalloc_node_track_caller+0x30/0x40 [ 109.798954][ T5119] __kmalloc_node_track_caller+0x30/0x40 [ 109.804577][ T5119] ? netlink_sendmsg+0x4d5/0x7d0 [ 109.809498][ T5119] __alloc_skb+0x19d/0x450 [ 109.813891][ T5119] netlink_sendmsg+0x4d5/0x7d0 [ 109.818632][ T5119] ? netlink_getsockopt+0x720/0x720 [ 109.823810][ T5119] ____sys_sendmsg+0x39a/0x510 [ 109.828571][ T5119] __sys_sendmsg+0x195/0x230 [ 109.833140][ T5119] __x64_sys_sendmsg+0x42/0x50 [ 109.837959][ T5119] do_syscall_64+0x44/0xd0 [ 109.842422][ T5119] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 109.848323][ T5119] RIP: 0033:0x7f77265f3ae9 [ 109.852720][ T5119] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 109.872336][ T5119] RSP: 002b:00007f772436a188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 109.880770][ T5119] RAX: ffffffffffffffda RBX: 00007f7726706f60 RCX: 00007f77265f3ae9 [ 109.888718][ T5119] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 109.896668][ T5119] RBP: 00007f772436a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 109.904635][ T5119] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 23:48:12 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 5) 23:48:12 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 1) 23:48:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 109.912670][ T5119] R13: 00007fff989ea7df R14: 00007f772436a300 R15: 0000000000022000 [ 109.920661][ T5119] [ 109.989161][ T5122] FAULT_INJECTION: forcing a failure. [ 109.989161][ T5122] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 110.002277][ T5122] CPU: 0 PID: 5122 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 110.010955][ T5122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 110.021002][ T5122] Call Trace: [ 110.022207][ T5127] FAULT_INJECTION: forcing a failure. [ 110.022207][ T5127] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 110.024277][ T5122] [ 110.024285][ T5122] dump_stack_lvl+0xd6/0x122 [ 110.044807][ T5122] dump_stack+0x11/0x1b [ 110.049015][ T5122] should_fail+0x23c/0x250 [ 110.053436][ T5122] should_fail_usercopy+0x16/0x20 [ 110.058446][ T5122] _copy_from_user+0x1c/0xd0 [ 110.063034][ T5122] sendmsg_copy_msghdr+0x60/0x2a0 [ 110.068053][ T5122] __sys_sendmsg+0x166/0x230 [ 110.072667][ T5122] __x64_sys_sendmsg+0x42/0x50 [ 110.077415][ T5122] do_syscall_64+0x44/0xd0 [ 110.081877][ T5122] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 110.087758][ T5122] RIP: 0033:0x7ffb90e2cae9 [ 110.092155][ T5122] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 110.111744][ T5122] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 110.120134][ T5122] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 110.128086][ T5122] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 23:48:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:12 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x25, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) [ 110.136038][ T5122] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 110.144095][ T5122] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 110.152118][ T5122] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 110.160073][ T5122] [ 110.163081][ T5127] CPU: 1 PID: 5127 Comm: syz-executor.5 Not tainted 5.16.0-rc2-syzkaller #0 [ 110.171813][ T5127] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 110.181872][ T5127] Call Trace: [ 110.185215][ T5127] [ 110.188139][ T5127] dump_stack_lvl+0xd6/0x122 [ 110.192742][ T5127] dump_stack+0x11/0x1b [ 110.196921][ T5127] should_fail+0x23c/0x250 [ 110.201331][ T5127] should_fail_usercopy+0x16/0x20 [ 110.206351][ T5127] _copy_from_iter+0x131/0x990 [ 110.211694][ T5127] ? check_stack_object+0x61/0x70 [ 110.216754][ T5127] ? __virt_addr_valid+0x15a/0x1a0 [ 110.221924][ T5127] ? __check_object_size+0x253/0x310 [ 110.227192][ T5127] netlink_sendmsg+0x58d/0x7d0 [ 110.231984][ T5127] ? netlink_getsockopt+0x720/0x720 [ 110.237274][ T5127] ____sys_sendmsg+0x39a/0x510 [ 110.242033][ T5127] __sys_sendmsg+0x195/0x230 [ 110.246611][ T5127] __x64_sys_sendmsg+0x42/0x50 [ 110.251450][ T5127] do_syscall_64+0x44/0xd0 [ 110.255916][ T5127] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 110.261806][ T5127] RIP: 0033:0x7f77265f3ae9 [ 110.266213][ T5127] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 110.285864][ T5127] RSP: 002b:00007f772436a188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 110.294251][ T5127] RAX: ffffffffffffffda RBX: 00007f7726706f60 RCX: 00007f77265f3ae9 [ 110.302202][ T5127] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 110.310159][ T5127] RBP: 00007f772436a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 110.318126][ T5127] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 110.326076][ T5127] R13: 00007fff989ea7df R14: 00007f772436a300 R15: 0000000000022000 [ 110.334027][ T5127] 23:48:12 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x4, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:12 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 2) 23:48:12 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 6) [ 110.388191][ T5134] FAULT_INJECTION: forcing a failure. [ 110.388191][ T5134] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 110.401270][ T5134] CPU: 0 PID: 5134 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 110.409988][ T5134] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 110.420069][ T5134] Call Trace: [ 110.423329][ T5134] [ 110.426711][ T5134] dump_stack_lvl+0xd6/0x122 [ 110.431317][ T5134] dump_stack+0x11/0x1b [ 110.435448][ T5134] should_fail+0x23c/0x250 [ 110.439855][ T5134] should_fail_usercopy+0x16/0x20 [ 110.444936][ T5134] _copy_from_user+0x1c/0xd0 [ 110.449534][ T5134] iovec_from_user+0xc4/0x2e0 [ 110.454355][ T5134] __import_iovec+0x57/0x2d0 [ 110.458988][ T5134] import_iovec+0xb8/0xd0 [ 110.463299][ T5134] sendmsg_copy_msghdr+0x275/0x2a0 [ 110.468402][ T5134] __sys_sendmsg+0x166/0x230 [ 110.473049][ T5134] __x64_sys_sendmsg+0x42/0x50 [ 110.477813][ T5134] do_syscall_64+0x44/0xd0 [ 110.482223][ T5134] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 110.488127][ T5134] RIP: 0033:0x7ffb90e2cae9 [ 110.492538][ T5134] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 110.512169][ T5134] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 110.520570][ T5134] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 110.528619][ T5134] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 23:48:13 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 3) [ 110.536576][ T5134] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 110.544663][ T5134] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 110.552616][ T5134] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 110.560645][ T5134] [ 110.569402][ T5137] FAULT_INJECTION: forcing a failure. [ 110.569402][ T5137] name failslab, interval 1, probability 0, space 0, times 0 [ 110.582161][ T5137] CPU: 1 PID: 5137 Comm: syz-executor.5 Not tainted 5.16.0-rc2-syzkaller #0 [ 110.590831][ T5137] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 110.599200][ T5139] FAULT_INJECTION: forcing a failure. [ 110.599200][ T5139] name failslab, interval 1, probability 0, space 0, times 0 [ 110.601018][ T5137] Call Trace: [ 110.601026][ T5137] [ 110.601034][ T5137] dump_stack_lvl+0xd6/0x122 [ 110.601058][ T5137] dump_stack+0x11/0x1b [ 110.601075][ T5137] should_fail+0x23c/0x250 [ 110.632931][ T5137] ? skb_clone+0x12c/0x1f0 [ 110.637337][ T5137] __should_failslab+0x81/0x90 [ 110.642088][ T5137] should_failslab+0x5/0x20 [ 110.646642][ T5137] kmem_cache_alloc+0x4f/0x320 [ 110.651388][ T5137] skb_clone+0x12c/0x1f0 [ 110.655640][ T5137] netlink_deliver_tap+0x2da/0x510 [ 110.660788][ T5137] netlink_unicast+0x5de/0x6c0 [ 110.665556][ T5137] netlink_sendmsg+0x6e1/0x7d0 [ 110.670306][ T5137] ? netlink_getsockopt+0x720/0x720 [ 110.675491][ T5137] ____sys_sendmsg+0x39a/0x510 [ 110.680260][ T5137] __sys_sendmsg+0x195/0x230 [ 110.684848][ T5137] __x64_sys_sendmsg+0x42/0x50 [ 110.689641][ T5137] do_syscall_64+0x44/0xd0 [ 110.694037][ T5137] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 110.700003][ T5137] RIP: 0033:0x7f77265f3ae9 [ 110.704409][ T5137] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 110.723995][ T5137] RSP: 002b:00007f772436a188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 110.732386][ T5137] RAX: ffffffffffffffda RBX: 00007f7726706f60 RCX: 00007f77265f3ae9 [ 110.740337][ T5137] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 110.748302][ T5137] RBP: 00007f772436a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 110.756254][ T5137] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 110.764212][ T5137] R13: 00007fff989ea7df R14: 00007f772436a300 R15: 0000000000022000 [ 110.772278][ T5137] [ 110.775280][ T5139] CPU: 0 PID: 5139 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 110.783953][ T5139] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 110.794040][ T5139] Call Trace: [ 110.797309][ T5139] [ 110.800239][ T5139] dump_stack_lvl+0xd6/0x122 [ 110.804858][ T5139] dump_stack+0x11/0x1b [ 110.809016][ T5139] should_fail+0x23c/0x250 [ 110.813410][ T5139] __should_failslab+0x81/0x90 [ 110.818155][ T5139] should_failslab+0x5/0x20 [ 110.822658][ T5139] kmem_cache_alloc_node+0x61/0x2d0 [ 110.827852][ T5139] ? __alloc_skb+0xf0/0x450 [ 110.832452][ T5139] __alloc_skb+0xf0/0x450 [ 110.836763][ T5139] netlink_sendmsg+0x4d5/0x7d0 [ 110.841538][ T5139] ? netlink_getsockopt+0x720/0x720 [ 110.846846][ T5139] ____sys_sendmsg+0x39a/0x510 [ 110.851676][ T5139] __sys_sendmsg+0x195/0x230 [ 110.856248][ T5139] __x64_sys_sendmsg+0x42/0x50 [ 110.861046][ T5139] do_syscall_64+0x44/0xd0 [ 110.865556][ T5139] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 110.871700][ T5139] RIP: 0033:0x7ffb90e2cae9 [ 110.876132][ T5139] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 110.895788][ T5139] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 110.904197][ T5139] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 110.912300][ T5139] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 110.920259][ T5139] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 110.928207][ T5139] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 23:48:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:13 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 4) [ 110.936157][ T5139] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 110.944118][ T5139] 23:48:13 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2f, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) [ 110.990066][ T5144] FAULT_INJECTION: forcing a failure. [ 110.990066][ T5144] name failslab, interval 1, probability 0, space 0, times 0 [ 111.002820][ T5144] CPU: 0 PID: 5144 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 111.011493][ T5144] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 111.021551][ T5144] Call Trace: [ 111.024826][ T5144] [ 111.027739][ T5144] dump_stack_lvl+0xd6/0x122 [ 111.032348][ T5144] dump_stack+0x11/0x1b [ 111.036484][ T5144] should_fail+0x23c/0x250 [ 111.040883][ T5144] __should_failslab+0x81/0x90 [ 111.045646][ T5144] should_failslab+0x5/0x20 [ 111.050177][ T5144] kmem_cache_alloc_node_trace+0x61/0x310 [ 111.055955][ T5144] ? __kmalloc_node_track_caller+0x30/0x40 [ 111.061839][ T5144] __kmalloc_node_track_caller+0x30/0x40 [ 111.067459][ T5144] ? netlink_sendmsg+0x4d5/0x7d0 [ 111.072576][ T5144] __alloc_skb+0x19d/0x450 [ 111.076987][ T5144] netlink_sendmsg+0x4d5/0x7d0 [ 111.081748][ T5144] ? netlink_getsockopt+0x720/0x720 [ 111.086980][ T5144] ____sys_sendmsg+0x39a/0x510 [ 111.091780][ T5144] __sys_sendmsg+0x195/0x230 [ 111.096381][ T5144] __x64_sys_sendmsg+0x42/0x50 [ 111.101154][ T5144] do_syscall_64+0x44/0xd0 [ 111.105559][ T5144] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 111.111467][ T5144] RIP: 0033:0x7ffb90e2cae9 [ 111.115865][ T5144] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 23:48:13 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:13 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 5) [ 111.135546][ T5144] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 111.143975][ T5144] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 111.151929][ T5144] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 111.159954][ T5144] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 111.167905][ T5144] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 111.175857][ T5144] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 111.183811][ T5144] [ 111.226963][ T5153] FAULT_INJECTION: forcing a failure. [ 111.226963][ T5153] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 111.240114][ T5153] CPU: 1 PID: 5153 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 111.248773][ T5153] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 111.258841][ T5153] Call Trace: [ 111.262109][ T5153] [ 111.265083][ T5153] dump_stack_lvl+0xd6/0x122 [ 111.269726][ T5153] dump_stack+0x11/0x1b [ 111.273878][ T5153] should_fail+0x23c/0x250 [ 111.278372][ T5153] should_fail_usercopy+0x16/0x20 [ 111.283381][ T5153] _copy_from_iter+0x131/0x990 [ 111.288128][ T5153] ? check_stack_object+0x61/0x70 [ 111.293256][ T5153] ? __virt_addr_valid+0x15a/0x1a0 [ 111.298345][ T5153] ? __check_object_size+0x253/0x310 [ 111.303619][ T5153] netlink_sendmsg+0x58d/0x7d0 [ 111.308485][ T5153] ? netlink_getsockopt+0x720/0x720 [ 111.313662][ T5153] ____sys_sendmsg+0x39a/0x510 [ 111.318422][ T5153] __sys_sendmsg+0x195/0x230 [ 111.323073][ T5153] __x64_sys_sendmsg+0x42/0x50 [ 111.327860][ T5153] do_syscall_64+0x44/0xd0 [ 111.332260][ T5153] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 111.338137][ T5153] RIP: 0033:0x7ffb90e2cae9 [ 111.342526][ T5153] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 111.362189][ T5153] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 23:48:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:13 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 6) 23:48:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 111.370576][ T5153] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 111.378537][ T5153] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 111.386499][ T5153] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 111.394445][ T5153] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 111.402399][ T5153] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 111.410367][ T5153] 23:48:14 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x5, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x3, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 111.470282][ T5161] FAULT_INJECTION: forcing a failure. [ 111.470282][ T5161] name failslab, interval 1, probability 0, space 0, times 0 [ 111.482939][ T5161] CPU: 1 PID: 5161 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 111.491610][ T5161] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 111.501694][ T5161] Call Trace: [ 111.504957][ T5161] [ 111.507877][ T5161] dump_stack_lvl+0xd6/0x122 [ 111.512459][ T5161] dump_stack+0x11/0x1b [ 111.516663][ T5161] should_fail+0x23c/0x250 [ 111.521055][ T5161] ? skb_clone+0x12c/0x1f0 [ 111.525481][ T5161] __should_failslab+0x81/0x90 [ 111.530228][ T5161] should_failslab+0x5/0x20 [ 111.534750][ T5161] kmem_cache_alloc+0x4f/0x320 [ 111.539507][ T5161] skb_clone+0x12c/0x1f0 [ 111.543756][ T5161] netlink_deliver_tap+0x2da/0x510 [ 111.548875][ T5161] netlink_unicast+0x5de/0x6c0 [ 111.553640][ T5161] netlink_sendmsg+0x6e1/0x7d0 [ 111.558431][ T5161] ? netlink_getsockopt+0x720/0x720 [ 111.563619][ T5161] ____sys_sendmsg+0x39a/0x510 [ 111.568448][ T5161] __sys_sendmsg+0x195/0x230 [ 111.573020][ T5161] __x64_sys_sendmsg+0x42/0x50 [ 111.577762][ T5161] do_syscall_64+0x44/0xd0 [ 111.582156][ T5161] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 111.588187][ T5161] RIP: 0033:0x7ffb90e2cae9 [ 111.592668][ T5161] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 111.612357][ T5161] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 23:48:14 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x3a, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) [ 111.620768][ T5161] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 111.628732][ T5161] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 111.636686][ T5161] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 111.644633][ T5161] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 111.652625][ T5161] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 111.660577][ T5161] 23:48:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:14 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 7) [ 111.785141][ T5178] FAULT_INJECTION: forcing a failure. [ 111.785141][ T5178] name failslab, interval 1, probability 0, space 0, times 0 [ 111.797883][ T5178] CPU: 0 PID: 5178 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 111.806553][ T5178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 111.816646][ T5178] Call Trace: [ 111.819916][ T5178] [ 111.822837][ T5178] dump_stack_lvl+0xd6/0x122 [ 111.827432][ T5178] dump_stack+0x11/0x1b 23:48:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x4, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:14 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x48, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x3, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 111.831664][ T5178] should_fail+0x23c/0x250 [ 111.836089][ T5178] ? rtnl_newlink+0x59/0x13b0 [ 111.840771][ T5178] __should_failslab+0x81/0x90 [ 111.845537][ T5178] should_failslab+0x5/0x20 [ 111.850060][ T5178] kmem_cache_alloc_trace+0x52/0x350 [ 111.855411][ T5178] rtnl_newlink+0x59/0x13b0 [ 111.860056][ T5178] ? __rcu_read_unlock+0x5c/0x290 [ 111.865060][ T5178] ? __rcu_read_unlock+0x5c/0x290 [ 111.870173][ T5178] ? avc_has_perm_noaudit+0x1c0/0x270 [ 111.875631][ T5178] ? cred_has_capability+0x10a/0x240 [ 111.880902][ T5178] ? cred_has_capability+0x1df/0x240 [ 111.886189][ T5178] ? selinux_capable+0x34/0x40 [ 111.891000][ T5178] ? security_capable+0x91/0xa0 [ 111.895889][ T5178] ? __rcu_read_unlock+0x5c/0x290 [ 111.900910][ T5178] ? rtnl_setlink+0x2a0/0x2a0 [ 111.905618][ T5178] rtnetlink_rcv_msg+0x745/0x7e0 [ 111.910559][ T5178] ? ___cache_free+0x46/0x300 [ 111.915258][ T5178] ? kmem_cache_free+0x65/0x110 [ 111.920103][ T5178] ? __kfree_skb+0xfe/0x150 [ 111.924585][ T5178] ? consume_skb+0x48/0x160 [ 111.929168][ T5178] ? nlmon_xmit+0x5f/0x70 [ 111.933578][ T5178] ? __this_cpu_preempt_check+0x18/0x20 [ 111.939153][ T5178] ? __local_bh_enable_ip+0x4d/0x70 [ 111.944330][ T5178] ? local_bh_enable+0x1b/0x20 [ 111.949108][ T5178] ? __dev_queue_xmit+0x597/0xf70 [ 111.954188][ T5178] ? __skb_clone+0x2db/0x300 [ 111.958803][ T5178] ? __rcu_read_unlock+0x5c/0x290 [ 111.963821][ T5178] netlink_rcv_skb+0x14e/0x250 [ 111.968565][ T5178] ? rtnetlink_bind+0x60/0x60 [ 111.973220][ T5178] rtnetlink_rcv+0x18/0x20 [ 111.977617][ T5178] netlink_unicast+0x5fc/0x6c0 [ 111.982368][ T5178] netlink_sendmsg+0x6e1/0x7d0 [ 111.987191][ T5178] ? netlink_getsockopt+0x720/0x720 [ 111.992386][ T5178] ____sys_sendmsg+0x39a/0x510 [ 111.997131][ T5178] __sys_sendmsg+0x195/0x230 [ 112.001834][ T5178] __x64_sys_sendmsg+0x42/0x50 [ 112.006577][ T5178] do_syscall_64+0x44/0xd0 [ 112.010982][ T5178] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 112.016986][ T5178] RIP: 0033:0x7ffb90e2cae9 [ 112.021377][ T5178] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 112.040962][ T5178] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 112.049369][ T5178] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 112.057320][ T5178] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 112.065275][ T5178] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 112.073291][ T5178] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 23:48:14 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 8) 23:48:14 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x6, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) [ 112.081322][ T5178] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 112.089277][ T5178] 23:48:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x5, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 112.154730][ T5191] FAULT_INJECTION: forcing a failure. [ 112.154730][ T5191] name failslab, interval 1, probability 0, space 0, times 0 [ 112.167354][ T5191] CPU: 0 PID: 5191 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 112.176006][ T5191] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 112.186036][ T5191] Call Trace: [ 112.189294][ T5191] [ 112.192219][ T5191] dump_stack_lvl+0xd6/0x122 [ 112.196832][ T5191] dump_stack+0x11/0x1b [ 112.200991][ T5191] should_fail+0x23c/0x250 [ 112.205394][ T5191] __should_failslab+0x81/0x90 [ 112.210147][ T5191] should_failslab+0x5/0x20 [ 112.214664][ T5191] kmem_cache_alloc_node_trace+0x61/0x310 [ 112.220359][ T5191] ? cred_has_capability+0x10a/0x240 [ 112.225633][ T5191] ? cred_has_capability+0x1df/0x240 [ 112.230951][ T5191] ? __kmalloc_node+0x30/0x40 [ 112.235630][ T5191] ? hsr_del_ports+0x90/0x90 [ 112.240216][ T5191] __kmalloc_node+0x30/0x40 [ 112.244702][ T5191] kvmalloc_node+0x81/0x110 [ 112.249299][ T5191] alloc_netdev_mqs+0x86/0x790 [ 112.254147][ T5191] rtnl_create_link+0x22b/0x560 [ 112.259059][ T5191] rtnl_newlink+0xd07/0x13b0 [ 112.263706][ T5191] ? __rcu_read_unlock+0x5c/0x290 [ 112.268755][ T5191] ? rtnl_setlink+0x2a0/0x2a0 [ 112.273487][ T5191] rtnetlink_rcv_msg+0x745/0x7e0 [ 112.278402][ T5191] ? ___cache_free+0x46/0x300 [ 112.283060][ T5191] ? kmem_cache_free+0x65/0x110 [ 112.287941][ T5191] ? __kfree_skb+0xfe/0x150 [ 112.292490][ T5191] ? consume_skb+0x48/0x160 [ 112.296985][ T5191] ? nlmon_xmit+0x5f/0x70 [ 112.301387][ T5191] ? __this_cpu_preempt_check+0x18/0x20 [ 112.306941][ T5191] ? __local_bh_enable_ip+0x4d/0x70 [ 112.312125][ T5191] ? local_bh_enable+0x1b/0x20 [ 112.316917][ T5191] ? __dev_queue_xmit+0x597/0xf70 [ 112.321990][ T5191] ? __skb_clone+0x2db/0x300 [ 112.326606][ T5191] ? __rcu_read_unlock+0x5c/0x290 [ 112.331622][ T5191] netlink_rcv_skb+0x14e/0x250 [ 112.336419][ T5191] ? rtnetlink_bind+0x60/0x60 [ 112.341084][ T5191] rtnetlink_rcv+0x18/0x20 [ 112.345481][ T5191] netlink_unicast+0x5fc/0x6c0 [ 112.350266][ T5191] netlink_sendmsg+0x6e1/0x7d0 [ 112.355056][ T5191] ? netlink_getsockopt+0x720/0x720 [ 112.360241][ T5191] ____sys_sendmsg+0x39a/0x510 [ 112.365002][ T5191] __sys_sendmsg+0x195/0x230 [ 112.369795][ T5191] __x64_sys_sendmsg+0x42/0x50 [ 112.374545][ T5191] do_syscall_64+0x44/0xd0 [ 112.378937][ T5191] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 112.384852][ T5191] RIP: 0033:0x7ffb90e2cae9 [ 112.389249][ T5191] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 112.408947][ T5191] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 112.417342][ T5191] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 112.425320][ T5191] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 112.433279][ T5191] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 112.441239][ T5191] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 112.449206][ T5191] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 112.457184][ T5191] 23:48:15 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x4, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:15 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x4a, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 9) 23:48:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x3, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 112.540069][ T5204] FAULT_INJECTION: forcing a failure. [ 112.540069][ T5204] name failslab, interval 1, probability 0, space 0, times 0 [ 112.552788][ T5204] CPU: 0 PID: 5204 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 112.561471][ T5204] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 112.571501][ T5204] Call Trace: [ 112.574759][ T5204] [ 112.577682][ T5204] dump_stack_lvl+0xd6/0x122 [ 112.582282][ T5204] dump_stack+0x11/0x1b [ 112.586423][ T5204] should_fail+0x23c/0x250 [ 112.590839][ T5204] ? __hw_addr_add_ex+0x19c/0x460 [ 112.595982][ T5204] __should_failslab+0x81/0x90 [ 112.600728][ T5204] should_failslab+0x5/0x20 [ 112.605232][ T5204] kmem_cache_alloc_trace+0x52/0x350 [ 112.610511][ T5204] ? __rcu_read_unlock+0x5c/0x290 [ 112.615649][ T5204] __hw_addr_add_ex+0x19c/0x460 [ 112.620499][ T5204] ? hsr_del_ports+0x90/0x90 [ 112.625070][ T5204] dev_addr_init+0xae/0x120 [ 112.629603][ T5204] alloc_netdev_mqs+0xe3/0x790 [ 112.634344][ T5204] rtnl_create_link+0x22b/0x560 [ 112.639215][ T5204] rtnl_newlink+0xd07/0x13b0 [ 112.643810][ T5204] ? __rcu_read_unlock+0x5c/0x290 [ 112.648852][ T5204] ? rtnl_setlink+0x2a0/0x2a0 [ 112.653512][ T5204] rtnetlink_rcv_msg+0x745/0x7e0 [ 112.658447][ T5204] ? ___cache_free+0x46/0x300 [ 112.663125][ T5204] ? kmem_cache_free+0x65/0x110 [ 112.667967][ T5204] ? __kfree_skb+0xfe/0x150 [ 112.672543][ T5204] ? consume_skb+0x48/0x160 [ 112.677038][ T5204] ? nlmon_xmit+0x5f/0x70 [ 112.681457][ T5204] ? __this_cpu_preempt_check+0x18/0x20 [ 112.687095][ T5204] ? __local_bh_enable_ip+0x4d/0x70 [ 112.692287][ T5204] ? local_bh_enable+0x1b/0x20 [ 112.697023][ T5204] ? __dev_queue_xmit+0x597/0xf70 [ 112.702024][ T5204] ? __skb_clone+0x2db/0x300 [ 112.706589][ T5204] ? __rcu_read_unlock+0x5c/0x290 [ 112.711636][ T5204] netlink_rcv_skb+0x14e/0x250 [ 112.716379][ T5204] ? rtnetlink_bind+0x60/0x60 [ 112.721030][ T5204] rtnetlink_rcv+0x18/0x20 [ 112.725435][ T5204] netlink_unicast+0x5fc/0x6c0 [ 112.730195][ T5204] netlink_sendmsg+0x6e1/0x7d0 [ 112.734991][ T5204] ? netlink_getsockopt+0x720/0x720 [ 112.740229][ T5204] ____sys_sendmsg+0x39a/0x510 [ 112.744981][ T5204] __sys_sendmsg+0x195/0x230 [ 112.749548][ T5204] __x64_sys_sendmsg+0x42/0x50 [ 112.754418][ T5204] do_syscall_64+0x44/0xd0 [ 112.758811][ T5204] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 112.764683][ T5204] RIP: 0033:0x7ffb90e2cae9 [ 112.769149][ T5204] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 23:48:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x6, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x4, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 112.788807][ T5204] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 112.797227][ T5204] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 112.805177][ T5204] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 112.813144][ T5204] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 112.821166][ T5204] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 112.829144][ T5204] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 112.837105][ T5204] 23:48:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 10) 23:48:15 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x7, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:15 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x4c, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:15 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x5, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 112.904460][ T5215] FAULT_INJECTION: forcing a failure. [ 112.904460][ T5215] name failslab, interval 1, probability 0, space 0, times 0 [ 112.917120][ T5215] CPU: 0 PID: 5215 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 112.925863][ T5215] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 112.935910][ T5215] Call Trace: [ 112.939165][ T5215] [ 112.942080][ T5215] dump_stack_lvl+0xd6/0x122 [ 112.946748][ T5215] dump_stack+0x11/0x1b [ 112.950899][ T5215] should_fail+0x23c/0x250 [ 112.955311][ T5215] __should_failslab+0x81/0x90 [ 112.960511][ T5215] should_failslab+0x5/0x20 [ 112.965035][ T5215] kmem_cache_alloc_node_trace+0x61/0x310 [ 112.970734][ T5215] ? __kmalloc_node+0x30/0x40 [ 112.975396][ T5215] __kmalloc_node+0x30/0x40 [ 112.979876][ T5215] kvmalloc_node+0x81/0x110 [ 112.984358][ T5215] alloc_netdev_mqs+0x416/0x790 [ 112.989251][ T5215] rtnl_create_link+0x22b/0x560 [ 112.994090][ T5215] rtnl_newlink+0xd07/0x13b0 [ 112.998664][ T5215] ? rtnl_setlink+0x2a0/0x2a0 [ 113.003328][ T5215] rtnetlink_rcv_msg+0x745/0x7e0 [ 113.008279][ T5215] ? ___cache_free+0x46/0x300 [ 113.012939][ T5215] ? kmem_cache_free+0x65/0x110 [ 113.017838][ T5215] ? __kfree_skb+0xfe/0x150 [ 113.022422][ T5215] ? consume_skb+0x48/0x160 [ 113.026907][ T5215] ? nlmon_xmit+0x5f/0x70 [ 113.031239][ T5215] ? __this_cpu_preempt_check+0x18/0x20 [ 113.036815][ T5215] ? __local_bh_enable_ip+0x4d/0x70 [ 113.042001][ T5215] ? local_bh_enable+0x1b/0x20 [ 113.046743][ T5215] ? __dev_queue_xmit+0x597/0xf70 [ 113.051748][ T5215] ? __skb_clone+0x2db/0x300 [ 113.056371][ T5215] ? __rcu_read_unlock+0x5c/0x290 [ 113.061383][ T5215] netlink_rcv_skb+0x14e/0x250 [ 113.066270][ T5215] ? rtnetlink_bind+0x60/0x60 [ 113.071034][ T5215] rtnetlink_rcv+0x18/0x20 [ 113.075496][ T5215] netlink_unicast+0x5fc/0x6c0 [ 113.080242][ T5215] netlink_sendmsg+0x6e1/0x7d0 [ 113.085093][ T5215] ? netlink_getsockopt+0x720/0x720 [ 113.090280][ T5215] ____sys_sendmsg+0x39a/0x510 [ 113.095098][ T5215] __sys_sendmsg+0x195/0x230 [ 113.099738][ T5215] __x64_sys_sendmsg+0x42/0x50 [ 113.104484][ T5215] do_syscall_64+0x44/0xd0 [ 113.108901][ T5215] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 113.114872][ T5215] RIP: 0033:0x7ffb90e2cae9 [ 113.119283][ T5215] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 113.138877][ T5215] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 113.147274][ T5215] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 23:48:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 11) [ 113.155277][ T5215] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 113.163231][ T5215] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 113.171219][ T5215] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 113.179183][ T5215] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 113.187147][ T5215] 23:48:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x5, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 113.232009][ T5224] FAULT_INJECTION: forcing a failure. [ 113.232009][ T5224] name failslab, interval 1, probability 0, space 0, times 0 [ 113.244697][ T5224] CPU: 1 PID: 5224 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 113.253371][ T5224] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 113.263443][ T5224] Call Trace: [ 113.266707][ T5224] [ 113.269626][ T5224] dump_stack_lvl+0xd6/0x122 [ 113.274299][ T5224] dump_stack+0x11/0x1b [ 113.278473][ T5224] should_fail+0x23c/0x250 [ 113.282867][ T5224] __should_failslab+0x81/0x90 [ 113.287691][ T5224] should_failslab+0x5/0x20 [ 113.292178][ T5224] kmem_cache_alloc_node_trace+0x61/0x310 [ 113.297878][ T5224] ? __kmalloc_node+0x30/0x40 [ 113.302531][ T5224] __kmalloc_node+0x30/0x40 [ 113.307015][ T5224] kvmalloc_node+0x81/0x110 [ 113.311570][ T5224] alloc_netdev_mqs+0x59c/0x790 [ 113.316409][ T5224] rtnl_create_link+0x22b/0x560 [ 113.321322][ T5224] rtnl_newlink+0xd07/0x13b0 [ 113.326149][ T5224] ? __rcu_read_unlock+0x5c/0x290 [ 113.331302][ T5224] ? rtnl_setlink+0x2a0/0x2a0 [ 113.335973][ T5224] rtnetlink_rcv_msg+0x745/0x7e0 [ 113.340946][ T5224] ? ___cache_free+0x46/0x300 [ 113.345606][ T5224] ? kmem_cache_free+0x65/0x110 [ 113.350496][ T5224] ? __kfree_skb+0xfe/0x150 [ 113.354980][ T5224] ? consume_skb+0x48/0x160 [ 113.359541][ T5224] ? nlmon_xmit+0x5f/0x70 [ 113.363978][ T5224] ? __this_cpu_preempt_check+0x18/0x20 [ 113.369589][ T5224] ? __local_bh_enable_ip+0x4d/0x70 [ 113.374823][ T5224] ? local_bh_enable+0x1b/0x20 [ 113.379642][ T5224] ? __dev_queue_xmit+0x597/0xf70 [ 113.384654][ T5224] ? __skb_clone+0x2db/0x300 [ 113.389241][ T5224] ? __rcu_read_unlock+0x5c/0x290 [ 113.394261][ T5224] netlink_rcv_skb+0x14e/0x250 [ 113.399078][ T5224] ? rtnetlink_bind+0x60/0x60 [ 113.403741][ T5224] rtnetlink_rcv+0x18/0x20 [ 113.408137][ T5224] netlink_unicast+0x5fc/0x6c0 [ 113.412880][ T5224] netlink_sendmsg+0x6e1/0x7d0 [ 113.417761][ T5224] ? netlink_getsockopt+0x720/0x720 [ 113.423070][ T5224] ____sys_sendmsg+0x39a/0x510 [ 113.427835][ T5224] __sys_sendmsg+0x195/0x230 [ 113.432431][ T5224] __x64_sys_sendmsg+0x42/0x50 [ 113.437209][ T5224] do_syscall_64+0x44/0xd0 [ 113.441621][ T5224] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 113.447495][ T5224] RIP: 0033:0x7ffb90e2cae9 [ 113.451890][ T5224] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 113.471495][ T5224] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 23:48:16 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 12) 23:48:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x7, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 113.479990][ T5224] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 113.487957][ T5224] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 113.495911][ T5224] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 113.503864][ T5224] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 113.511837][ T5224] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 113.519851][ T5224] 23:48:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x6, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 113.581972][ T5232] FAULT_INJECTION: forcing a failure. [ 113.581972][ T5232] name failslab, interval 1, probability 0, space 0, times 0 [ 113.594807][ T5232] CPU: 0 PID: 5232 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 113.603461][ T5232] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 113.613609][ T5232] Call Trace: [ 113.616883][ T5232] [ 113.619820][ T5232] dump_stack_lvl+0xd6/0x122 [ 113.624398][ T5232] dump_stack+0x11/0x1b [ 113.628567][ T5232] should_fail+0x23c/0x250 [ 113.632966][ T5232] ? hsr_create_self_node+0x4c/0x280 [ 113.638251][ T5232] __should_failslab+0x81/0x90 [ 113.643026][ T5232] should_failslab+0x5/0x20 [ 113.647555][ T5232] kmem_cache_alloc_trace+0x52/0x350 [ 113.652833][ T5232] ? kmem_cache_alloc_node_trace+0x20f/0x310 [ 113.658889][ T5232] hsr_create_self_node+0x4c/0x280 [ 113.664012][ T5232] hsr_dev_finalize+0x19e/0x460 [ 113.668960][ T5232] hsr_newlink+0x40d/0x450 [ 113.673447][ T5232] ? hsr_get_node_list+0x450/0x450 [ 113.678578][ T5232] rtnl_newlink+0xdae/0x13b0 [ 113.683235][ T5232] ? rtnl_setlink+0x2a0/0x2a0 [ 113.687917][ T5232] rtnetlink_rcv_msg+0x745/0x7e0 [ 113.698104][ T5232] ? ___cache_free+0x46/0x300 [ 113.702763][ T5232] ? kmem_cache_free+0x65/0x110 [ 113.707593][ T5232] ? __kfree_skb+0xfe/0x150 [ 113.712077][ T5232] ? consume_skb+0x48/0x160 [ 113.716560][ T5232] ? nlmon_xmit+0x5f/0x70 [ 113.720986][ T5232] ? __this_cpu_preempt_check+0x18/0x20 [ 113.726532][ T5232] ? __local_bh_enable_ip+0x4d/0x70 [ 113.731731][ T5232] ? local_bh_enable+0x1b/0x20 [ 113.736481][ T5232] ? __dev_queue_xmit+0x597/0xf70 [ 113.741515][ T5232] ? __skb_clone+0x2db/0x300 [ 113.746128][ T5232] ? __rcu_read_unlock+0x5c/0x290 [ 113.751160][ T5232] netlink_rcv_skb+0x14e/0x250 [ 113.755914][ T5232] ? rtnetlink_bind+0x60/0x60 [ 113.760606][ T5232] rtnetlink_rcv+0x18/0x20 [ 113.765127][ T5232] netlink_unicast+0x5fc/0x6c0 [ 113.769885][ T5232] netlink_sendmsg+0x6e1/0x7d0 [ 113.774715][ T5232] ? netlink_getsockopt+0x720/0x720 [ 113.779961][ T5232] ____sys_sendmsg+0x39a/0x510 [ 113.784835][ T5232] __sys_sendmsg+0x195/0x230 [ 113.789534][ T5232] __x64_sys_sendmsg+0x42/0x50 [ 113.794282][ T5232] do_syscall_64+0x44/0xd0 [ 113.798681][ T5232] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 113.804561][ T5232] RIP: 0033:0x7ffb90e2cae9 [ 113.808962][ T5232] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 23:48:16 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x56, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:16 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x6, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 113.828544][ T5232] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 113.836965][ T5232] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 113.844930][ T5232] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 113.852879][ T5232] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 113.860829][ T5232] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 113.868801][ T5232] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 113.876752][ T5232] 23:48:16 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x8, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:16 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 13) [ 113.950582][ T5246] FAULT_INJECTION: forcing a failure. [ 113.950582][ T5246] name failslab, interval 1, probability 0, space 0, times 0 [ 113.963307][ T5246] CPU: 0 PID: 5246 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 113.972152][ T5246] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 113.982191][ T5246] Call Trace: [ 113.985466][ T5246] [ 113.988382][ T5246] dump_stack_lvl+0xd6/0x122 [ 113.992973][ T5246] dump_stack+0x11/0x1b [ 113.997121][ T5246] should_fail+0x23c/0x250 [ 114.001521][ T5246] ? hsr_add_port+0x13b/0x4a0 [ 114.006314][ T5246] __should_failslab+0x81/0x90 [ 114.011175][ T5246] should_failslab+0x5/0x20 [ 114.015667][ T5246] kmem_cache_alloc_trace+0x52/0x350 [ 114.020988][ T5246] ? __this_cpu_preempt_check+0x18/0x20 [ 114.026579][ T5246] hsr_add_port+0x13b/0x4a0 [ 114.031090][ T5246] hsr_dev_finalize+0x2a3/0x460 [ 114.035937][ T5246] hsr_newlink+0x40d/0x450 [ 114.040331][ T5246] ? hsr_get_node_list+0x450/0x450 [ 114.045425][ T5246] rtnl_newlink+0xdae/0x13b0 [ 114.050002][ T5246] ? __rcu_read_unlock+0x5c/0x290 [ 114.055005][ T5246] ? rtnl_setlink+0x2a0/0x2a0 [ 114.059673][ T5246] rtnetlink_rcv_msg+0x745/0x7e0 [ 114.064639][ T5246] ? ___cache_free+0x46/0x300 [ 114.069330][ T5246] ? kmem_cache_free+0x65/0x110 [ 114.074221][ T5246] ? __kfree_skb+0xfe/0x150 [ 114.078761][ T5246] ? consume_skb+0x48/0x160 [ 114.083263][ T5246] ? nlmon_xmit+0x5f/0x70 [ 114.087696][ T5246] ? __this_cpu_preempt_check+0x18/0x20 [ 114.093256][ T5246] ? __local_bh_enable_ip+0x4d/0x70 [ 114.098431][ T5246] ? local_bh_enable+0x1b/0x20 [ 114.103173][ T5246] ? __dev_queue_xmit+0x597/0xf70 [ 114.108173][ T5246] ? __skb_clone+0x2db/0x300 [ 114.112811][ T5246] ? __rcu_read_unlock+0x5c/0x290 [ 114.117812][ T5246] netlink_rcv_skb+0x14e/0x250 [ 114.122566][ T5246] ? rtnetlink_bind+0x60/0x60 [ 114.127253][ T5246] rtnetlink_rcv+0x18/0x20 [ 114.131689][ T5246] netlink_unicast+0x5fc/0x6c0 [ 114.136527][ T5246] netlink_sendmsg+0x6e1/0x7d0 [ 114.141267][ T5246] ? netlink_getsockopt+0x720/0x720 [ 114.146492][ T5246] ____sys_sendmsg+0x39a/0x510 [ 114.151239][ T5246] __sys_sendmsg+0x195/0x230 [ 114.155878][ T5246] __x64_sys_sendmsg+0x42/0x50 [ 114.160651][ T5246] do_syscall_64+0x44/0xd0 [ 114.165165][ T5246] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 114.171054][ T5246] RIP: 0033:0x7ffb90e2cae9 [ 114.175442][ T5246] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 23:48:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x8, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 114.199806][ T5246] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 114.208206][ T5246] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 114.216156][ T5246] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 114.224107][ T5246] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 114.232063][ T5246] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 114.240026][ T5246] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 114.247979][ T5246] 23:48:16 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 14) 23:48:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x7, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:16 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x7, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 114.313776][ T5256] FAULT_INJECTION: forcing a failure. [ 114.313776][ T5256] name failslab, interval 1, probability 0, space 0, times 0 [ 114.326478][ T5256] CPU: 0 PID: 5256 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 114.335138][ T5256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 114.345262][ T5256] Call Trace: [ 114.348536][ T5256] [ 114.351507][ T5256] dump_stack_lvl+0xd6/0x122 [ 114.356094][ T5256] dump_stack+0x11/0x1b [ 114.360247][ T5256] should_fail+0x23c/0x250 [ 114.364656][ T5256] ? kzalloc+0x16/0x20 [ 114.368719][ T5256] __should_failslab+0x81/0x90 [ 114.373544][ T5256] should_failslab+0x5/0x20 [ 114.378026][ T5256] __kmalloc+0x6f/0x370 [ 114.382217][ T5256] ? hsr_fix_features+0x8a/0xa0 [ 114.387068][ T5256] kzalloc+0x16/0x20 [ 114.390956][ T5256] ethnl_default_notify+0x72/0x490 [ 114.396074][ T5256] ? fib_rules_event+0x62b/0x6a0 [ 114.401073][ T5256] ethnl_netdev_event+0x8d/0xe0 [ 114.405917][ T5256] raw_notifier_call_chain+0x53/0xb0 [ 114.411338][ T5256] netdev_update_features+0xd3/0x130 [ 114.416645][ T5256] hsr_add_port+0x307/0x4a0 [ 114.421148][ T5256] hsr_dev_finalize+0x2a3/0x460 [ 114.426039][ T5256] hsr_newlink+0x40d/0x450 [ 114.430440][ T5256] ? hsr_get_node_list+0x450/0x450 [ 114.435539][ T5256] rtnl_newlink+0xdae/0x13b0 [ 114.440120][ T5256] ? rb_insert_color+0x2fa/0x310 [ 114.445089][ T5256] ? rtnl_setlink+0x2a0/0x2a0 [ 114.449824][ T5256] rtnetlink_rcv_msg+0x745/0x7e0 [ 114.454874][ T5256] ? ___cache_free+0x46/0x300 [ 114.459650][ T5256] ? kmem_cache_free+0x65/0x110 [ 114.464482][ T5256] ? __kfree_skb+0xfe/0x150 [ 114.469025][ T5256] ? consume_skb+0x48/0x160 [ 114.473515][ T5256] ? nlmon_xmit+0x5f/0x70 [ 114.477832][ T5256] ? __this_cpu_preempt_check+0x18/0x20 [ 114.483438][ T5256] ? __local_bh_enable_ip+0x4d/0x70 [ 114.488679][ T5256] ? local_bh_enable+0x1b/0x20 [ 114.493461][ T5256] ? __dev_queue_xmit+0x597/0xf70 [ 114.498480][ T5256] ? __skb_clone+0x2db/0x300 [ 114.503064][ T5256] ? __rcu_read_unlock+0x5c/0x290 [ 114.508091][ T5256] netlink_rcv_skb+0x14e/0x250 [ 114.512909][ T5256] ? rtnetlink_bind+0x60/0x60 [ 114.517701][ T5256] rtnetlink_rcv+0x18/0x20 [ 114.522169][ T5256] netlink_unicast+0x5fc/0x6c0 [ 114.526935][ T5256] netlink_sendmsg+0x6e1/0x7d0 [ 114.531721][ T5256] ? netlink_getsockopt+0x720/0x720 [ 114.536930][ T5256] ____sys_sendmsg+0x39a/0x510 [ 114.541726][ T5256] __sys_sendmsg+0x195/0x230 [ 114.546320][ T5256] __x64_sys_sendmsg+0x42/0x50 [ 114.551314][ T5256] do_syscall_64+0x44/0xd0 [ 114.555718][ T5256] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 114.561631][ T5256] RIP: 0033:0x7ffb90e2cae9 [ 114.566021][ T5256] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 114.585612][ T5256] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 114.594080][ T5256] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 114.602050][ T5256] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 23:48:17 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x60, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) [ 114.610023][ T5256] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 114.617977][ T5256] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 114.625933][ T5256] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 114.633903][ T5256] 23:48:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x9, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:17 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x9, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:17 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x8, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:17 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 15) 23:48:17 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x8, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:17 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x63, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) [ 114.748125][ T5272] FAULT_INJECTION: forcing a failure. [ 114.748125][ T5272] name failslab, interval 1, probability 0, space 0, times 0 [ 114.760844][ T5272] CPU: 1 PID: 5272 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 114.769519][ T5272] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 114.779680][ T5272] Call Trace: [ 114.782971][ T5272] [ 114.785889][ T5272] dump_stack_lvl+0xd6/0x122 [ 114.790484][ T5272] dump_stack+0x11/0x1b [ 114.794639][ T5272] should_fail+0x23c/0x250 [ 114.799042][ T5272] ? ethnl_default_notify+0x97/0x490 [ 114.804314][ T5272] __should_failslab+0x81/0x90 [ 114.809099][ T5272] should_failslab+0x5/0x20 [ 114.813630][ T5272] __kmalloc+0x6f/0x370 [ 114.817772][ T5272] ? kzalloc+0x16/0x20 [ 114.821818][ T5272] ethnl_default_notify+0x97/0x490 [ 114.827001][ T5272] ? fib_rules_event+0x62b/0x6a0 [ 114.831984][ T5272] ethnl_netdev_event+0x8d/0xe0 [ 114.836815][ T5272] raw_notifier_call_chain+0x53/0xb0 [ 114.842128][ T5272] netdev_update_features+0xd3/0x130 [ 114.847397][ T5272] hsr_add_port+0x307/0x4a0 [ 114.851910][ T5272] hsr_dev_finalize+0x2a3/0x460 [ 114.856753][ T5272] hsr_newlink+0x40d/0x450 [ 114.861175][ T5272] ? hsr_get_node_list+0x450/0x450 [ 114.866335][ T5272] rtnl_newlink+0xdae/0x13b0 [ 114.870908][ T5272] ? rb_insert_color+0x2fa/0x310 [ 114.875845][ T5272] ? rtnl_setlink+0x2a0/0x2a0 [ 114.880518][ T5272] rtnetlink_rcv_msg+0x745/0x7e0 [ 114.885435][ T5272] ? ___cache_free+0x46/0x300 [ 114.890206][ T5272] ? kmem_cache_free+0x65/0x110 [ 114.895059][ T5272] ? __kfree_skb+0xfe/0x150 [ 114.899542][ T5272] ? consume_skb+0x48/0x160 [ 114.904069][ T5272] ? nlmon_xmit+0x5f/0x70 [ 114.908375][ T5272] ? __this_cpu_preempt_check+0x18/0x20 [ 114.913968][ T5272] ? __local_bh_enable_ip+0x4d/0x70 [ 114.919149][ T5272] ? local_bh_enable+0x1b/0x20 [ 114.923953][ T5272] ? __dev_queue_xmit+0x597/0xf70 [ 114.928955][ T5272] ? __skb_clone+0x2db/0x300 [ 114.933542][ T5272] ? __rcu_read_unlock+0x5c/0x290 [ 114.938617][ T5272] netlink_rcv_skb+0x14e/0x250 [ 114.943376][ T5272] ? rtnetlink_bind+0x60/0x60 [ 114.948033][ T5272] rtnetlink_rcv+0x18/0x20 [ 114.952432][ T5272] netlink_unicast+0x5fc/0x6c0 [ 114.957208][ T5272] netlink_sendmsg+0x6e1/0x7d0 [ 114.961986][ T5272] ? netlink_getsockopt+0x720/0x720 [ 114.967280][ T5272] ____sys_sendmsg+0x39a/0x510 [ 114.972027][ T5272] __sys_sendmsg+0x195/0x230 [ 114.976639][ T5272] __x64_sys_sendmsg+0x42/0x50 [ 114.981422][ T5272] do_syscall_64+0x44/0xd0 [ 114.985819][ T5272] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 114.991855][ T5272] RIP: 0033:0x7ffb90e2cae9 [ 114.996260][ T5272] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 115.016561][ T5272] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 115.025013][ T5272] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 115.032981][ T5272] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 115.041019][ T5272] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 115.048978][ T5272] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 115.057036][ T5272] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 115.065046][ T5272] 23:48:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xa, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:17 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x68, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:17 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x9, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:17 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 16) 23:48:17 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x9, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xb, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 115.215558][ T5296] FAULT_INJECTION: forcing a failure. [ 115.215558][ T5296] name failslab, interval 1, probability 0, space 0, times 0 [ 115.228262][ T5296] CPU: 1 PID: 5296 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 115.236957][ T5296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 115.247028][ T5296] Call Trace: [ 115.250292][ T5296] [ 115.253205][ T5296] dump_stack_lvl+0xd6/0x122 [ 115.257873][ T5296] dump_stack+0x11/0x1b [ 115.262025][ T5296] should_fail+0x23c/0x250 [ 115.266429][ T5296] __should_failslab+0x81/0x90 [ 115.271214][ T5296] should_failslab+0x5/0x20 [ 115.275711][ T5296] kmem_cache_alloc_node+0x61/0x2d0 [ 115.280971][ T5296] ? ethnl_bitset32_size+0x2e/0x1d0 [ 115.286184][ T5296] ? __alloc_skb+0xf0/0x450 [ 115.290675][ T5296] __alloc_skb+0xf0/0x450 [ 115.295053][ T5296] ethnl_default_notify+0x17e/0x490 [ 115.300240][ T5296] ethnl_netdev_event+0x8d/0xe0 [ 115.305113][ T5296] raw_notifier_call_chain+0x53/0xb0 [ 115.310570][ T5296] netdev_update_features+0xd3/0x130 [ 115.315870][ T5296] hsr_add_port+0x307/0x4a0 [ 115.320369][ T5296] hsr_dev_finalize+0x2a3/0x460 [ 115.325269][ T5296] hsr_newlink+0x40d/0x450 [ 115.329697][ T5296] ? hsr_get_node_list+0x450/0x450 [ 115.334796][ T5296] rtnl_newlink+0xdae/0x13b0 [ 115.339385][ T5296] ? rtnl_setlink+0x2a0/0x2a0 [ 115.344050][ T5296] rtnetlink_rcv_msg+0x745/0x7e0 [ 115.348978][ T5296] ? ___cache_free+0x46/0x300 [ 115.353669][ T5296] ? kmem_cache_free+0x65/0x110 [ 115.358633][ T5296] ? __kfree_skb+0xfe/0x150 [ 115.363174][ T5296] ? consume_skb+0x48/0x160 [ 115.367679][ T5296] ? nlmon_xmit+0x5f/0x70 [ 115.372010][ T5296] ? __this_cpu_preempt_check+0x18/0x20 [ 115.377640][ T5296] ? __local_bh_enable_ip+0x4d/0x70 [ 115.382828][ T5296] ? local_bh_enable+0x1b/0x20 [ 115.387583][ T5296] ? __dev_queue_xmit+0x597/0xf70 [ 115.392643][ T5296] ? __skb_clone+0x2db/0x300 [ 115.397232][ T5296] ? __rcu_read_unlock+0x5c/0x290 [ 115.402245][ T5296] netlink_rcv_skb+0x14e/0x250 [ 115.407065][ T5296] ? rtnetlink_bind+0x60/0x60 [ 115.411850][ T5296] rtnetlink_rcv+0x18/0x20 [ 115.416309][ T5296] netlink_unicast+0x5fc/0x6c0 [ 115.421081][ T5296] netlink_sendmsg+0x6e1/0x7d0 [ 115.425923][ T5296] ? netlink_getsockopt+0x720/0x720 [ 115.431114][ T5296] ____sys_sendmsg+0x39a/0x510 [ 115.435885][ T5296] __sys_sendmsg+0x195/0x230 [ 115.440490][ T5296] __x64_sys_sendmsg+0x42/0x50 [ 115.445330][ T5296] do_syscall_64+0x44/0xd0 [ 115.449733][ T5296] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 115.455790][ T5296] RIP: 0033:0x7ffb90e2cae9 [ 115.460191][ T5296] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 115.479790][ T5296] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 115.488188][ T5296] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 115.496751][ T5296] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 115.504720][ T5296] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 23:48:18 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xa, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 115.512674][ T5296] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 115.520707][ T5296] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 115.528663][ T5296] 23:48:18 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0xa, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xa, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:18 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x6c, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 17) [ 115.628331][ T5312] FAULT_INJECTION: forcing a failure. [ 115.628331][ T5312] name failslab, interval 1, probability 0, space 0, times 0 [ 115.640979][ T5312] CPU: 1 PID: 5312 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 115.649683][ T5312] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 115.659812][ T5312] Call Trace: [ 115.663071][ T5312] [ 115.666020][ T5312] dump_stack_lvl+0xd6/0x122 [ 115.670715][ T5312] dump_stack+0x11/0x1b [ 115.674934][ T5312] should_fail+0x23c/0x250 [ 115.679347][ T5312] __should_failslab+0x81/0x90 [ 115.684149][ T5312] should_failslab+0x5/0x20 [ 115.688634][ T5312] kmem_cache_alloc_node_trace+0x61/0x310 [ 115.694391][ T5312] ? __kmalloc_node_track_caller+0x30/0x40 [ 115.700249][ T5312] __kmalloc_node_track_caller+0x30/0x40 [ 115.705877][ T5312] ? ethnl_default_notify+0x17e/0x490 [ 115.711405][ T5312] __alloc_skb+0x19d/0x450 [ 115.715892][ T5312] ethnl_default_notify+0x17e/0x490 [ 115.721130][ T5312] ethnl_netdev_event+0x8d/0xe0 [ 115.725980][ T5312] raw_notifier_call_chain+0x53/0xb0 [ 115.731267][ T5312] netdev_update_features+0xd3/0x130 [ 115.736631][ T5312] hsr_add_port+0x307/0x4a0 [ 115.741120][ T5312] hsr_dev_finalize+0x2a3/0x460 [ 115.746030][ T5312] hsr_newlink+0x40d/0x450 [ 115.750500][ T5312] ? hsr_get_node_list+0x450/0x450 [ 115.755628][ T5312] rtnl_newlink+0xdae/0x13b0 [ 115.760208][ T5312] ? rtnl_setlink+0x2a0/0x2a0 [ 115.764929][ T5312] rtnetlink_rcv_msg+0x745/0x7e0 [ 115.769906][ T5312] ? ___cache_free+0x46/0x300 [ 115.774629][ T5312] ? kmem_cache_free+0x65/0x110 [ 115.779466][ T5312] ? __kfree_skb+0xfe/0x150 [ 115.783950][ T5312] ? consume_skb+0x48/0x160 [ 115.788513][ T5312] ? nlmon_xmit+0x5f/0x70 [ 115.792869][ T5312] ? __this_cpu_preempt_check+0x18/0x20 [ 115.798396][ T5312] ? __local_bh_enable_ip+0x4d/0x70 [ 115.803576][ T5312] ? local_bh_enable+0x1b/0x20 [ 115.808342][ T5312] ? __dev_queue_xmit+0x597/0xf70 [ 115.813345][ T5312] ? __skb_clone+0x2db/0x300 [ 115.817951][ T5312] ? __rcu_read_unlock+0x5c/0x290 [ 115.823018][ T5312] netlink_rcv_skb+0x14e/0x250 [ 115.827762][ T5312] ? rtnetlink_bind+0x60/0x60 [ 115.832456][ T5312] rtnetlink_rcv+0x18/0x20 [ 115.836848][ T5312] netlink_unicast+0x5fc/0x6c0 [ 115.841608][ T5312] netlink_sendmsg+0x6e1/0x7d0 [ 115.846361][ T5312] ? netlink_getsockopt+0x720/0x720 [ 115.851598][ T5312] ____sys_sendmsg+0x39a/0x510 [ 115.856349][ T5312] __sys_sendmsg+0x195/0x230 [ 115.860977][ T5312] __x64_sys_sendmsg+0x42/0x50 [ 115.865807][ T5312] do_syscall_64+0x44/0xd0 [ 115.870256][ T5312] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 115.876155][ T5312] RIP: 0033:0x7ffb90e2cae9 [ 115.880590][ T5312] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 115.900255][ T5312] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 115.908655][ T5312] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 115.916666][ T5312] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 23:48:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xc, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 115.924617][ T5312] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 115.932585][ T5312] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 115.940555][ T5312] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 115.948522][ T5312] 23:48:18 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x74, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 18) 23:48:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xb, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:18 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xb, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xd, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 116.073665][ T5325] FAULT_INJECTION: forcing a failure. [ 116.073665][ T5325] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 116.087013][ T5325] CPU: 0 PID: 5325 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 116.095743][ T5325] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 116.105776][ T5325] Call Trace: [ 116.109055][ T5325] [ 116.112007][ T5325] dump_stack_lvl+0xd6/0x122 [ 116.116623][ T5325] dump_stack+0x11/0x1b [ 116.120767][ T5325] should_fail+0x23c/0x250 [ 116.125182][ T5325] __alloc_pages+0x102/0x330 [ 116.129768][ T5325] alloc_pages+0x382/0x3d0 [ 116.134158][ T5325] get_zeroed_page+0x13/0x40 [ 116.138785][ T5325] dev_alloc_name_ns+0x30d/0x630 [ 116.143759][ T5325] ? dev_set_mtu_ext+0x16a/0x5f0 [ 116.148723][ T5325] register_netdevice+0x26e/0x10b0 [ 116.153875][ T5325] hsr_dev_finalize+0x2da/0x460 [ 116.158712][ T5325] hsr_newlink+0x40d/0x450 [ 116.163153][ T5325] ? hsr_get_node_list+0x450/0x450 [ 116.168299][ T5325] rtnl_newlink+0xdae/0x13b0 [ 116.172900][ T5325] ? __rcu_read_unlock+0x5c/0x290 [ 116.177985][ T5325] ? rtnl_setlink+0x2a0/0x2a0 [ 116.182793][ T5325] rtnetlink_rcv_msg+0x745/0x7e0 [ 116.187716][ T5325] ? ___cache_free+0x46/0x300 [ 116.192454][ T5325] ? kmem_cache_free+0x65/0x110 [ 116.197367][ T5325] ? __kfree_skb+0xfe/0x150 [ 116.201855][ T5325] ? consume_skb+0x48/0x160 [ 116.206491][ T5325] ? nlmon_xmit+0x5f/0x70 [ 116.210832][ T5325] ? __this_cpu_preempt_check+0x18/0x20 [ 116.216401][ T5325] ? __local_bh_enable_ip+0x4d/0x70 [ 116.221722][ T5325] ? local_bh_enable+0x1b/0x20 [ 116.226551][ T5325] ? __dev_queue_xmit+0x597/0xf70 [ 116.231652][ T5325] ? __skb_clone+0x2db/0x300 [ 116.236299][ T5325] ? __rcu_read_unlock+0x5c/0x290 [ 116.241453][ T5325] netlink_rcv_skb+0x14e/0x250 [ 116.246274][ T5325] ? rtnetlink_bind+0x60/0x60 [ 116.250940][ T5325] rtnetlink_rcv+0x18/0x20 [ 116.255426][ T5325] netlink_unicast+0x5fc/0x6c0 [ 116.260315][ T5325] netlink_sendmsg+0x6e1/0x7d0 [ 116.265104][ T5325] ? netlink_getsockopt+0x720/0x720 [ 116.270475][ T5325] ____sys_sendmsg+0x39a/0x510 [ 116.275243][ T5325] __sys_sendmsg+0x195/0x230 [ 116.279832][ T5325] __x64_sys_sendmsg+0x42/0x50 [ 116.284606][ T5325] do_syscall_64+0x44/0xd0 [ 116.289094][ T5325] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 116.294977][ T5325] RIP: 0033:0x7ffb90e2cae9 [ 116.299374][ T5325] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 23:48:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 19) [ 116.318966][ T5325] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 116.327362][ T5325] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 116.335352][ T5325] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 116.343464][ T5325] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 116.351536][ T5325] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 116.359546][ T5325] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 116.367507][ T5325] 23:48:18 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0xb, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:18 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x7a, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) [ 116.420550][ T5336] FAULT_INJECTION: forcing a failure. [ 116.420550][ T5336] name failslab, interval 1, probability 0, space 0, times 0 [ 116.433223][ T5336] CPU: 0 PID: 5336 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 116.441892][ T5336] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 116.451963][ T5336] Call Trace: [ 116.455391][ T5336] [ 116.458307][ T5336] dump_stack_lvl+0xd6/0x122 [ 116.462882][ T5336] dump_stack+0x11/0x1b [ 116.467022][ T5336] should_fail+0x23c/0x250 [ 116.471452][ T5336] ? register_netdevice+0x369/0x10b0 [ 116.476725][ T5336] __should_failslab+0x81/0x90 [ 116.481470][ T5336] should_failslab+0x5/0x20 [ 116.485955][ T5336] kmem_cache_alloc_trace+0x52/0x350 [ 116.491221][ T5336] register_netdevice+0x369/0x10b0 [ 116.496315][ T5336] hsr_dev_finalize+0x2da/0x460 [ 116.501316][ T5336] hsr_newlink+0x40d/0x450 [ 116.505713][ T5336] ? hsr_get_node_list+0x450/0x450 [ 116.510847][ T5336] rtnl_newlink+0xdae/0x13b0 [ 116.515574][ T5336] ? __rcu_read_unlock+0x5c/0x290 [ 116.520589][ T5336] ? rtnl_setlink+0x2a0/0x2a0 [ 116.525247][ T5336] rtnetlink_rcv_msg+0x745/0x7e0 [ 116.530214][ T5336] ? ___cache_free+0x46/0x300 [ 116.534929][ T5336] ? kmem_cache_free+0x65/0x110 [ 116.539822][ T5336] ? __kfree_skb+0xfe/0x150 [ 116.544419][ T5336] ? consume_skb+0x48/0x160 [ 116.548919][ T5336] ? nlmon_xmit+0x5f/0x70 [ 116.553270][ T5336] ? __this_cpu_preempt_check+0x18/0x20 [ 116.558865][ T5336] ? __local_bh_enable_ip+0x4d/0x70 [ 116.564171][ T5336] ? local_bh_enable+0x1b/0x20 [ 116.568930][ T5336] ? __dev_queue_xmit+0x597/0xf70 [ 116.573933][ T5336] ? __skb_clone+0x2db/0x300 [ 116.578506][ T5336] ? __rcu_read_unlock+0x5c/0x290 [ 116.583539][ T5336] netlink_rcv_skb+0x14e/0x250 [ 116.588408][ T5336] ? rtnetlink_bind+0x60/0x60 [ 116.593088][ T5336] rtnetlink_rcv+0x18/0x20 [ 116.597493][ T5336] netlink_unicast+0x5fc/0x6c0 [ 116.602285][ T5336] netlink_sendmsg+0x6e1/0x7d0 [ 116.607067][ T5336] ? netlink_getsockopt+0x720/0x720 [ 116.612302][ T5336] ____sys_sendmsg+0x39a/0x510 [ 116.617100][ T5336] __sys_sendmsg+0x195/0x230 [ 116.621735][ T5336] __x64_sys_sendmsg+0x42/0x50 [ 116.626505][ T5336] do_syscall_64+0x44/0xd0 [ 116.630904][ T5336] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 116.636782][ T5336] RIP: 0033:0x7ffb90e2cae9 [ 116.641183][ T5336] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 116.660773][ T5336] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 23:48:19 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 20) [ 116.669174][ T5336] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 116.677123][ T5336] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 116.685091][ T5336] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 116.693057][ T5336] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 116.701019][ T5336] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 116.708984][ T5336] 23:48:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xc, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xe, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xc, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 116.782511][ T5344] FAULT_INJECTION: forcing a failure. [ 116.782511][ T5344] name failslab, interval 1, probability 0, space 0, times 0 [ 116.795222][ T5344] CPU: 1 PID: 5344 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 116.803925][ T5344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 116.813961][ T5344] Call Trace: [ 116.817223][ T5344] [ 116.820172][ T5344] dump_stack_lvl+0xd6/0x122 [ 116.824785][ T5344] dump_stack+0x11/0x1b [ 116.829041][ T5344] should_fail+0x23c/0x250 [ 116.833434][ T5344] ? kvasprintf_const+0xec/0x100 [ 116.838420][ T5344] __should_failslab+0x81/0x90 [ 116.843185][ T5344] should_failslab+0x5/0x20 [ 116.847703][ T5344] __kmalloc_track_caller+0x6d/0x370 [ 116.852982][ T5344] kstrdup_const+0x51/0x90 [ 116.857408][ T5344] kvasprintf_const+0xec/0x100 [ 116.862291][ T5344] kobject_set_name_vargs+0x43/0xe0 [ 116.867632][ T5344] dev_set_name+0x80/0xa0 [ 116.871943][ T5344] ? hrtimer_init+0xfc/0x1d0 [ 116.876523][ T5344] ? netdev_register_kobject+0x5f/0x230 [ 116.882083][ T5344] ? device_initialize+0x23f/0x260 [ 116.887179][ T5344] netdev_register_kobject+0x7a/0x230 [ 116.892674][ T5344] register_netdevice+0xba5/0x10b0 [ 116.897868][ T5344] hsr_dev_finalize+0x2da/0x460 [ 116.902718][ T5344] hsr_newlink+0x40d/0x450 [ 116.907131][ T5344] ? hsr_get_node_list+0x450/0x450 [ 116.912304][ T5344] rtnl_newlink+0xdae/0x13b0 [ 116.916990][ T5344] ? rtnl_setlink+0x2a0/0x2a0 [ 116.921649][ T5344] rtnetlink_rcv_msg+0x745/0x7e0 [ 116.926635][ T5344] ? ___cache_free+0x46/0x300 [ 116.931302][ T5344] ? kmem_cache_free+0x65/0x110 [ 116.936212][ T5344] ? __kfree_skb+0xfe/0x150 [ 116.940825][ T5344] ? consume_skb+0x48/0x160 [ 116.945375][ T5344] ? nlmon_xmit+0x5f/0x70 [ 116.949729][ T5344] ? __this_cpu_preempt_check+0x18/0x20 [ 116.955276][ T5344] ? __local_bh_enable_ip+0x4d/0x70 [ 116.960460][ T5344] ? local_bh_enable+0x1b/0x20 [ 116.965219][ T5344] ? __dev_queue_xmit+0x597/0xf70 [ 116.970235][ T5344] ? __skb_clone+0x2db/0x300 [ 116.974891][ T5344] ? __rcu_read_unlock+0x5c/0x290 [ 116.979894][ T5344] netlink_rcv_skb+0x14e/0x250 [ 116.984717][ T5344] ? rtnetlink_bind+0x60/0x60 [ 116.989380][ T5344] rtnetlink_rcv+0x18/0x20 [ 116.993792][ T5344] netlink_unicast+0x5fc/0x6c0 [ 116.998596][ T5344] netlink_sendmsg+0x6e1/0x7d0 [ 117.003338][ T5344] ? netlink_getsockopt+0x720/0x720 [ 117.008580][ T5344] ____sys_sendmsg+0x39a/0x510 [ 117.013323][ T5344] __sys_sendmsg+0x195/0x230 [ 117.017927][ T5344] __x64_sys_sendmsg+0x42/0x50 [ 117.022700][ T5344] do_syscall_64+0x44/0xd0 [ 117.027134][ T5344] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 117.033022][ T5344] RIP: 0033:0x7ffb90e2cae9 [ 117.037420][ T5344] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 117.057077][ T5344] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 117.065514][ T5344] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 117.073463][ T5344] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 23:48:19 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 21) [ 117.081409][ T5344] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 117.089398][ T5344] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 117.097409][ T5344] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 117.105376][ T5344] 23:48:19 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0xc, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:19 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x95, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) [ 117.155400][ T5354] FAULT_INJECTION: forcing a failure. [ 117.155400][ T5354] name failslab, interval 1, probability 0, space 0, times 0 [ 117.168065][ T5354] CPU: 1 PID: 5354 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 117.176735][ T5354] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 117.186779][ T5354] Call Trace: [ 117.190036][ T5354] [ 117.192946][ T5354] dump_stack_lvl+0xd6/0x122 [ 117.197550][ T5354] dump_stack+0x11/0x1b [ 117.201714][ T5354] should_fail+0x23c/0x250 [ 117.206162][ T5354] ? device_add+0x96/0xf40 [ 117.210569][ T5354] __should_failslab+0x81/0x90 [ 117.215334][ T5354] should_failslab+0x5/0x20 [ 117.219824][ T5354] kmem_cache_alloc_trace+0x52/0x350 [ 117.225096][ T5354] ? kfree_const+0x35/0x40 [ 117.229589][ T5354] device_add+0x96/0xf40 [ 117.233839][ T5354] ? hrtimer_init+0xfc/0x1d0 [ 117.238455][ T5354] ? netdev_register_kobject+0x5f/0x230 [ 117.243995][ T5354] netdev_register_kobject+0xfd/0x230 [ 117.249345][ T5354] register_netdevice+0xba5/0x10b0 [ 117.254439][ T5354] hsr_dev_finalize+0x2da/0x460 [ 117.259449][ T5354] hsr_newlink+0x40d/0x450 [ 117.263929][ T5354] ? hsr_get_node_list+0x450/0x450 [ 117.269021][ T5354] rtnl_newlink+0xdae/0x13b0 [ 117.273749][ T5354] ? __rcu_read_unlock+0x5c/0x290 [ 117.278786][ T5354] ? rtnl_setlink+0x2a0/0x2a0 [ 117.283519][ T5354] rtnetlink_rcv_msg+0x745/0x7e0 [ 117.288537][ T5354] ? ___cache_free+0x46/0x300 [ 117.293205][ T5354] ? kmem_cache_free+0x65/0x110 [ 117.298094][ T5354] ? __kfree_skb+0xfe/0x150 [ 117.302582][ T5354] ? consume_skb+0x48/0x160 [ 117.307189][ T5354] ? nlmon_xmit+0x5f/0x70 [ 117.311499][ T5354] ? __this_cpu_preempt_check+0x18/0x20 [ 117.317055][ T5354] ? __local_bh_enable_ip+0x4d/0x70 [ 117.322247][ T5354] ? local_bh_enable+0x1b/0x20 [ 117.327064][ T5354] ? __dev_queue_xmit+0x597/0xf70 [ 117.332152][ T5354] ? __skb_clone+0x2db/0x300 [ 117.336783][ T5354] ? __rcu_read_unlock+0x5c/0x290 [ 117.341858][ T5354] netlink_rcv_skb+0x14e/0x250 [ 117.346606][ T5354] ? rtnetlink_bind+0x60/0x60 [ 117.351290][ T5354] rtnetlink_rcv+0x18/0x20 [ 117.355708][ T5354] netlink_unicast+0x5fc/0x6c0 [ 117.360477][ T5354] netlink_sendmsg+0x6e1/0x7d0 [ 117.365246][ T5354] ? netlink_getsockopt+0x720/0x720 [ 117.370490][ T5354] ____sys_sendmsg+0x39a/0x510 [ 117.375299][ T5354] __sys_sendmsg+0x195/0x230 [ 117.379873][ T5354] __x64_sys_sendmsg+0x42/0x50 [ 117.384726][ T5354] do_syscall_64+0x44/0xd0 [ 117.389120][ T5354] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 117.395052][ T5354] RIP: 0033:0x7ffb90e2cae9 [ 117.399487][ T5354] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 117.419226][ T5354] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 117.427638][ T5354] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 117.435646][ T5354] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 117.443603][ T5354] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 23:48:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xd, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:20 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 22) [ 117.451576][ T5354] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 117.459558][ T5354] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 117.467593][ T5354] 23:48:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 117.518977][ T5365] FAULT_INJECTION: forcing a failure. [ 117.518977][ T5365] name failslab, interval 1, probability 0, space 0, times 0 [ 117.531635][ T5365] CPU: 1 PID: 5365 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 117.540300][ T5365] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 117.550333][ T5365] Call Trace: [ 117.553600][ T5365] [ 117.556508][ T5365] dump_stack_lvl+0xd6/0x122 [ 117.561167][ T5365] dump_stack+0x11/0x1b [ 117.565389][ T5365] should_fail+0x23c/0x250 [ 117.569808][ T5365] ? __kernfs_new_node+0x41/0x340 [ 117.574812][ T5365] __should_failslab+0x81/0x90 [ 117.579555][ T5365] should_failslab+0x5/0x20 [ 117.584038][ T5365] __kmalloc_track_caller+0x6d/0x370 [ 117.589344][ T5365] kstrdup_const+0x51/0x90 [ 117.593742][ T5365] __kernfs_new_node+0x41/0x340 [ 117.598597][ T5365] ? make_kgid+0x127/0x180 [ 117.602998][ T5365] ? rmqueue+0x4a/0xd20 [ 117.607218][ T5365] ? net_ns_get_ownership+0xaa/0xc0 [ 117.612397][ T5365] ? net_namespace+0x20/0x20 [ 117.616965][ T5365] kernfs_create_dir_ns+0x5e/0x140 [ 117.622167][ T5365] sysfs_create_dir_ns+0xa3/0x1a0 [ 117.627174][ T5365] kobject_add_internal+0x456/0x840 [ 117.632367][ T5365] kobject_add+0xd7/0x150 [ 117.636711][ T5365] ? device_add+0x30d/0xf40 [ 117.641206][ T5365] ? get_device_parent+0x1f8/0x310 [ 117.646314][ T5365] device_add+0x31d/0xf40 [ 117.650741][ T5365] ? hrtimer_init+0xfc/0x1d0 [ 117.655342][ T5365] ? netdev_register_kobject+0x5f/0x230 [ 117.660917][ T5365] netdev_register_kobject+0xfd/0x230 [ 117.666267][ T5365] register_netdevice+0xba5/0x10b0 [ 117.671543][ T5365] hsr_dev_finalize+0x2da/0x460 [ 117.676395][ T5365] hsr_newlink+0x40d/0x450 [ 117.680794][ T5365] ? hsr_get_node_list+0x450/0x450 [ 117.685978][ T5365] rtnl_newlink+0xdae/0x13b0 [ 117.690681][ T5365] ? __rcu_read_unlock+0x5c/0x290 [ 117.695744][ T5365] ? rtnl_setlink+0x2a0/0x2a0 [ 117.700406][ T5365] rtnetlink_rcv_msg+0x745/0x7e0 [ 117.705383][ T5365] ? ___cache_free+0x46/0x300 [ 117.710085][ T5365] ? kmem_cache_free+0x65/0x110 [ 117.714914][ T5365] ? __kfree_skb+0xfe/0x150 [ 117.719525][ T5365] ? consume_skb+0x48/0x160 [ 117.724026][ T5365] ? nlmon_xmit+0x5f/0x70 [ 117.728401][ T5365] ? __this_cpu_preempt_check+0x18/0x20 [ 117.733978][ T5365] ? __local_bh_enable_ip+0x4d/0x70 [ 117.739229][ T5365] ? local_bh_enable+0x1b/0x20 [ 117.744049][ T5365] ? __dev_queue_xmit+0x597/0xf70 [ 117.749053][ T5365] ? __skb_clone+0x2db/0x300 [ 117.753711][ T5365] ? __rcu_read_unlock+0x5c/0x290 [ 117.758755][ T5365] netlink_rcv_skb+0x14e/0x250 [ 117.763573][ T5365] ? rtnetlink_bind+0x60/0x60 [ 117.768245][ T5365] rtnetlink_rcv+0x18/0x20 [ 117.772668][ T5365] netlink_unicast+0x5fc/0x6c0 [ 117.777432][ T5365] netlink_sendmsg+0x6e1/0x7d0 [ 117.782240][ T5365] ? netlink_getsockopt+0x720/0x720 [ 117.787504][ T5365] ____sys_sendmsg+0x39a/0x510 [ 117.792301][ T5365] __sys_sendmsg+0x195/0x230 [ 117.796923][ T5365] __x64_sys_sendmsg+0x42/0x50 [ 117.801676][ T5365] do_syscall_64+0x44/0xd0 [ 117.806082][ T5365] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 117.812018][ T5365] RIP: 0033:0x7ffb90e2cae9 [ 117.816433][ T5365] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 117.836088][ T5365] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 117.844494][ T5365] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 117.852448][ T5365] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 117.860409][ T5365] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 23:48:20 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 23) 23:48:20 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0xc3, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) [ 117.868419][ T5365] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 117.876384][ T5365] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 117.884468][ T5365] [ 117.887512][ T5365] kobject_add_internal failed for hsr1 (error: -12 parent: net) [ 117.931323][ T5371] FAULT_INJECTION: forcing a failure. [ 117.931323][ T5371] name failslab, interval 1, probability 0, space 0, times 0 [ 117.944009][ T5371] CPU: 1 PID: 5371 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 117.952728][ T5371] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 117.962764][ T5371] Call Trace: [ 117.966036][ T5371] [ 117.968955][ T5371] dump_stack_lvl+0xd6/0x122 [ 117.973565][ T5371] dump_stack+0x11/0x1b [ 117.977721][ T5371] should_fail+0x23c/0x250 [ 117.982163][ T5371] ? device_add+0x96/0xf40 [ 117.986562][ T5371] __should_failslab+0x81/0x90 [ 117.991322][ T5371] should_failslab+0x5/0x20 [ 117.995819][ T5371] kmem_cache_alloc_trace+0x52/0x350 [ 118.001137][ T5371] ? kfree_const+0x35/0x40 [ 118.005562][ T5371] device_add+0x96/0xf40 [ 118.009789][ T5371] ? hrtimer_init+0xfc/0x1d0 [ 118.014443][ T5371] ? netdev_register_kobject+0x5f/0x230 [ 118.019972][ T5371] netdev_register_kobject+0xfd/0x230 [ 118.025328][ T5371] register_netdevice+0xba5/0x10b0 [ 118.030438][ T5371] hsr_dev_finalize+0x2da/0x460 [ 118.035279][ T5371] hsr_newlink+0x40d/0x450 [ 118.039684][ T5371] ? hsr_get_node_list+0x450/0x450 [ 118.044836][ T5371] rtnl_newlink+0xdae/0x13b0 [ 118.049423][ T5371] ? __rcu_read_unlock+0x5c/0x290 [ 118.054491][ T5371] ? rtnl_setlink+0x2a0/0x2a0 [ 118.059149][ T5371] rtnetlink_rcv_msg+0x745/0x7e0 [ 118.064144][ T5371] ? ___cache_free+0x46/0x300 [ 118.068819][ T5371] ? kmem_cache_free+0x65/0x110 [ 118.073652][ T5371] ? __kfree_skb+0xfe/0x150 [ 118.078146][ T5371] ? consume_skb+0x48/0x160 [ 118.082799][ T5371] ? nlmon_xmit+0x5f/0x70 [ 118.087257][ T5371] ? __this_cpu_preempt_check+0x18/0x20 [ 118.092825][ T5371] ? __local_bh_enable_ip+0x4d/0x70 [ 118.098118][ T5371] ? local_bh_enable+0x1b/0x20 [ 118.102867][ T5371] ? __dev_queue_xmit+0x597/0xf70 [ 118.107874][ T5371] ? __skb_clone+0x2db/0x300 [ 118.112448][ T5371] ? __rcu_read_unlock+0x5c/0x290 [ 118.117467][ T5371] netlink_rcv_skb+0x14e/0x250 [ 118.122218][ T5371] ? rtnetlink_bind+0x60/0x60 [ 118.126919][ T5371] rtnetlink_rcv+0x18/0x20 [ 118.131391][ T5371] netlink_unicast+0x5fc/0x6c0 [ 118.136144][ T5371] netlink_sendmsg+0x6e1/0x7d0 [ 118.140893][ T5371] ? netlink_getsockopt+0x720/0x720 [ 118.146116][ T5371] ____sys_sendmsg+0x39a/0x510 [ 118.150868][ T5371] __sys_sendmsg+0x195/0x230 [ 118.155446][ T5371] __x64_sys_sendmsg+0x42/0x50 [ 118.160204][ T5371] do_syscall_64+0x44/0xd0 [ 118.164673][ T5371] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 118.170604][ T5371] RIP: 0033:0x7ffb90e2cae9 [ 118.175079][ T5371] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 118.194666][ T5371] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 118.203057][ T5371] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 118.211010][ T5371] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 118.219018][ T5371] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 23:48:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xe, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xd, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:20 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 24) 23:48:20 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0xd, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) [ 118.226989][ T5371] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 118.234964][ T5371] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 118.243033][ T5371] 23:48:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x10, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 118.304614][ T5380] FAULT_INJECTION: forcing a failure. [ 118.304614][ T5380] name failslab, interval 1, probability 0, space 0, times 0 [ 118.317282][ T5380] CPU: 0 PID: 5380 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 118.325971][ T5380] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 118.336044][ T5380] Call Trace: [ 118.339314][ T5380] [ 118.342250][ T5380] dump_stack_lvl+0xd6/0x122 [ 118.346841][ T5380] dump_stack+0x11/0x1b [ 118.351093][ T5380] should_fail+0x23c/0x250 [ 118.355484][ T5380] ? radix_tree_node_alloc+0x142/0x200 [ 118.361010][ T5380] __should_failslab+0x81/0x90 [ 118.365789][ T5380] should_failslab+0x5/0x20 [ 118.370349][ T5380] kmem_cache_alloc+0x4f/0x320 [ 118.375106][ T5380] radix_tree_node_alloc+0x142/0x200 [ 118.380448][ T5380] idr_get_free+0x22a/0x5d0 [ 118.384996][ T5380] idr_alloc_cyclic+0xf4/0x2f0 [ 118.389738][ T5380] __kernfs_new_node+0xb4/0x340 [ 118.394621][ T5380] ? make_kgid+0x127/0x180 [ 118.399019][ T5380] ? net_ns_get_ownership+0xaa/0xc0 [ 118.404219][ T5380] ? net_namespace+0x20/0x20 [ 118.408781][ T5380] kernfs_create_dir_ns+0x5e/0x140 [ 118.413873][ T5380] sysfs_create_dir_ns+0xa3/0x1a0 [ 118.418909][ T5380] kobject_add_internal+0x456/0x840 [ 118.424087][ T5380] kobject_add+0xd7/0x150 [ 118.428396][ T5380] ? device_add+0x30d/0xf40 [ 118.432900][ T5380] ? get_device_parent+0x1f8/0x310 [ 118.438032][ T5380] device_add+0x31d/0xf40 [ 118.442359][ T5380] ? hrtimer_init+0xfc/0x1d0 [ 118.446946][ T5380] ? netdev_register_kobject+0x5f/0x230 [ 118.452483][ T5380] netdev_register_kobject+0xfd/0x230 [ 118.457872][ T5380] register_netdevice+0xba5/0x10b0 [ 118.463043][ T5380] hsr_dev_finalize+0x2da/0x460 [ 118.467877][ T5380] hsr_newlink+0x40d/0x450 [ 118.472272][ T5380] ? hsr_get_node_list+0x450/0x450 [ 118.477431][ T5380] rtnl_newlink+0xdae/0x13b0 [ 118.482210][ T5380] ? __rcu_read_unlock+0x5c/0x290 [ 118.487249][ T5380] ? rtnl_setlink+0x2a0/0x2a0 [ 118.491969][ T5380] rtnetlink_rcv_msg+0x745/0x7e0 [ 118.496939][ T5380] ? ___cache_free+0x46/0x300 [ 118.501629][ T5380] ? kmem_cache_free+0x65/0x110 [ 118.506530][ T5380] ? __kfree_skb+0xfe/0x150 [ 118.511016][ T5380] ? consume_skb+0x48/0x160 [ 118.515527][ T5380] ? nlmon_xmit+0x5f/0x70 [ 118.519846][ T5380] ? __this_cpu_preempt_check+0x18/0x20 [ 118.525387][ T5380] ? __local_bh_enable_ip+0x4d/0x70 [ 118.530564][ T5380] ? local_bh_enable+0x1b/0x20 [ 118.535315][ T5380] ? __dev_queue_xmit+0x597/0xf70 [ 118.540467][ T5380] ? __skb_clone+0x2db/0x300 [ 118.545089][ T5380] ? __rcu_read_unlock+0x5c/0x290 [ 118.550158][ T5380] netlink_rcv_skb+0x14e/0x250 [ 118.554906][ T5380] ? rtnetlink_bind+0x60/0x60 [ 118.559577][ T5380] rtnetlink_rcv+0x18/0x20 [ 118.563984][ T5380] netlink_unicast+0x5fc/0x6c0 [ 118.568729][ T5380] netlink_sendmsg+0x6e1/0x7d0 [ 118.573495][ T5380] ? netlink_getsockopt+0x720/0x720 [ 118.578718][ T5380] ____sys_sendmsg+0x39a/0x510 [ 118.583466][ T5380] __sys_sendmsg+0x195/0x230 [ 118.588094][ T5380] __x64_sys_sendmsg+0x42/0x50 [ 118.592855][ T5380] do_syscall_64+0x44/0xd0 [ 118.597276][ T5380] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 118.603281][ T5380] RIP: 0033:0x7ffb90e2cae9 [ 118.607803][ T5380] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 118.627389][ T5380] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 118.635784][ T5380] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 118.643764][ T5380] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 23:48:21 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x1df, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) [ 118.651822][ T5380] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 118.659842][ T5380] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 118.667860][ T5380] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 118.675841][ T5380] 23:48:21 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 25) 23:48:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xe, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:21 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x11, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 118.744782][ T5380] syz-executor.4 (5380) used greatest stack depth: 9432 bytes left [ 118.778112][ T5396] FAULT_INJECTION: forcing a failure. [ 118.778112][ T5396] name failslab, interval 1, probability 0, space 0, times 0 23:48:21 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x211, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 118.790785][ T5396] CPU: 0 PID: 5396 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 118.799467][ T5396] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 118.809519][ T5396] Call Trace: [ 118.812787][ T5396] [ 118.815712][ T5396] dump_stack_lvl+0xd6/0x122 [ 118.820331][ T5396] dump_stack+0x11/0x1b [ 118.824490][ T5396] should_fail+0x23c/0x250 [ 118.829026][ T5396] ? radix_tree_node_alloc+0x142/0x200 [ 118.834494][ T5396] __should_failslab+0x81/0x90 [ 118.839398][ T5396] should_failslab+0x5/0x20 [ 118.844038][ T5396] kmem_cache_alloc+0x4f/0x320 [ 118.848852][ T5396] ? radix_tree_node_alloc+0x142/0x200 [ 118.854291][ T5396] radix_tree_node_alloc+0x142/0x200 [ 118.859557][ T5396] ? enqueue_task_fair+0xda/0x520 [ 118.864573][ T5396] idr_get_free+0x22a/0x5d0 [ 118.869098][ T5396] idr_alloc_cyclic+0xf4/0x2f0 [ 118.873846][ T5396] __kernfs_new_node+0xb4/0x340 [ 118.878681][ T5396] ? make_kgid+0x127/0x180 [ 118.883176][ T5396] ? net_ns_get_ownership+0xaa/0xc0 [ 118.888518][ T5396] ? net_namespace+0x20/0x20 [ 118.893104][ T5396] kernfs_create_dir_ns+0x5e/0x140 [ 118.898316][ T5396] sysfs_create_dir_ns+0xa3/0x1a0 [ 118.903377][ T5396] kobject_add_internal+0x456/0x840 [ 118.908591][ T5396] kobject_add+0xd7/0x150 [ 118.912943][ T5396] ? device_add+0x30d/0xf40 [ 118.917492][ T5396] ? get_device_parent+0x1f8/0x310 [ 118.922599][ T5396] device_add+0x31d/0xf40 [ 118.926909][ T5396] ? hrtimer_init+0xfc/0x1d0 [ 118.931477][ T5396] ? netdev_register_kobject+0x5f/0x230 [ 118.937002][ T5396] netdev_register_kobject+0xfd/0x230 [ 118.942354][ T5396] register_netdevice+0xba5/0x10b0 [ 118.947475][ T5396] hsr_dev_finalize+0x2da/0x460 [ 118.952359][ T5396] hsr_newlink+0x40d/0x450 [ 118.956775][ T5396] ? hsr_get_node_list+0x450/0x450 [ 118.961934][ T5396] rtnl_newlink+0xdae/0x13b0 [ 118.966540][ T5396] ? __rcu_read_unlock+0x5c/0x290 [ 118.971558][ T5396] ? rtnl_setlink+0x2a0/0x2a0 [ 118.976221][ T5396] rtnetlink_rcv_msg+0x745/0x7e0 [ 118.981159][ T5396] ? ___cache_free+0x46/0x300 [ 118.985817][ T5396] ? kmem_cache_free+0x65/0x110 [ 118.990645][ T5396] ? __kfree_skb+0xfe/0x150 [ 118.995137][ T5396] ? consume_skb+0x48/0x160 [ 118.999631][ T5396] ? nlmon_xmit+0x5f/0x70 [ 119.004052][ T5396] ? __this_cpu_preempt_check+0x18/0x20 [ 119.009608][ T5396] ? __local_bh_enable_ip+0x4d/0x70 [ 119.014873][ T5396] ? local_bh_enable+0x1b/0x20 [ 119.019624][ T5396] ? __dev_queue_xmit+0x597/0xf70 [ 119.024641][ T5396] ? __skb_clone+0x2db/0x300 [ 119.029213][ T5396] ? __rcu_read_unlock+0x5c/0x290 [ 119.034391][ T5396] netlink_rcv_skb+0x14e/0x250 [ 119.039183][ T5396] ? rtnetlink_bind+0x60/0x60 [ 119.043943][ T5396] rtnetlink_rcv+0x18/0x20 [ 119.048354][ T5396] netlink_unicast+0x5fc/0x6c0 [ 119.053220][ T5396] netlink_sendmsg+0x6e1/0x7d0 [ 119.057966][ T5396] ? netlink_getsockopt+0x720/0x720 [ 119.063154][ T5396] ____sys_sendmsg+0x39a/0x510 [ 119.067914][ T5396] __sys_sendmsg+0x195/0x230 [ 119.072491][ T5396] __x64_sys_sendmsg+0x42/0x50 [ 119.077258][ T5396] do_syscall_64+0x44/0xd0 [ 119.081685][ T5396] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 119.087581][ T5396] RIP: 0033:0x7ffb90e2cae9 [ 119.092000][ T5396] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 119.111719][ T5396] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 119.120118][ T5396] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 119.128078][ T5396] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 119.136031][ T5396] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 23:48:21 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0xe, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) [ 119.144253][ T5396] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 119.152215][ T5396] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 119.160218][ T5396] 23:48:21 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 26) [ 119.235386][ T5408] FAULT_INJECTION: forcing a failure. [ 119.235386][ T5408] name failslab, interval 1, probability 0, space 0, times 0 [ 119.248016][ T5408] CPU: 0 PID: 5408 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 119.256709][ T5408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 119.266743][ T5408] Call Trace: [ 119.270009][ T5408] [ 119.272924][ T5408] dump_stack_lvl+0xd6/0x122 [ 119.277514][ T5408] dump_stack+0x11/0x1b [ 119.281680][ T5408] should_fail+0x23c/0x250 [ 119.286088][ T5408] ? __kernfs_new_node+0x6a/0x340 [ 119.291130][ T5408] __should_failslab+0x81/0x90 [ 119.295962][ T5408] should_failslab+0x5/0x20 [ 119.300505][ T5408] kmem_cache_alloc+0x4f/0x320 [ 119.305252][ T5408] __kernfs_new_node+0x6a/0x340 [ 119.310091][ T5408] ? kernfs_activate+0x2b9/0x2d0 [ 119.315010][ T5408] ? kernfs_add_one+0x356/0x3c0 [ 119.319904][ T5408] kernfs_new_node+0x5b/0xd0 [ 119.324486][ T5408] __kernfs_create_file+0x45/0x1a0 [ 119.329644][ T5408] ? dev_attr_show+0x90/0x90 [ 119.334231][ T5408] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 119.339586][ T5408] sysfs_create_file_ns+0x98/0xd0 [ 119.344619][ T5408] device_create_file+0xa7/0x110 [ 119.349553][ T5408] device_add+0x38e/0xf40 [ 119.353862][ T5408] ? hrtimer_init+0xfc/0x1d0 [ 119.358524][ T5408] ? netdev_register_kobject+0x5f/0x230 [ 119.364058][ T5408] netdev_register_kobject+0xfd/0x230 [ 119.369442][ T5408] register_netdevice+0xba5/0x10b0 [ 119.374626][ T5408] hsr_dev_finalize+0x2da/0x460 [ 119.379541][ T5408] hsr_newlink+0x40d/0x450 [ 119.383973][ T5408] ? hsr_get_node_list+0x450/0x450 [ 119.389160][ T5408] rtnl_newlink+0xdae/0x13b0 [ 119.393740][ T5408] ? __rcu_read_unlock+0x5c/0x290 [ 119.398823][ T5408] ? rtnl_setlink+0x2a0/0x2a0 [ 119.403479][ T5408] rtnetlink_rcv_msg+0x745/0x7e0 [ 119.408400][ T5408] ? ___cache_free+0x46/0x300 [ 119.413126][ T5408] ? kmem_cache_free+0x65/0x110 [ 119.417956][ T5408] ? __kfree_skb+0xfe/0x150 [ 119.422485][ T5408] ? consume_skb+0x48/0x160 [ 119.427031][ T5408] ? nlmon_xmit+0x5f/0x70 [ 119.431340][ T5408] ? __this_cpu_preempt_check+0x18/0x20 [ 119.436948][ T5408] ? __local_bh_enable_ip+0x4d/0x70 [ 119.442284][ T5408] ? local_bh_enable+0x1b/0x20 [ 119.447068][ T5408] ? __dev_queue_xmit+0x597/0xf70 [ 119.452086][ T5408] ? __skb_clone+0x2db/0x300 [ 119.456713][ T5408] ? __rcu_read_unlock+0x5c/0x290 [ 119.461718][ T5408] netlink_rcv_skb+0x14e/0x250 [ 119.466483][ T5408] ? rtnetlink_bind+0x60/0x60 [ 119.471168][ T5408] rtnetlink_rcv+0x18/0x20 [ 119.475584][ T5408] netlink_unicast+0x5fc/0x6c0 [ 119.480426][ T5408] netlink_sendmsg+0x6e1/0x7d0 [ 119.485266][ T5408] ? netlink_getsockopt+0x720/0x720 [ 119.490456][ T5408] ____sys_sendmsg+0x39a/0x510 [ 119.495250][ T5408] __sys_sendmsg+0x195/0x230 [ 119.499857][ T5408] __x64_sys_sendmsg+0x42/0x50 [ 119.504602][ T5408] do_syscall_64+0x44/0xd0 [ 119.509002][ T5408] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 119.514964][ T5408] RIP: 0033:0x7ffb90e2cae9 [ 119.519361][ T5408] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 119.538967][ T5408] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 119.547439][ T5408] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 119.555480][ T5408] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 119.563430][ T5408] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 119.571384][ T5408] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 23:48:22 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 27) [ 119.579346][ T5408] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 119.587354][ T5408] 23:48:22 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x233, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:22 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x12, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:22 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x10, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 119.646050][ T5418] FAULT_INJECTION: forcing a failure. [ 119.646050][ T5418] name failslab, interval 1, probability 0, space 0, times 0 [ 119.658716][ T5418] CPU: 1 PID: 5418 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 119.667499][ T5418] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 119.677590][ T5418] Call Trace: [ 119.680951][ T5418] [ 119.683880][ T5418] dump_stack_lvl+0xd6/0x122 [ 119.688540][ T5418] dump_stack+0x11/0x1b [ 119.692735][ T5418] should_fail+0x23c/0x250 [ 119.697227][ T5418] ? __kernfs_new_node+0x6a/0x340 [ 119.702345][ T5418] __should_failslab+0x81/0x90 [ 119.707102][ T5418] should_failslab+0x5/0x20 [ 119.711614][ T5418] kmem_cache_alloc+0x4f/0x320 [ 119.716378][ T5418] __kernfs_new_node+0x6a/0x340 [ 119.721254][ T5418] ? kernfs_add_one+0x356/0x3c0 [ 119.726092][ T5418] ? __kernfs_create_file+0x189/0x1a0 [ 119.731519][ T5418] kernfs_new_node+0x5b/0xd0 [ 119.736184][ T5418] kernfs_create_link+0x68/0x120 [ 119.741123][ T5418] sysfs_do_create_link_sd+0x6b/0xf0 [ 119.746539][ T5418] sysfs_create_link+0x4d/0x60 [ 119.751327][ T5418] device_add+0x42e/0xf40 [ 119.755808][ T5418] ? hrtimer_init+0xfc/0x1d0 [ 119.760484][ T5418] netdev_register_kobject+0xfd/0x230 [ 119.766097][ T5418] register_netdevice+0xba5/0x10b0 [ 119.771196][ T5418] hsr_dev_finalize+0x2da/0x460 [ 119.776047][ T5418] hsr_newlink+0x40d/0x450 [ 119.780444][ T5418] ? hsr_get_node_list+0x450/0x450 [ 119.785573][ T5418] rtnl_newlink+0xdae/0x13b0 [ 119.790226][ T5418] ? __rcu_read_unlock+0x5c/0x290 [ 119.795252][ T5418] ? rtnl_setlink+0x2a0/0x2a0 [ 119.800095][ T5418] rtnetlink_rcv_msg+0x745/0x7e0 [ 119.805017][ T5418] ? ___cache_free+0x46/0x300 [ 119.809692][ T5418] ? kmem_cache_free+0x65/0x110 [ 119.814575][ T5418] ? __kfree_skb+0xfe/0x150 [ 119.819084][ T5418] ? consume_skb+0x48/0x160 [ 119.823585][ T5418] ? nlmon_xmit+0x5f/0x70 [ 119.827898][ T5418] ? __this_cpu_preempt_check+0x18/0x20 [ 119.833549][ T5418] ? __local_bh_enable_ip+0x4d/0x70 [ 119.838741][ T5418] ? local_bh_enable+0x1b/0x20 [ 119.843493][ T5418] ? __dev_queue_xmit+0x597/0xf70 [ 119.848610][ T5418] ? __skb_clone+0x2db/0x300 [ 119.853181][ T5418] ? __rcu_read_unlock+0x5c/0x290 [ 119.858206][ T5418] netlink_rcv_skb+0x14e/0x250 [ 119.862958][ T5418] ? rtnetlink_bind+0x60/0x60 [ 119.867671][ T5418] rtnetlink_rcv+0x18/0x20 [ 119.872169][ T5418] netlink_unicast+0x5fc/0x6c0 [ 119.876968][ T5418] netlink_sendmsg+0x6e1/0x7d0 [ 119.881779][ T5418] ? netlink_getsockopt+0x720/0x720 [ 119.887051][ T5418] ____sys_sendmsg+0x39a/0x510 [ 119.891824][ T5418] __sys_sendmsg+0x195/0x230 [ 119.896408][ T5418] __x64_sys_sendmsg+0x42/0x50 [ 119.901169][ T5418] do_syscall_64+0x44/0xd0 [ 119.905613][ T5418] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 119.911683][ T5418] RIP: 0033:0x7ffb90e2cae9 [ 119.916090][ T5418] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 119.935681][ T5418] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 23:48:22 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 28) 23:48:22 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0xf, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) [ 119.944077][ T5418] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 119.952069][ T5418] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 119.960021][ T5418] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 119.968078][ T5418] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 119.976038][ T5418] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 119.984055][ T5418] 23:48:22 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x300, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) [ 120.037405][ T5430] FAULT_INJECTION: forcing a failure. [ 120.037405][ T5430] name failslab, interval 1, probability 0, space 0, times 0 [ 120.050179][ T5430] CPU: 1 PID: 5430 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 120.058836][ T5430] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 120.068875][ T5430] Call Trace: [ 120.072134][ T5430] [ 120.075046][ T5430] dump_stack_lvl+0xd6/0x122 [ 120.079620][ T5430] dump_stack+0x11/0x1b [ 120.083758][ T5430] should_fail+0x23c/0x250 [ 120.088154][ T5430] ? __kernfs_new_node+0x41/0x340 [ 120.093160][ T5430] __should_failslab+0x81/0x90 [ 120.098008][ T5430] should_failslab+0x5/0x20 [ 120.102524][ T5430] __kmalloc_track_caller+0x6d/0x370 [ 120.107792][ T5430] kstrdup_const+0x51/0x90 [ 120.112206][ T5430] __kernfs_new_node+0x41/0x340 [ 120.117160][ T5430] ? up_write+0x25/0xc0 [ 120.121361][ T5430] kernfs_new_node+0x5b/0xd0 [ 120.125979][ T5430] kernfs_create_link+0x68/0x120 [ 120.130950][ T5430] sysfs_do_create_link_sd+0x6b/0xf0 [ 120.136347][ T5430] sysfs_create_link+0x4d/0x60 [ 120.141089][ T5430] device_add+0x586/0xf40 [ 120.145496][ T5430] ? hrtimer_init+0xfc/0x1d0 [ 120.150144][ T5430] netdev_register_kobject+0xfd/0x230 [ 120.155493][ T5430] register_netdevice+0xba5/0x10b0 [ 120.160651][ T5430] hsr_dev_finalize+0x2da/0x460 [ 120.165487][ T5430] hsr_newlink+0x40d/0x450 [ 120.169970][ T5430] ? hsr_get_node_list+0x450/0x450 [ 120.175075][ T5430] rtnl_newlink+0xdae/0x13b0 [ 120.179697][ T5430] ? __rcu_read_unlock+0x5c/0x290 [ 120.184769][ T5430] ? rtnl_setlink+0x2a0/0x2a0 [ 120.189507][ T5430] rtnetlink_rcv_msg+0x745/0x7e0 [ 120.194460][ T5430] ? ___cache_free+0x46/0x300 [ 120.199222][ T5430] ? kmem_cache_free+0x65/0x110 [ 120.204054][ T5430] ? __kfree_skb+0xfe/0x150 [ 120.208987][ T5430] ? consume_skb+0x48/0x160 [ 120.213538][ T5430] ? nlmon_xmit+0x5f/0x70 [ 120.217862][ T5430] ? __this_cpu_preempt_check+0x18/0x20 [ 120.223399][ T5430] ? __local_bh_enable_ip+0x4d/0x70 [ 120.228671][ T5430] ? local_bh_enable+0x1b/0x20 [ 120.233430][ T5430] ? __dev_queue_xmit+0x597/0xf70 [ 120.238435][ T5430] ? __skb_clone+0x2db/0x300 [ 120.243027][ T5430] ? __rcu_read_unlock+0x5c/0x290 [ 120.248049][ T5430] netlink_rcv_skb+0x14e/0x250 [ 120.252809][ T5430] ? rtnetlink_bind+0x60/0x60 [ 120.257570][ T5430] rtnetlink_rcv+0x18/0x20 [ 120.261994][ T5430] netlink_unicast+0x5fc/0x6c0 [ 120.266788][ T5430] netlink_sendmsg+0x6e1/0x7d0 [ 120.271533][ T5430] ? netlink_getsockopt+0x720/0x720 [ 120.276767][ T5430] ____sys_sendmsg+0x39a/0x510 [ 120.281522][ T5430] __sys_sendmsg+0x195/0x230 [ 120.286139][ T5430] __x64_sys_sendmsg+0x42/0x50 [ 120.290903][ T5430] do_syscall_64+0x44/0xd0 [ 120.296383][ T5430] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 120.302330][ T5430] RIP: 0033:0x7ffb90e2cae9 [ 120.306721][ T5430] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 120.326411][ T5430] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 120.334814][ T5430] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 120.342763][ T5430] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 120.350716][ T5430] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 120.358694][ T5430] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 120.366726][ T5430] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 120.374675][ T5430] 23:48:22 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 29) 23:48:22 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x11, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:22 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x10, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x15, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 120.440005][ T5438] FAULT_INJECTION: forcing a failure. [ 120.440005][ T5438] name failslab, interval 1, probability 0, space 0, times 0 [ 120.452687][ T5438] CPU: 0 PID: 5438 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 120.461360][ T5438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 120.471431][ T5438] Call Trace: [ 120.474776][ T5438] [ 120.477699][ T5438] dump_stack_lvl+0xd6/0x122 [ 120.482276][ T5438] dump_stack+0x11/0x1b [ 120.486501][ T5438] should_fail+0x23c/0x250 [ 120.490911][ T5438] ? __kernfs_new_node+0x6a/0x340 [ 120.495923][ T5438] __should_failslab+0x81/0x90 [ 120.500741][ T5438] should_failslab+0x5/0x20 [ 120.505230][ T5438] kmem_cache_alloc+0x4f/0x320 [ 120.509979][ T5438] __kernfs_new_node+0x6a/0x340 [ 120.514818][ T5438] ? up_write+0x25/0xc0 [ 120.518957][ T5438] kernfs_new_node+0x5b/0xd0 [ 120.523607][ T5438] kernfs_create_link+0x68/0x120 [ 120.528531][ T5438] sysfs_do_create_link_sd+0x6b/0xf0 [ 120.533798][ T5438] sysfs_create_link+0x4d/0x60 [ 120.538587][ T5438] device_add+0x586/0xf40 [ 120.542904][ T5438] ? hrtimer_init+0xfc/0x1d0 [ 120.547481][ T5438] netdev_register_kobject+0xfd/0x230 [ 120.552834][ T5438] register_netdevice+0xba5/0x10b0 [ 120.557950][ T5438] hsr_dev_finalize+0x2da/0x460 [ 120.562786][ T5438] hsr_newlink+0x40d/0x450 [ 120.567256][ T5438] ? hsr_get_node_list+0x450/0x450 [ 120.572357][ T5438] rtnl_newlink+0xdae/0x13b0 [ 120.577019][ T5438] ? __rcu_read_unlock+0x5c/0x290 [ 120.582023][ T5438] ? rtnl_setlink+0x2a0/0x2a0 [ 120.586745][ T5438] rtnetlink_rcv_msg+0x745/0x7e0 [ 120.591665][ T5438] ? ___cache_free+0x46/0x300 [ 120.596322][ T5438] ? kmem_cache_free+0x65/0x110 [ 120.601218][ T5438] ? __kfree_skb+0xfe/0x150 [ 120.605732][ T5438] ? consume_skb+0x48/0x160 [ 120.610248][ T5438] ? nlmon_xmit+0x5f/0x70 [ 120.614562][ T5438] ? __this_cpu_preempt_check+0x18/0x20 [ 120.620089][ T5438] ? __local_bh_enable_ip+0x4d/0x70 [ 120.625299][ T5438] ? local_bh_enable+0x1b/0x20 [ 120.630044][ T5438] ? __dev_queue_xmit+0x597/0xf70 [ 120.635074][ T5438] ? __skb_clone+0x2db/0x300 [ 120.639647][ T5438] ? __rcu_read_unlock+0x5c/0x290 [ 120.644733][ T5438] netlink_rcv_skb+0x14e/0x250 [ 120.649586][ T5438] ? rtnetlink_bind+0x60/0x60 [ 120.654280][ T5438] rtnetlink_rcv+0x18/0x20 [ 120.658681][ T5438] netlink_unicast+0x5fc/0x6c0 [ 120.663519][ T5438] netlink_sendmsg+0x6e1/0x7d0 [ 120.668273][ T5438] ? netlink_getsockopt+0x720/0x720 [ 120.673473][ T5438] ____sys_sendmsg+0x39a/0x510 [ 120.678290][ T5438] __sys_sendmsg+0x195/0x230 [ 120.682894][ T5438] __x64_sys_sendmsg+0x42/0x50 [ 120.687716][ T5438] do_syscall_64+0x44/0xd0 [ 120.692135][ T5438] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 120.698018][ T5438] RIP: 0033:0x7ffb90e2cae9 [ 120.702447][ T5438] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 120.722131][ T5438] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 120.730571][ T5438] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 23:48:23 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 30) [ 120.738524][ T5438] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 120.746492][ T5438] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 120.754477][ T5438] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 120.762506][ T5438] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 120.770465][ T5438] 23:48:23 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x38d, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) [ 120.807749][ T5447] FAULT_INJECTION: forcing a failure. [ 120.807749][ T5447] name failslab, interval 1, probability 0, space 0, times 0 [ 120.820418][ T5447] CPU: 0 PID: 5447 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 120.829099][ T5447] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 120.839134][ T5447] Call Trace: [ 120.842396][ T5447] [ 120.845365][ T5447] dump_stack_lvl+0xd6/0x122 [ 120.849982][ T5447] dump_stack+0x11/0x1b [ 120.854171][ T5447] should_fail+0x23c/0x250 [ 120.858703][ T5447] ? __kernfs_new_node+0x6a/0x340 [ 120.863773][ T5447] __should_failslab+0x81/0x90 [ 120.868576][ T5447] should_failslab+0x5/0x20 [ 120.873160][ T5447] kmem_cache_alloc+0x4f/0x320 [ 120.877914][ T5447] __kernfs_new_node+0x6a/0x340 [ 120.882750][ T5447] ? mutex_lock+0x9/0x30 [ 120.886982][ T5447] ? selinux_kernfs_init_security+0xd9/0x380 [ 120.892994][ T5447] ? idr_alloc_cyclic+0x26b/0x2f0 [ 120.898064][ T5447] kernfs_new_node+0x5b/0xd0 [ 120.902648][ T5447] __kernfs_create_file+0x45/0x1a0 [ 120.907796][ T5447] ? dev_attr_show+0x90/0x90 [ 120.912386][ T5447] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 120.917796][ T5447] internal_create_group+0x2dd/0x840 [ 120.923074][ T5447] sysfs_create_groups+0x3d/0xf0 [ 120.928058][ T5447] device_add+0x606/0xf40 [ 120.932493][ T5447] ? hrtimer_init+0xfc/0x1d0 [ 120.937068][ T5447] netdev_register_kobject+0xfd/0x230 [ 120.942447][ T5447] register_netdevice+0xba5/0x10b0 [ 120.947546][ T5447] hsr_dev_finalize+0x2da/0x460 [ 120.952379][ T5447] hsr_newlink+0x40d/0x450 [ 120.956888][ T5447] ? hsr_get_node_list+0x450/0x450 [ 120.962011][ T5447] rtnl_newlink+0xdae/0x13b0 [ 120.966723][ T5447] ? __rcu_read_unlock+0x5c/0x290 [ 120.971741][ T5447] ? rtnl_setlink+0x2a0/0x2a0 [ 120.976409][ T5447] rtnetlink_rcv_msg+0x745/0x7e0 [ 120.981380][ T5447] ? ___cache_free+0x46/0x300 [ 120.986152][ T5447] ? kmem_cache_free+0x65/0x110 [ 120.990985][ T5447] ? __kfree_skb+0xfe/0x150 [ 120.995546][ T5447] ? consume_skb+0x48/0x160 [ 121.000039][ T5447] ? nlmon_xmit+0x5f/0x70 [ 121.004414][ T5447] ? __this_cpu_preempt_check+0x18/0x20 [ 121.009951][ T5447] ? __local_bh_enable_ip+0x4d/0x70 [ 121.015129][ T5447] ? local_bh_enable+0x1b/0x20 [ 121.019873][ T5447] ? __dev_queue_xmit+0x597/0xf70 [ 121.024971][ T5447] ? __skb_clone+0x2db/0x300 [ 121.029540][ T5447] ? __rcu_read_unlock+0x5c/0x290 [ 121.034555][ T5447] netlink_rcv_skb+0x14e/0x250 [ 121.039365][ T5447] ? rtnetlink_bind+0x60/0x60 [ 121.044124][ T5447] rtnetlink_rcv+0x18/0x20 [ 121.048599][ T5447] netlink_unicast+0x5fc/0x6c0 [ 121.053359][ T5447] netlink_sendmsg+0x6e1/0x7d0 [ 121.058123][ T5447] ? netlink_getsockopt+0x720/0x720 [ 121.063329][ T5447] ____sys_sendmsg+0x39a/0x510 [ 121.068128][ T5447] __sys_sendmsg+0x195/0x230 [ 121.072746][ T5447] __x64_sys_sendmsg+0x42/0x50 [ 121.077491][ T5447] do_syscall_64+0x44/0xd0 [ 121.081889][ T5447] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 121.087791][ T5447] RIP: 0033:0x7ffb90e2cae9 [ 121.092185][ T5447] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 121.111832][ T5447] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 121.120248][ T5447] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 121.128211][ T5447] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 121.136169][ T5447] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 121.144126][ T5447] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 23:48:23 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x12, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 121.152096][ T5447] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 121.160162][ T5447] 23:48:23 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x10, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x11, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x25, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:23 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 31) [ 121.260209][ T5462] FAULT_INJECTION: forcing a failure. [ 121.260209][ T5462] name failslab, interval 1, probability 0, space 0, times 0 [ 121.272884][ T5462] CPU: 1 PID: 5462 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 121.281556][ T5462] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 121.291596][ T5462] Call Trace: [ 121.294866][ T5462] [ 121.297783][ T5462] dump_stack_lvl+0xd6/0x122 [ 121.302379][ T5462] dump_stack+0x11/0x1b [ 121.306619][ T5462] should_fail+0x23c/0x250 [ 121.311018][ T5462] ? __kernfs_new_node+0x6a/0x340 [ 121.316072][ T5462] __should_failslab+0x81/0x90 [ 121.320848][ T5462] should_failslab+0x5/0x20 [ 121.325355][ T5462] kmem_cache_alloc+0x4f/0x320 [ 121.330190][ T5462] ? __down_write_common+0x42/0x860 [ 121.335386][ T5462] __kernfs_new_node+0x6a/0x340 [ 121.340240][ T5462] ? up_write+0x25/0xc0 [ 121.344377][ T5462] kernfs_new_node+0x5b/0xd0 [ 121.348983][ T5462] __kernfs_create_file+0x45/0x1a0 [ 121.354130][ T5462] ? dev_attr_show+0x90/0x90 [ 121.358791][ T5462] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 121.364189][ T5462] internal_create_group+0x2dd/0x840 [ 121.369515][ T5462] sysfs_create_groups+0x3d/0xf0 [ 121.374435][ T5462] device_add+0x606/0xf40 [ 121.378789][ T5462] ? hrtimer_init+0xfc/0x1d0 [ 121.383419][ T5462] netdev_register_kobject+0xfd/0x230 [ 121.388831][ T5462] register_netdevice+0xba5/0x10b0 [ 121.393940][ T5462] hsr_dev_finalize+0x2da/0x460 [ 121.398772][ T5462] hsr_newlink+0x40d/0x450 [ 121.403197][ T5462] ? hsr_get_node_list+0x450/0x450 [ 121.408306][ T5462] rtnl_newlink+0xdae/0x13b0 [ 121.412896][ T5462] ? rb_insert_color+0x2fa/0x310 [ 121.417837][ T5462] ? rtnl_setlink+0x2a0/0x2a0 [ 121.422503][ T5462] rtnetlink_rcv_msg+0x745/0x7e0 [ 121.427854][ T5462] ? ___cache_free+0x46/0x300 [ 121.432527][ T5462] ? kmem_cache_free+0x65/0x110 [ 121.437359][ T5462] ? __kfree_skb+0xfe/0x150 [ 121.441847][ T5462] ? consume_skb+0x48/0x160 [ 121.446342][ T5462] ? nlmon_xmit+0x5f/0x70 [ 121.450686][ T5462] ? __this_cpu_preempt_check+0x18/0x20 [ 121.456234][ T5462] ? __local_bh_enable_ip+0x4d/0x70 [ 121.461497][ T5462] ? local_bh_enable+0x1b/0x20 [ 121.466252][ T5462] ? __dev_queue_xmit+0x597/0xf70 [ 121.471370][ T5462] ? __skb_clone+0x2db/0x300 [ 121.475985][ T5462] ? __rcu_read_unlock+0x5c/0x290 [ 121.481195][ T5462] netlink_rcv_skb+0x14e/0x250 [ 121.485956][ T5462] ? rtnetlink_bind+0x60/0x60 [ 121.490678][ T5462] rtnetlink_rcv+0x18/0x20 [ 121.495091][ T5462] netlink_unicast+0x5fc/0x6c0 [ 121.499934][ T5462] netlink_sendmsg+0x6e1/0x7d0 [ 121.504759][ T5462] ? netlink_getsockopt+0x720/0x720 [ 121.509948][ T5462] ____sys_sendmsg+0x39a/0x510 [ 121.514800][ T5462] __sys_sendmsg+0x195/0x230 [ 121.519398][ T5462] __x64_sys_sendmsg+0x42/0x50 [ 121.524141][ T5462] do_syscall_64+0x44/0xd0 [ 121.528535][ T5462] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 121.534553][ T5462] RIP: 0033:0x7ffb90e2cae9 [ 121.538948][ T5462] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 121.558598][ T5462] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 121.567002][ T5462] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 121.574971][ T5462] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 121.582931][ T5462] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 121.590901][ T5462] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 121.598864][ T5462] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 121.606885][ T5462] 23:48:24 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 32) 23:48:24 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x15, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:24 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x398, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2f, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x12, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 121.662821][ T5469] FAULT_INJECTION: forcing a failure. [ 121.662821][ T5469] name failslab, interval 1, probability 0, space 0, times 0 [ 121.675467][ T5469] CPU: 1 PID: 5469 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 121.684240][ T5469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 121.694336][ T5469] Call Trace: [ 121.697610][ T5469] [ 121.700536][ T5469] dump_stack_lvl+0xd6/0x122 [ 121.705129][ T5469] dump_stack+0x11/0x1b [ 121.709288][ T5469] should_fail+0x23c/0x250 [ 121.713699][ T5469] ? radix_tree_node_alloc+0x142/0x200 [ 121.719152][ T5469] __should_failslab+0x81/0x90 [ 121.723898][ T5469] should_failslab+0x5/0x20 [ 121.728582][ T5469] kmem_cache_alloc+0x4f/0x320 [ 121.733331][ T5469] ? __rcu_read_unlock+0x5c/0x290 [ 121.738416][ T5469] radix_tree_node_alloc+0x142/0x200 [ 121.743679][ T5469] ? delete_node+0x45c/0x480 [ 121.748256][ T5469] idr_get_free+0x22a/0x5d0 [ 121.752798][ T5469] ? kernfs_xattr_get+0x63/0x70 [ 121.757627][ T5469] idr_alloc_cyclic+0xf4/0x2f0 [ 121.762392][ T5469] __kernfs_new_node+0xb4/0x340 [ 121.767231][ T5469] ? up_write+0x25/0xc0 [ 121.771366][ T5469] kernfs_new_node+0x5b/0xd0 [ 121.775972][ T5469] __kernfs_create_file+0x45/0x1a0 [ 121.781126][ T5469] ? dev_attr_show+0x90/0x90 [ 121.785691][ T5469] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 121.791113][ T5469] internal_create_group+0x2dd/0x840 [ 121.796393][ T5469] sysfs_create_groups+0x3d/0xf0 [ 121.801309][ T5469] device_add+0x606/0xf40 [ 121.805627][ T5469] ? hrtimer_init+0xfc/0x1d0 [ 121.810241][ T5469] netdev_register_kobject+0xfd/0x230 [ 121.815589][ T5469] register_netdevice+0xba5/0x10b0 [ 121.820764][ T5469] hsr_dev_finalize+0x2da/0x460 [ 121.825650][ T5469] hsr_newlink+0x40d/0x450 [ 121.830048][ T5469] ? hsr_get_node_list+0x450/0x450 [ 121.835195][ T5469] rtnl_newlink+0xdae/0x13b0 [ 121.839827][ T5469] ? __rcu_read_unlock+0x5c/0x290 [ 121.844827][ T5469] ? rtnl_setlink+0x2a0/0x2a0 [ 121.849562][ T5469] rtnetlink_rcv_msg+0x745/0x7e0 [ 121.854557][ T5469] ? ___cache_free+0x46/0x300 [ 121.859225][ T5469] ? kmem_cache_free+0x65/0x110 [ 121.864047][ T5469] ? __kfree_skb+0xfe/0x150 [ 121.868594][ T5469] ? consume_skb+0x48/0x160 [ 121.873074][ T5469] ? nlmon_xmit+0x5f/0x70 [ 121.877378][ T5469] ? __this_cpu_preempt_check+0x18/0x20 [ 121.882966][ T5469] ? __local_bh_enable_ip+0x4d/0x70 [ 121.888140][ T5469] ? local_bh_enable+0x1b/0x20 [ 121.892939][ T5469] ? __dev_queue_xmit+0x597/0xf70 [ 121.897996][ T5469] ? __skb_clone+0x2db/0x300 [ 121.902562][ T5469] ? __rcu_read_unlock+0x5c/0x290 [ 121.907560][ T5469] netlink_rcv_skb+0x14e/0x250 [ 121.912301][ T5469] ? rtnetlink_bind+0x60/0x60 [ 121.916960][ T5469] rtnetlink_rcv+0x18/0x20 [ 121.921364][ T5469] netlink_unicast+0x5fc/0x6c0 [ 121.926183][ T5469] netlink_sendmsg+0x6e1/0x7d0 [ 121.930926][ T5469] ? netlink_getsockopt+0x720/0x720 [ 121.936128][ T5469] ____sys_sendmsg+0x39a/0x510 [ 121.940872][ T5469] __sys_sendmsg+0x195/0x230 [ 121.945464][ T5469] __x64_sys_sendmsg+0x42/0x50 [ 121.950221][ T5469] do_syscall_64+0x44/0xd0 [ 121.954645][ T5469] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 121.960524][ T5469] RIP: 0033:0x7ffb90e2cae9 [ 121.964923][ T5469] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 121.984509][ T5469] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 121.992898][ T5469] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 122.000843][ T5469] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 23:48:24 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x11, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) [ 122.008812][ T5469] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 122.016767][ T5469] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 122.024750][ T5469] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 122.032775][ T5469] 23:48:24 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 33) [ 122.112548][ T5481] FAULT_INJECTION: forcing a failure. [ 122.112548][ T5481] name failslab, interval 1, probability 0, space 0, times 0 [ 122.125257][ T5481] CPU: 1 PID: 5481 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 122.133989][ T5481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 122.144028][ T5481] Call Trace: [ 122.147290][ T5481] [ 122.150262][ T5481] dump_stack_lvl+0xd6/0x122 [ 122.154883][ T5481] dump_stack+0x11/0x1b [ 122.159015][ T5481] should_fail+0x23c/0x250 [ 122.163405][ T5481] ? __kernfs_new_node+0x6a/0x340 [ 122.168407][ T5481] __should_failslab+0x81/0x90 [ 122.173188][ T5481] should_failslab+0x5/0x20 [ 122.177738][ T5481] kmem_cache_alloc+0x4f/0x320 [ 122.182562][ T5481] ? __down_write_common+0x42/0x860 [ 122.187816][ T5481] __kernfs_new_node+0x6a/0x340 [ 122.192649][ T5481] ? up_write+0x25/0xc0 [ 122.196783][ T5481] kernfs_new_node+0x5b/0xd0 [ 122.201364][ T5481] __kernfs_create_file+0x45/0x1a0 [ 122.206468][ T5481] ? dev_attr_show+0x90/0x90 [ 122.211076][ T5481] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 122.216500][ T5481] internal_create_group+0x2dd/0x840 [ 122.221854][ T5481] sysfs_create_groups+0x3d/0xf0 [ 122.226796][ T5481] device_add+0x606/0xf40 [ 122.231102][ T5481] ? hrtimer_init+0xfc/0x1d0 [ 122.235668][ T5481] netdev_register_kobject+0xfd/0x230 [ 122.241023][ T5481] register_netdevice+0xba5/0x10b0 [ 122.246247][ T5481] hsr_dev_finalize+0x2da/0x460 [ 122.251079][ T5481] hsr_newlink+0x40d/0x450 [ 122.255496][ T5481] ? hsr_get_node_list+0x450/0x450 [ 122.260617][ T5481] rtnl_newlink+0xdae/0x13b0 [ 122.265211][ T5481] ? __rcu_read_unlock+0x5c/0x290 [ 122.270276][ T5481] ? rtnl_setlink+0x2a0/0x2a0 [ 122.275008][ T5481] rtnetlink_rcv_msg+0x745/0x7e0 [ 122.279926][ T5481] ? ___cache_free+0x46/0x300 [ 122.284699][ T5481] ? kmem_cache_free+0x65/0x110 [ 122.289578][ T5481] ? __kfree_skb+0xfe/0x150 [ 122.294064][ T5481] ? consume_skb+0x48/0x160 [ 122.298553][ T5481] ? nlmon_xmit+0x5f/0x70 [ 122.302876][ T5481] ? __this_cpu_preempt_check+0x18/0x20 [ 122.308462][ T5481] ? __local_bh_enable_ip+0x4d/0x70 [ 122.313742][ T5481] ? local_bh_enable+0x1b/0x20 [ 122.318483][ T5481] ? __dev_queue_xmit+0x597/0xf70 [ 122.323492][ T5481] ? __skb_clone+0x2db/0x300 [ 122.328073][ T5481] ? __rcu_read_unlock+0x5c/0x290 [ 122.333077][ T5481] netlink_rcv_skb+0x14e/0x250 [ 122.337844][ T5481] ? rtnetlink_bind+0x60/0x60 [ 122.342642][ T5481] rtnetlink_rcv+0x18/0x20 [ 122.347093][ T5481] netlink_unicast+0x5fc/0x6c0 [ 122.351979][ T5481] netlink_sendmsg+0x6e1/0x7d0 [ 122.356725][ T5481] ? netlink_getsockopt+0x720/0x720 [ 122.361919][ T5481] ____sys_sendmsg+0x39a/0x510 [ 122.366663][ T5481] __sys_sendmsg+0x195/0x230 [ 122.371245][ T5481] __x64_sys_sendmsg+0x42/0x50 [ 122.376004][ T5481] do_syscall_64+0x44/0xd0 [ 122.380410][ T5481] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 122.386328][ T5481] RIP: 0033:0x7ffb90e2cae9 [ 122.390725][ T5481] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 23:48:25 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x15, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 122.410423][ T5481] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 122.418926][ T5481] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 122.427114][ T5481] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 122.435066][ T5481] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 122.443034][ T5481] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 122.451047][ T5481] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 122.459081][ T5481] 23:48:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 34) 23:48:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x25, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x3a, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:25 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x3aa, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) [ 122.544095][ T5492] FAULT_INJECTION: forcing a failure. [ 122.544095][ T5492] name failslab, interval 1, probability 0, space 0, times 0 [ 122.556731][ T5492] CPU: 1 PID: 5492 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 122.565397][ T5492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 122.575445][ T5492] Call Trace: [ 122.578771][ T5492] [ 122.581740][ T5492] dump_stack_lvl+0xd6/0x122 [ 122.586312][ T5492] dump_stack+0x11/0x1b [ 122.590481][ T5492] should_fail+0x23c/0x250 [ 122.594946][ T5492] ? __kernfs_new_node+0x6a/0x340 [ 122.599957][ T5492] __should_failslab+0x81/0x90 [ 122.604792][ T5492] should_failslab+0x5/0x20 [ 122.609286][ T5492] kmem_cache_alloc+0x4f/0x320 [ 122.614128][ T5492] ? __down_write_common+0x42/0x860 [ 122.619425][ T5492] __kernfs_new_node+0x6a/0x340 [ 122.624301][ T5492] ? up_write+0x25/0xc0 [ 122.628458][ T5492] kernfs_new_node+0x5b/0xd0 [ 122.633032][ T5492] __kernfs_create_file+0x45/0x1a0 [ 122.638139][ T5492] ? dev_attr_show+0x90/0x90 [ 122.642779][ T5492] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 122.648223][ T5492] internal_create_group+0x2dd/0x840 [ 122.653504][ T5492] sysfs_create_groups+0x3d/0xf0 [ 122.658422][ T5492] device_add+0x606/0xf40 [ 122.663244][ T5492] ? hrtimer_init+0xfc/0x1d0 [ 122.667826][ T5492] netdev_register_kobject+0xfd/0x230 [ 122.673188][ T5492] register_netdevice+0xba5/0x10b0 [ 122.678286][ T5492] hsr_dev_finalize+0x2da/0x460 [ 122.683198][ T5492] hsr_newlink+0x40d/0x450 [ 122.687673][ T5492] ? hsr_get_node_list+0x450/0x450 [ 122.692838][ T5492] rtnl_newlink+0xdae/0x13b0 [ 122.697430][ T5492] ? rtnl_setlink+0x2a0/0x2a0 [ 122.702090][ T5492] rtnetlink_rcv_msg+0x745/0x7e0 [ 122.707023][ T5492] ? ___cache_free+0x46/0x300 [ 122.711728][ T5492] ? kmem_cache_free+0x65/0x110 [ 122.716574][ T5492] ? __kfree_skb+0xfe/0x150 [ 122.721085][ T5492] ? consume_skb+0x48/0x160 [ 122.725598][ T5492] ? nlmon_xmit+0x5f/0x70 [ 122.729905][ T5492] ? __this_cpu_preempt_check+0x18/0x20 [ 122.735431][ T5492] ? __local_bh_enable_ip+0x4d/0x70 [ 122.740708][ T5492] ? local_bh_enable+0x1b/0x20 [ 122.745635][ T5492] ? __dev_queue_xmit+0x597/0xf70 [ 122.750746][ T5492] ? __skb_clone+0x2db/0x300 [ 122.755343][ T5492] ? __rcu_read_unlock+0x5c/0x290 [ 122.760369][ T5492] netlink_rcv_skb+0x14e/0x250 [ 122.765130][ T5492] ? rtnetlink_bind+0x60/0x60 [ 122.769807][ T5492] rtnetlink_rcv+0x18/0x20 [ 122.774201][ T5492] netlink_unicast+0x5fc/0x6c0 [ 122.778977][ T5492] netlink_sendmsg+0x6e1/0x7d0 [ 122.783748][ T5492] ? netlink_getsockopt+0x720/0x720 [ 122.789021][ T5492] ____sys_sendmsg+0x39a/0x510 [ 122.793792][ T5492] __sys_sendmsg+0x195/0x230 [ 122.798467][ T5492] __x64_sys_sendmsg+0x42/0x50 [ 122.803252][ T5492] do_syscall_64+0x44/0xd0 [ 122.807657][ T5492] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 122.813564][ T5492] RIP: 0033:0x7ffb90e2cae9 [ 122.817973][ T5492] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 23:48:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 35) 23:48:25 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x12, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) [ 122.837553][ T5492] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 122.846037][ T5492] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 122.853999][ T5492] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 122.861970][ T5492] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 122.869919][ T5492] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 122.877867][ T5492] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 122.885840][ T5492] 23:48:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2f, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 122.949393][ T5502] FAULT_INJECTION: forcing a failure. [ 122.949393][ T5502] name failslab, interval 1, probability 0, space 0, times 0 [ 122.962071][ T5502] CPU: 0 PID: 5502 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 122.970743][ T5502] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 122.980840][ T5502] Call Trace: [ 122.984104][ T5502] [ 122.987056][ T5502] dump_stack_lvl+0xd6/0x122 [ 122.991707][ T5502] dump_stack+0x11/0x1b [ 122.995838][ T5502] should_fail+0x23c/0x250 [ 123.000235][ T5502] ? __kernfs_new_node+0x6a/0x340 [ 123.005261][ T5502] __should_failslab+0x81/0x90 [ 123.010477][ T5502] should_failslab+0x5/0x20 [ 123.014978][ T5502] kmem_cache_alloc+0x4f/0x320 [ 123.019770][ T5502] ? __down_write_common+0x42/0x860 [ 123.025378][ T5502] __kernfs_new_node+0x6a/0x340 [ 123.030288][ T5502] ? up_write+0x25/0xc0 [ 123.034552][ T5502] kernfs_new_node+0x5b/0xd0 [ 123.039121][ T5502] __kernfs_create_file+0x45/0x1a0 [ 123.044277][ T5502] ? dev_attr_show+0x90/0x90 [ 123.048919][ T5502] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 123.054282][ T5502] internal_create_group+0x2dd/0x840 [ 123.059565][ T5502] sysfs_create_groups+0x3d/0xf0 [ 123.064495][ T5502] device_add+0x606/0xf40 [ 123.068810][ T5502] ? hrtimer_init+0xfc/0x1d0 [ 123.073376][ T5502] netdev_register_kobject+0xfd/0x230 [ 123.078758][ T5502] register_netdevice+0xba5/0x10b0 [ 123.083894][ T5502] hsr_dev_finalize+0x2da/0x460 [ 123.088727][ T5502] hsr_newlink+0x40d/0x450 [ 123.093152][ T5502] ? hsr_get_node_list+0x450/0x450 [ 123.098325][ T5502] rtnl_newlink+0xdae/0x13b0 [ 123.102942][ T5502] ? __rcu_read_unlock+0x5c/0x290 [ 123.108016][ T5502] ? rtnl_setlink+0x2a0/0x2a0 [ 123.112686][ T5502] rtnetlink_rcv_msg+0x745/0x7e0 [ 123.117607][ T5502] ? ___cache_free+0x46/0x300 [ 123.122289][ T5502] ? kmem_cache_free+0x65/0x110 [ 123.127123][ T5502] ? __kfree_skb+0xfe/0x150 [ 123.131619][ T5502] ? consume_skb+0x48/0x160 [ 123.136156][ T5502] ? nlmon_xmit+0x5f/0x70 [ 123.140483][ T5502] ? __this_cpu_preempt_check+0x18/0x20 [ 123.146072][ T5502] ? __local_bh_enable_ip+0x4d/0x70 [ 123.151298][ T5502] ? local_bh_enable+0x1b/0x20 [ 123.156041][ T5502] ? __dev_queue_xmit+0x597/0xf70 [ 123.161052][ T5502] ? __skb_clone+0x2db/0x300 [ 123.165710][ T5502] ? __rcu_read_unlock+0x5c/0x290 [ 123.170723][ T5502] netlink_rcv_skb+0x14e/0x250 [ 123.175495][ T5502] ? rtnetlink_bind+0x60/0x60 [ 123.180169][ T5502] rtnetlink_rcv+0x18/0x20 [ 123.184594][ T5502] netlink_unicast+0x5fc/0x6c0 [ 123.189365][ T5502] netlink_sendmsg+0x6e1/0x7d0 [ 123.194226][ T5502] ? netlink_getsockopt+0x720/0x720 [ 123.199430][ T5502] ____sys_sendmsg+0x39a/0x510 [ 123.204215][ T5502] __sys_sendmsg+0x195/0x230 [ 123.208792][ T5502] __x64_sys_sendmsg+0x42/0x50 [ 123.213545][ T5502] do_syscall_64+0x44/0xd0 [ 123.217995][ T5502] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 123.223983][ T5502] RIP: 0033:0x7ffb90e2cae9 [ 123.228389][ T5502] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 23:48:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x48, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 36) [ 123.248052][ T5502] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 123.256444][ T5502] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 123.264426][ T5502] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 123.272490][ T5502] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 123.280441][ T5502] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 123.288392][ T5502] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 123.296396][ T5502] 23:48:25 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x500, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) [ 123.348773][ T5508] FAULT_INJECTION: forcing a failure. [ 123.348773][ T5508] name failslab, interval 1, probability 0, space 0, times 0 [ 123.361463][ T5508] CPU: 1 PID: 5508 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 123.370232][ T5508] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 123.380270][ T5508] Call Trace: [ 123.383556][ T5508] [ 123.386469][ T5508] dump_stack_lvl+0xd6/0x122 [ 123.391112][ T5508] dump_stack+0x11/0x1b [ 123.395246][ T5508] should_fail+0x23c/0x250 [ 123.399672][ T5508] ? __kernfs_new_node+0x6a/0x340 [ 123.404737][ T5508] __should_failslab+0x81/0x90 [ 123.409486][ T5508] should_failslab+0x5/0x20 [ 123.413983][ T5508] kmem_cache_alloc+0x4f/0x320 [ 123.418740][ T5508] ? __down_write_common+0x42/0x860 [ 123.423943][ T5508] __kernfs_new_node+0x6a/0x340 [ 123.428849][ T5508] ? up_write+0x25/0xc0 [ 123.432984][ T5508] kernfs_new_node+0x5b/0xd0 [ 123.437556][ T5508] __kernfs_create_file+0x45/0x1a0 [ 123.442676][ T5508] ? dev_attr_show+0x90/0x90 [ 123.447265][ T5508] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 123.452623][ T5508] internal_create_group+0x2dd/0x840 [ 123.457905][ T5508] sysfs_create_groups+0x3d/0xf0 [ 123.462832][ T5508] device_add+0x606/0xf40 [ 123.467141][ T5508] ? hrtimer_init+0xfc/0x1d0 [ 123.471715][ T5508] netdev_register_kobject+0xfd/0x230 [ 123.477080][ T5508] register_netdevice+0xba5/0x10b0 [ 123.482187][ T5508] hsr_dev_finalize+0x2da/0x460 [ 123.487018][ T5508] hsr_newlink+0x40d/0x450 [ 123.491476][ T5508] ? hsr_get_node_list+0x450/0x450 [ 123.496675][ T5508] rtnl_newlink+0xdae/0x13b0 [ 123.501324][ T5508] ? __rcu_read_unlock+0x5c/0x290 [ 123.506348][ T5508] ? rtnl_setlink+0x2a0/0x2a0 [ 123.511078][ T5508] rtnetlink_rcv_msg+0x745/0x7e0 [ 123.515997][ T5508] ? ___cache_free+0x46/0x300 [ 123.520692][ T5508] ? kmem_cache_free+0x65/0x110 [ 123.525725][ T5508] ? __kfree_skb+0xfe/0x150 [ 123.530208][ T5508] ? consume_skb+0x48/0x160 [ 123.534703][ T5508] ? nlmon_xmit+0x5f/0x70 [ 123.539010][ T5508] ? __this_cpu_preempt_check+0x18/0x20 [ 123.544618][ T5508] ? __local_bh_enable_ip+0x4d/0x70 [ 123.549798][ T5508] ? local_bh_enable+0x1b/0x20 [ 123.554560][ T5508] ? __dev_queue_xmit+0x597/0xf70 [ 123.559570][ T5508] ? __skb_clone+0x2db/0x300 [ 123.564176][ T5508] ? __rcu_read_unlock+0x5c/0x290 [ 123.569252][ T5508] netlink_rcv_skb+0x14e/0x250 [ 123.574123][ T5508] ? rtnetlink_bind+0x60/0x60 [ 123.578863][ T5508] rtnetlink_rcv+0x18/0x20 [ 123.583339][ T5508] netlink_unicast+0x5fc/0x6c0 [ 123.588126][ T5508] netlink_sendmsg+0x6e1/0x7d0 [ 123.592898][ T5508] ? netlink_getsockopt+0x720/0x720 [ 123.598170][ T5508] ____sys_sendmsg+0x39a/0x510 [ 123.602958][ T5508] __sys_sendmsg+0x195/0x230 [ 123.607551][ T5508] __x64_sys_sendmsg+0x42/0x50 [ 123.612308][ T5508] do_syscall_64+0x44/0xd0 [ 123.616704][ T5508] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 123.622595][ T5508] RIP: 0033:0x7ffb90e2cae9 [ 123.626986][ T5508] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 23:48:26 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 37) [ 123.646570][ T5508] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 123.654963][ T5508] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 123.662913][ T5508] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 123.670942][ T5508] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 123.678890][ T5508] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 123.686839][ T5508] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 123.694793][ T5508] 23:48:26 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x3a, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:26 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x25, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:26 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x4a, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 123.769071][ T5520] FAULT_INJECTION: forcing a failure. [ 123.769071][ T5520] name failslab, interval 1, probability 0, space 0, times 0 [ 123.781737][ T5520] CPU: 0 PID: 5520 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 123.790480][ T5520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 123.800725][ T5520] Call Trace: [ 123.804038][ T5520] [ 123.806948][ T5520] dump_stack_lvl+0xd6/0x122 [ 123.811519][ T5520] dump_stack+0x11/0x1b [ 123.815655][ T5520] should_fail+0x23c/0x250 [ 123.820050][ T5520] ? __kernfs_new_node+0x6a/0x340 [ 123.825170][ T5520] __should_failslab+0x81/0x90 [ 123.829962][ T5520] should_failslab+0x5/0x20 [ 123.834446][ T5520] kmem_cache_alloc+0x4f/0x320 [ 123.839211][ T5520] ? __down_write_common+0x42/0x860 [ 123.844406][ T5520] __kernfs_new_node+0x6a/0x340 [ 123.849350][ T5520] ? up_write+0x25/0xc0 [ 123.853504][ T5520] kernfs_new_node+0x5b/0xd0 [ 123.858104][ T5520] __kernfs_create_file+0x45/0x1a0 [ 123.863199][ T5520] ? dev_attr_show+0x90/0x90 [ 123.867827][ T5520] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 123.873200][ T5520] internal_create_group+0x2dd/0x840 [ 123.878533][ T5520] sysfs_create_groups+0x3d/0xf0 [ 123.883451][ T5520] device_add+0x606/0xf40 [ 123.887786][ T5520] ? hrtimer_init+0xfc/0x1d0 [ 123.892370][ T5520] netdev_register_kobject+0xfd/0x230 [ 123.897857][ T5520] register_netdevice+0xba5/0x10b0 [ 123.902949][ T5520] hsr_dev_finalize+0x2da/0x460 [ 123.907866][ T5520] hsr_newlink+0x40d/0x450 [ 123.912261][ T5520] ? hsr_get_node_list+0x450/0x450 [ 123.917403][ T5520] rtnl_newlink+0xdae/0x13b0 [ 123.922072][ T5520] ? __rcu_read_unlock+0x5c/0x290 [ 123.927138][ T5520] ? rtnl_setlink+0x2a0/0x2a0 [ 123.931870][ T5520] rtnetlink_rcv_msg+0x745/0x7e0 [ 123.936791][ T5520] ? ___cache_free+0x46/0x300 [ 123.941488][ T5520] ? kmem_cache_free+0x65/0x110 [ 123.946356][ T5520] ? __kfree_skb+0xfe/0x150 [ 123.950852][ T5520] ? consume_skb+0x48/0x160 [ 123.955378][ T5520] ? nlmon_xmit+0x5f/0x70 [ 123.959709][ T5520] ? __this_cpu_preempt_check+0x18/0x20 [ 123.965231][ T5520] ? __local_bh_enable_ip+0x4d/0x70 [ 123.970470][ T5520] ? local_bh_enable+0x1b/0x20 [ 123.975365][ T5520] ? __dev_queue_xmit+0x597/0xf70 [ 123.980372][ T5520] ? __skb_clone+0x2db/0x300 [ 123.985027][ T5520] ? __rcu_read_unlock+0x5c/0x290 [ 123.990132][ T5520] netlink_rcv_skb+0x14e/0x250 [ 123.994916][ T5520] ? rtnetlink_bind+0x60/0x60 [ 123.999580][ T5520] rtnetlink_rcv+0x18/0x20 [ 124.004014][ T5520] netlink_unicast+0x5fc/0x6c0 [ 124.008840][ T5520] netlink_sendmsg+0x6e1/0x7d0 [ 124.013656][ T5520] ? netlink_getsockopt+0x720/0x720 [ 124.018845][ T5520] ____sys_sendmsg+0x39a/0x510 [ 124.023665][ T5520] __sys_sendmsg+0x195/0x230 [ 124.028312][ T5520] __x64_sys_sendmsg+0x42/0x50 [ 124.033074][ T5520] do_syscall_64+0x44/0xd0 [ 124.037593][ T5520] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 124.043502][ T5520] RIP: 0033:0x7ffb90e2cae9 [ 124.047897][ T5520] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 23:48:26 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 38) 23:48:26 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x15, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) [ 124.067544][ T5520] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 124.075949][ T5520] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 124.083959][ T5520] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 124.091911][ T5520] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 124.099860][ T5520] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 124.107812][ T5520] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 124.115820][ T5520] 23:48:26 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x591, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) [ 124.181573][ T5531] FAULT_INJECTION: forcing a failure. [ 124.181573][ T5531] name failslab, interval 1, probability 0, space 0, times 0 [ 124.194285][ T5531] CPU: 1 PID: 5531 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 124.203001][ T5531] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 124.213034][ T5531] Call Trace: [ 124.216366][ T5531] [ 124.219290][ T5531] dump_stack_lvl+0xd6/0x122 [ 124.223878][ T5531] dump_stack+0x11/0x1b [ 124.228060][ T5531] should_fail+0x23c/0x250 [ 124.232483][ T5531] ? __kernfs_new_node+0x6a/0x340 [ 124.237517][ T5531] __should_failslab+0x81/0x90 [ 124.242394][ T5531] should_failslab+0x5/0x20 [ 124.246883][ T5531] kmem_cache_alloc+0x4f/0x320 [ 124.251661][ T5531] ? __down_write_common+0x42/0x860 [ 124.256848][ T5531] __kernfs_new_node+0x6a/0x340 [ 124.261708][ T5531] ? up_write+0x25/0xc0 [ 124.265884][ T5531] kernfs_new_node+0x5b/0xd0 [ 124.270530][ T5531] __kernfs_create_file+0x45/0x1a0 [ 124.275624][ T5531] ? dev_attr_show+0x90/0x90 [ 124.280215][ T5531] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 124.285614][ T5531] internal_create_group+0x2dd/0x840 [ 124.290878][ T5531] sysfs_create_groups+0x3d/0xf0 [ 124.295840][ T5531] device_add+0x606/0xf40 [ 124.300161][ T5531] ? hrtimer_init+0xfc/0x1d0 [ 124.304807][ T5531] netdev_register_kobject+0xfd/0x230 [ 124.310255][ T5531] register_netdevice+0xba5/0x10b0 [ 124.315366][ T5531] hsr_dev_finalize+0x2da/0x460 [ 124.320201][ T5531] hsr_newlink+0x40d/0x450 [ 124.324631][ T5531] ? hsr_get_node_list+0x450/0x450 [ 124.329831][ T5531] rtnl_newlink+0xdae/0x13b0 [ 124.334419][ T5531] ? rtnl_setlink+0x2a0/0x2a0 [ 124.339148][ T5531] rtnetlink_rcv_msg+0x745/0x7e0 [ 124.344078][ T5531] ? ___cache_free+0x46/0x300 [ 124.348743][ T5531] ? kmem_cache_free+0x65/0x110 [ 124.353683][ T5531] ? __kfree_skb+0xfe/0x150 [ 124.358419][ T5531] ? consume_skb+0x48/0x160 [ 124.362913][ T5531] ? nlmon_xmit+0x5f/0x70 [ 124.367220][ T5531] ? __this_cpu_preempt_check+0x18/0x20 [ 124.372750][ T5531] ? __local_bh_enable_ip+0x4d/0x70 [ 124.377935][ T5531] ? local_bh_enable+0x1b/0x20 [ 124.382673][ T5531] ? __dev_queue_xmit+0x597/0xf70 [ 124.387746][ T5531] ? __skb_clone+0x2db/0x300 [ 124.392320][ T5531] ? __rcu_read_unlock+0x5c/0x290 [ 124.397340][ T5531] netlink_rcv_skb+0x14e/0x250 [ 124.402103][ T5531] ? rtnetlink_bind+0x60/0x60 [ 124.406812][ T5531] rtnetlink_rcv+0x18/0x20 [ 124.411206][ T5531] netlink_unicast+0x5fc/0x6c0 [ 124.415970][ T5531] netlink_sendmsg+0x6e1/0x7d0 [ 124.420810][ T5531] ? netlink_getsockopt+0x720/0x720 [ 124.426052][ T5531] ____sys_sendmsg+0x39a/0x510 [ 124.430877][ T5531] __sys_sendmsg+0x195/0x230 [ 124.435449][ T5531] __x64_sys_sendmsg+0x42/0x50 [ 124.440195][ T5531] do_syscall_64+0x44/0xd0 [ 124.444598][ T5531] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 124.450536][ T5531] RIP: 0033:0x7ffb90e2cae9 [ 124.455012][ T5531] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 124.474697][ T5531] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 23:48:27 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x4c, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 124.483148][ T5531] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 124.491226][ T5531] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 124.499277][ T5531] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 124.507290][ T5531] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 124.515326][ T5531] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 124.523336][ T5531] 23:48:27 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 39) 23:48:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2f, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:27 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x59f, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:27 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x48, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 124.604128][ T5540] FAULT_INJECTION: forcing a failure. [ 124.604128][ T5540] name failslab, interval 1, probability 0, space 0, times 0 [ 124.616942][ T5540] CPU: 0 PID: 5540 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 124.625667][ T5540] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 124.635761][ T5540] Call Trace: [ 124.639030][ T5540] [ 124.642052][ T5540] dump_stack_lvl+0xd6/0x122 [ 124.646673][ T5540] dump_stack+0x11/0x1b [ 124.650889][ T5540] should_fail+0x23c/0x250 [ 124.655282][ T5540] ? __kernfs_new_node+0x6a/0x340 [ 124.660300][ T5540] __should_failslab+0x81/0x90 [ 124.665054][ T5540] should_failslab+0x5/0x20 [ 124.669605][ T5540] kmem_cache_alloc+0x4f/0x320 [ 124.674476][ T5540] ? __down_write_common+0x42/0x860 [ 124.679653][ T5540] __kernfs_new_node+0x6a/0x340 [ 124.684564][ T5540] ? up_write+0x25/0xc0 [ 124.688711][ T5540] kernfs_new_node+0x5b/0xd0 [ 124.693420][ T5540] __kernfs_create_file+0x45/0x1a0 [ 124.698509][ T5540] ? dev_attr_show+0x90/0x90 [ 124.703146][ T5540] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 124.708518][ T5540] internal_create_group+0x2dd/0x840 [ 124.713798][ T5540] sysfs_create_groups+0x3d/0xf0 [ 124.718803][ T5540] device_add+0x606/0xf40 [ 124.723286][ T5540] ? hrtimer_init+0xfc/0x1d0 [ 124.727855][ T5540] netdev_register_kobject+0xfd/0x230 [ 124.733207][ T5540] register_netdevice+0xba5/0x10b0 [ 124.738367][ T5540] hsr_dev_finalize+0x2da/0x460 [ 124.743244][ T5540] hsr_newlink+0x40d/0x450 [ 124.747654][ T5540] ? hsr_get_node_list+0x450/0x450 [ 124.752769][ T5540] rtnl_newlink+0xdae/0x13b0 [ 124.757454][ T5540] ? __rcu_read_unlock+0x5c/0x290 [ 124.762574][ T5540] ? rtnl_setlink+0x2a0/0x2a0 [ 124.767315][ T5540] rtnetlink_rcv_msg+0x745/0x7e0 [ 124.772344][ T5540] ? ___cache_free+0x46/0x300 [ 124.777011][ T5540] ? kmem_cache_free+0x65/0x110 [ 124.781867][ T5540] ? __kfree_skb+0xfe/0x150 [ 124.786369][ T5540] ? consume_skb+0x48/0x160 [ 124.790859][ T5540] ? nlmon_xmit+0x5f/0x70 [ 124.795171][ T5540] ? __this_cpu_preempt_check+0x18/0x20 [ 124.800696][ T5540] ? __local_bh_enable_ip+0x4d/0x70 [ 124.805883][ T5540] ? local_bh_enable+0x1b/0x20 [ 124.810625][ T5540] ? __dev_queue_xmit+0x597/0xf70 [ 124.815702][ T5540] ? __skb_clone+0x2db/0x300 [ 124.820465][ T5540] ? __rcu_read_unlock+0x5c/0x290 [ 124.825509][ T5540] netlink_rcv_skb+0x14e/0x250 [ 124.830260][ T5540] ? rtnetlink_bind+0x60/0x60 [ 124.835021][ T5540] rtnetlink_rcv+0x18/0x20 [ 124.839418][ T5540] netlink_unicast+0x5fc/0x6c0 [ 124.844164][ T5540] netlink_sendmsg+0x6e1/0x7d0 [ 124.848997][ T5540] ? netlink_getsockopt+0x720/0x720 [ 124.854178][ T5540] ____sys_sendmsg+0x39a/0x510 [ 124.858923][ T5540] __sys_sendmsg+0x195/0x230 [ 124.863517][ T5540] __x64_sys_sendmsg+0x42/0x50 [ 124.868386][ T5540] do_syscall_64+0x44/0xd0 [ 124.872781][ T5540] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 124.878655][ T5540] RIP: 0033:0x7ffb90e2cae9 [ 124.883044][ T5540] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 23:48:27 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 40) [ 124.902669][ T5540] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 124.911077][ T5540] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 124.919025][ T5540] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 124.926975][ T5540] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 124.934957][ T5540] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 124.942957][ T5540] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 124.950961][ T5540] 23:48:27 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x25, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:27 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x60, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 125.000550][ T5551] FAULT_INJECTION: forcing a failure. [ 125.000550][ T5551] name failslab, interval 1, probability 0, space 0, times 0 [ 125.013197][ T5551] CPU: 1 PID: 5551 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 125.021926][ T5551] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 125.031969][ T5551] Call Trace: [ 125.035231][ T5551] [ 125.038213][ T5551] dump_stack_lvl+0xd6/0x122 [ 125.042799][ T5551] dump_stack+0x11/0x1b [ 125.046939][ T5551] should_fail+0x23c/0x250 [ 125.051365][ T5551] ? __kernfs_new_node+0x6a/0x340 [ 125.056437][ T5551] __should_failslab+0x81/0x90 [ 125.061181][ T5551] should_failslab+0x5/0x20 [ 125.065759][ T5551] kmem_cache_alloc+0x4f/0x320 [ 125.070510][ T5551] ? __down_write_common+0x42/0x860 [ 125.075689][ T5551] __kernfs_new_node+0x6a/0x340 [ 125.080597][ T5551] ? up_write+0x25/0xc0 [ 125.084769][ T5551] kernfs_new_node+0x5b/0xd0 [ 125.089350][ T5551] __kernfs_create_file+0x45/0x1a0 [ 125.094508][ T5551] ? dev_attr_show+0x90/0x90 [ 125.099092][ T5551] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 125.104517][ T5551] internal_create_group+0x2dd/0x840 [ 125.109783][ T5551] sysfs_create_groups+0x3d/0xf0 [ 125.114795][ T5551] device_add+0x606/0xf40 [ 125.119173][ T5551] ? hrtimer_init+0xfc/0x1d0 [ 125.123819][ T5551] netdev_register_kobject+0xfd/0x230 [ 125.129259][ T5551] register_netdevice+0xba5/0x10b0 [ 125.134383][ T5551] hsr_dev_finalize+0x2da/0x460 [ 125.139335][ T5551] hsr_newlink+0x40d/0x450 [ 125.143735][ T5551] ? hsr_get_node_list+0x450/0x450 [ 125.148904][ T5551] rtnl_newlink+0xdae/0x13b0 [ 125.153490][ T5551] ? __rcu_read_unlock+0x5c/0x290 [ 125.158493][ T5551] ? rtnl_setlink+0x2a0/0x2a0 [ 125.163189][ T5551] rtnetlink_rcv_msg+0x745/0x7e0 [ 125.168129][ T5551] ? ___cache_free+0x46/0x300 [ 125.172882][ T5551] ? kmem_cache_free+0x65/0x110 [ 125.177715][ T5551] ? __kfree_skb+0xfe/0x150 [ 125.182231][ T5551] ? consume_skb+0x48/0x160 [ 125.186792][ T5551] ? nlmon_xmit+0x5f/0x70 [ 125.191101][ T5551] ? __this_cpu_preempt_check+0x18/0x20 [ 125.196805][ T5551] ? __local_bh_enable_ip+0x4d/0x70 [ 125.201989][ T5551] ? local_bh_enable+0x1b/0x20 [ 125.206967][ T5551] ? __dev_queue_xmit+0x597/0xf70 [ 125.211992][ T5551] ? __skb_clone+0x2db/0x300 [ 125.216631][ T5551] ? __rcu_read_unlock+0x5c/0x290 [ 125.221705][ T5551] netlink_rcv_skb+0x14e/0x250 [ 125.226518][ T5551] ? rtnetlink_bind+0x60/0x60 [ 125.231212][ T5551] rtnetlink_rcv+0x18/0x20 [ 125.235637][ T5551] netlink_unicast+0x5fc/0x6c0 [ 125.240409][ T5551] netlink_sendmsg+0x6e1/0x7d0 [ 125.245187][ T5551] ? netlink_getsockopt+0x720/0x720 [ 125.250367][ T5551] ____sys_sendmsg+0x39a/0x510 [ 125.255141][ T5551] __sys_sendmsg+0x195/0x230 [ 125.259740][ T5551] __x64_sys_sendmsg+0x42/0x50 [ 125.264534][ T5551] do_syscall_64+0x44/0xd0 [ 125.268931][ T5551] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 125.274810][ T5551] RIP: 0033:0x7ffb90e2cae9 [ 125.279355][ T5551] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 23:48:27 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 41) [ 125.298967][ T5551] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 125.307362][ T5551] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 125.315317][ T5551] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 125.323353][ T5551] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 125.331306][ T5551] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 125.339349][ T5551] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 125.347380][ T5551] 23:48:27 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x5c4, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:27 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x4a, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 125.392262][ T5558] FAULT_INJECTION: forcing a failure. [ 125.392262][ T5558] name failslab, interval 1, probability 0, space 0, times 0 [ 125.404916][ T5558] CPU: 1 PID: 5558 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 125.413765][ T5558] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 125.423994][ T5558] Call Trace: [ 125.427395][ T5558] [ 125.430308][ T5558] dump_stack_lvl+0xd6/0x122 [ 125.434994][ T5558] dump_stack+0x11/0x1b [ 125.439129][ T5558] should_fail+0x23c/0x250 [ 125.443710][ T5558] ? __kernfs_new_node+0x6a/0x340 [ 125.448741][ T5558] __should_failslab+0x81/0x90 [ 125.453486][ T5558] should_failslab+0x5/0x20 [ 125.457968][ T5558] kmem_cache_alloc+0x4f/0x320 [ 125.462722][ T5558] ? __down_write_common+0x42/0x860 [ 125.467989][ T5558] __kernfs_new_node+0x6a/0x340 [ 125.473043][ T5558] ? up_write+0x25/0xc0 [ 125.477174][ T5558] kernfs_new_node+0x5b/0xd0 [ 125.481753][ T5558] __kernfs_create_file+0x45/0x1a0 [ 125.487311][ T5558] ? dev_attr_show+0x90/0x90 [ 125.491967][ T5558] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 125.497343][ T5558] internal_create_group+0x2dd/0x840 [ 125.502689][ T5558] sysfs_create_groups+0x3d/0xf0 [ 125.507640][ T5558] device_add+0x606/0xf40 [ 125.512039][ T5558] ? hrtimer_init+0xfc/0x1d0 [ 125.516638][ T5558] netdev_register_kobject+0xfd/0x230 [ 125.522009][ T5558] register_netdevice+0xba5/0x10b0 [ 125.527336][ T5558] hsr_dev_finalize+0x2da/0x460 [ 125.532189][ T5558] hsr_newlink+0x40d/0x450 [ 125.536602][ T5558] ? hsr_get_node_list+0x450/0x450 [ 125.541695][ T5558] rtnl_newlink+0xdae/0x13b0 [ 125.546337][ T5558] ? __rcu_read_unlock+0x5c/0x290 [ 125.551365][ T5558] ? rtnl_setlink+0x2a0/0x2a0 [ 125.556040][ T5558] rtnetlink_rcv_msg+0x745/0x7e0 [ 125.560967][ T5558] ? ___cache_free+0x46/0x300 [ 125.565711][ T5558] ? kmem_cache_free+0x65/0x110 [ 125.570554][ T5558] ? __kfree_skb+0xfe/0x150 [ 125.575043][ T5558] ? consume_skb+0x48/0x160 [ 125.579530][ T5558] ? nlmon_xmit+0x5f/0x70 [ 125.583891][ T5558] ? __this_cpu_preempt_check+0x18/0x20 [ 125.589500][ T5558] ? __local_bh_enable_ip+0x4d/0x70 [ 125.594749][ T5558] ? local_bh_enable+0x1b/0x20 [ 125.599544][ T5558] ? __dev_queue_xmit+0x597/0xf70 [ 125.604575][ T5558] ? __skb_clone+0x2db/0x300 [ 125.609354][ T5558] ? __rcu_read_unlock+0x5c/0x290 [ 125.614413][ T5558] netlink_rcv_skb+0x14e/0x250 [ 125.619159][ T5558] ? rtnetlink_bind+0x60/0x60 [ 125.623921][ T5558] rtnetlink_rcv+0x18/0x20 [ 125.628350][ T5558] netlink_unicast+0x5fc/0x6c0 [ 125.633113][ T5558] netlink_sendmsg+0x6e1/0x7d0 [ 125.637912][ T5558] ? netlink_getsockopt+0x720/0x720 [ 125.643103][ T5558] ____sys_sendmsg+0x39a/0x510 [ 125.647854][ T5558] __sys_sendmsg+0x195/0x230 [ 125.652483][ T5558] __x64_sys_sendmsg+0x42/0x50 [ 125.657338][ T5558] do_syscall_64+0x44/0xd0 [ 125.661735][ T5558] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 125.667651][ T5558] RIP: 0033:0x7ffb90e2cae9 [ 125.672132][ T5558] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 23:48:28 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x3a, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 125.691717][ T5558] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 125.700127][ T5558] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 125.708149][ T5558] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 125.716115][ T5558] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 125.724066][ T5558] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 125.732030][ T5558] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 125.740001][ T5558] 23:48:28 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 42) 23:48:28 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x68, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 125.800987][ T5565] FAULT_INJECTION: forcing a failure. [ 125.800987][ T5565] name failslab, interval 1, probability 0, space 0, times 0 [ 125.813745][ T5565] CPU: 0 PID: 5565 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 125.822422][ T5565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 125.832468][ T5565] Call Trace: [ 125.835735][ T5565] [ 125.838653][ T5565] dump_stack_lvl+0xd6/0x122 [ 125.843318][ T5565] dump_stack+0x11/0x1b [ 125.847464][ T5565] should_fail+0x23c/0x250 [ 125.851877][ T5565] ? __kernfs_new_node+0x6a/0x340 [ 125.856971][ T5565] __should_failslab+0x81/0x90 [ 125.861779][ T5565] should_failslab+0x5/0x20 [ 125.866302][ T5565] kmem_cache_alloc+0x4f/0x320 [ 125.871121][ T5565] ? __down_write_common+0x42/0x860 [ 125.876297][ T5565] __kernfs_new_node+0x6a/0x340 [ 125.881132][ T5565] ? up_write+0x25/0xc0 [ 125.885375][ T5565] kernfs_new_node+0x5b/0xd0 [ 125.889959][ T5565] __kernfs_create_file+0x45/0x1a0 [ 125.895095][ T5565] ? dev_attr_show+0x90/0x90 [ 125.899683][ T5565] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 125.905042][ T5565] internal_create_group+0x2dd/0x840 [ 125.910307][ T5565] sysfs_create_groups+0x3d/0xf0 [ 125.915229][ T5565] device_add+0x606/0xf40 [ 125.919535][ T5565] ? hrtimer_init+0xfc/0x1d0 [ 125.924128][ T5565] netdev_register_kobject+0xfd/0x230 [ 125.929504][ T5565] register_netdevice+0xba5/0x10b0 [ 125.934651][ T5565] hsr_dev_finalize+0x2da/0x460 [ 125.939589][ T5565] hsr_newlink+0x40d/0x450 [ 125.943986][ T5565] ? hsr_get_node_list+0x450/0x450 [ 125.949078][ T5565] rtnl_newlink+0xdae/0x13b0 [ 125.953662][ T5565] ? rtnl_setlink+0x2a0/0x2a0 [ 125.958369][ T5565] rtnetlink_rcv_msg+0x745/0x7e0 [ 125.963308][ T5565] ? ___cache_free+0x46/0x300 [ 125.967968][ T5565] ? kmem_cache_free+0x65/0x110 [ 125.972806][ T5565] ? __kfree_skb+0xfe/0x150 [ 125.977320][ T5565] ? consume_skb+0x48/0x160 [ 125.981802][ T5565] ? nlmon_xmit+0x5f/0x70 [ 125.986152][ T5565] ? __this_cpu_preempt_check+0x18/0x20 [ 125.991698][ T5565] ? __local_bh_enable_ip+0x4d/0x70 [ 125.996872][ T5565] ? local_bh_enable+0x1b/0x20 [ 126.001626][ T5565] ? __dev_queue_xmit+0x597/0xf70 [ 126.006627][ T5565] ? __skb_clone+0x2db/0x300 [ 126.011253][ T5565] ? __rcu_read_unlock+0x5c/0x290 [ 126.016322][ T5565] netlink_rcv_skb+0x14e/0x250 [ 126.021117][ T5565] ? rtnetlink_bind+0x60/0x60 [ 126.025772][ T5565] rtnetlink_rcv+0x18/0x20 [ 126.030164][ T5565] netlink_unicast+0x5fc/0x6c0 [ 126.034966][ T5565] netlink_sendmsg+0x6e1/0x7d0 [ 126.039792][ T5565] ? netlink_getsockopt+0x720/0x720 [ 126.045071][ T5565] ____sys_sendmsg+0x39a/0x510 [ 126.049842][ T5565] __sys_sendmsg+0x195/0x230 [ 126.054427][ T5565] __x64_sys_sendmsg+0x42/0x50 [ 126.059205][ T5565] do_syscall_64+0x44/0xd0 [ 126.063654][ T5565] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 126.069604][ T5565] RIP: 0033:0x7ffb90e2cae9 [ 126.074064][ T5565] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 126.093647][ T5565] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 23:48:28 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 43) [ 126.102060][ T5565] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 126.110009][ T5565] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 126.117958][ T5565] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 126.125903][ T5565] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 126.133892][ T5565] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 126.141847][ T5565] 23:48:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x4c, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 126.187222][ T5573] FAULT_INJECTION: forcing a failure. [ 126.187222][ T5573] name failslab, interval 1, probability 0, space 0, times 0 [ 126.200009][ T5573] CPU: 1 PID: 5573 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 126.208750][ T5573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 126.218800][ T5573] Call Trace: [ 126.222066][ T5573] [ 126.224980][ T5573] dump_stack_lvl+0xd6/0x122 [ 126.229556][ T5573] dump_stack+0x11/0x1b [ 126.233693][ T5573] should_fail+0x23c/0x250 [ 126.238094][ T5573] ? __kernfs_new_node+0x6a/0x340 [ 126.243240][ T5573] __should_failslab+0x81/0x90 [ 126.247987][ T5573] should_failslab+0x5/0x20 [ 126.252476][ T5573] kmem_cache_alloc+0x4f/0x320 [ 126.257223][ T5573] ? __down_write_common+0x42/0x860 [ 126.262410][ T5573] __kernfs_new_node+0x6a/0x340 [ 126.267299][ T5573] ? up_write+0x25/0xc0 [ 126.271464][ T5573] kernfs_new_node+0x5b/0xd0 [ 126.276037][ T5573] __kernfs_create_file+0x45/0x1a0 [ 126.281132][ T5573] ? dev_attr_show+0x90/0x90 [ 126.285725][ T5573] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 126.291082][ T5573] internal_create_group+0x2dd/0x840 [ 126.296359][ T5573] sysfs_create_groups+0x3d/0xf0 [ 126.301357][ T5573] device_add+0x606/0xf40 [ 126.305731][ T5573] ? hrtimer_init+0xfc/0x1d0 [ 126.310309][ T5573] netdev_register_kobject+0xfd/0x230 [ 126.315819][ T5573] register_netdevice+0xba5/0x10b0 [ 126.320914][ T5573] hsr_dev_finalize+0x2da/0x460 [ 126.325752][ T5573] hsr_newlink+0x40d/0x450 [ 126.330159][ T5573] ? hsr_get_node_list+0x450/0x450 [ 126.335326][ T5573] rtnl_newlink+0xdae/0x13b0 [ 126.340002][ T5573] ? __rcu_read_unlock+0x5c/0x290 [ 126.345018][ T5573] ? rtnl_setlink+0x2a0/0x2a0 [ 126.349731][ T5573] rtnetlink_rcv_msg+0x745/0x7e0 [ 126.354652][ T5573] ? ___cache_free+0x46/0x300 [ 126.359309][ T5573] ? kmem_cache_free+0x65/0x110 [ 126.364174][ T5573] ? __kfree_skb+0xfe/0x150 [ 126.368684][ T5573] ? consume_skb+0x48/0x160 [ 126.373176][ T5573] ? nlmon_xmit+0x5f/0x70 [ 126.377495][ T5573] ? __this_cpu_preempt_check+0x18/0x20 [ 126.383049][ T5573] ? __local_bh_enable_ip+0x4d/0x70 [ 126.388240][ T5573] ? local_bh_enable+0x1b/0x20 [ 126.392986][ T5573] ? __dev_queue_xmit+0x597/0xf70 [ 126.398008][ T5573] ? __skb_clone+0x2db/0x300 [ 126.402585][ T5573] ? __rcu_read_unlock+0x5c/0x290 [ 126.407652][ T5573] netlink_rcv_skb+0x14e/0x250 [ 126.412402][ T5573] ? rtnetlink_bind+0x60/0x60 [ 126.417117][ T5573] rtnetlink_rcv+0x18/0x20 [ 126.421523][ T5573] netlink_unicast+0x5fc/0x6c0 [ 126.426323][ T5573] netlink_sendmsg+0x6e1/0x7d0 [ 126.431071][ T5573] ? netlink_getsockopt+0x720/0x720 [ 126.436256][ T5573] ____sys_sendmsg+0x39a/0x510 [ 126.441056][ T5573] __sys_sendmsg+0x195/0x230 [ 126.445688][ T5573] __x64_sys_sendmsg+0x42/0x50 [ 126.450467][ T5573] do_syscall_64+0x44/0xd0 [ 126.454923][ T5573] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 126.460822][ T5573] RIP: 0033:0x7ffb90e2cae9 [ 126.465239][ T5573] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 23:48:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 44) [ 126.484836][ T5573] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 126.493228][ T5573] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 126.501179][ T5573] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 126.509135][ T5573] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 126.517093][ T5573] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 126.525120][ T5573] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 126.533079][ T5573] 23:48:29 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x6c, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:29 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2f, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:29 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x48, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 126.580021][ T5580] FAULT_INJECTION: forcing a failure. [ 126.580021][ T5580] name failslab, interval 1, probability 0, space 0, times 0 [ 126.592781][ T5580] CPU: 1 PID: 5580 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 126.601526][ T5580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 126.611576][ T5580] Call Trace: [ 126.614868][ T5580] [ 126.617810][ T5580] dump_stack_lvl+0xd6/0x122 [ 126.622403][ T5580] dump_stack+0x11/0x1b [ 126.626645][ T5580] should_fail+0x23c/0x250 [ 126.631121][ T5580] ? __kernfs_new_node+0x6a/0x340 [ 126.636198][ T5580] __should_failslab+0x81/0x90 [ 126.640945][ T5580] should_failslab+0x5/0x20 [ 126.645542][ T5580] kmem_cache_alloc+0x4f/0x320 [ 126.650307][ T5580] ? __down_write_common+0x42/0x860 [ 126.655593][ T5580] __kernfs_new_node+0x6a/0x340 [ 126.660444][ T5580] ? up_write+0x25/0xc0 [ 126.664596][ T5580] kernfs_new_node+0x5b/0xd0 [ 126.669197][ T5580] __kernfs_create_file+0x45/0x1a0 [ 126.674340][ T5580] ? dev_attr_show+0x90/0x90 [ 126.679000][ T5580] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 126.684358][ T5580] internal_create_group+0x2dd/0x840 [ 126.689680][ T5580] sysfs_create_groups+0x3d/0xf0 [ 126.694665][ T5580] device_add+0x606/0xf40 [ 126.698985][ T5580] ? hrtimer_init+0xfc/0x1d0 [ 126.703643][ T5580] netdev_register_kobject+0xfd/0x230 [ 126.709067][ T5580] register_netdevice+0xba5/0x10b0 [ 126.714219][ T5580] hsr_dev_finalize+0x2da/0x460 [ 126.719068][ T5580] hsr_newlink+0x40d/0x450 [ 126.723469][ T5580] ? hsr_get_node_list+0x450/0x450 [ 126.728564][ T5580] rtnl_newlink+0xdae/0x13b0 [ 126.733147][ T5580] ? rtnl_setlink+0x2a0/0x2a0 [ 126.737828][ T5580] rtnetlink_rcv_msg+0x745/0x7e0 [ 126.742792][ T5580] ? ___cache_free+0x46/0x300 [ 126.747519][ T5580] ? kmem_cache_free+0x65/0x110 [ 126.752367][ T5580] ? __kfree_skb+0xfe/0x150 [ 126.756880][ T5580] ? consume_skb+0x48/0x160 [ 126.761432][ T5580] ? nlmon_xmit+0x5f/0x70 [ 126.765743][ T5580] ? __this_cpu_preempt_check+0x18/0x20 [ 126.771304][ T5580] ? __local_bh_enable_ip+0x4d/0x70 [ 126.776560][ T5580] ? local_bh_enable+0x1b/0x20 [ 126.781393][ T5580] ? __dev_queue_xmit+0x597/0xf70 [ 126.786496][ T5580] ? __skb_clone+0x2db/0x300 [ 126.791082][ T5580] ? __rcu_read_unlock+0x5c/0x290 [ 126.796083][ T5580] netlink_rcv_skb+0x14e/0x250 [ 126.800930][ T5580] ? rtnetlink_bind+0x60/0x60 [ 126.805610][ T5580] rtnetlink_rcv+0x18/0x20 [ 126.810075][ T5580] netlink_unicast+0x5fc/0x6c0 [ 126.814817][ T5580] netlink_sendmsg+0x6e1/0x7d0 [ 126.819644][ T5580] ? netlink_getsockopt+0x720/0x720 [ 126.824820][ T5580] ____sys_sendmsg+0x39a/0x510 [ 126.829565][ T5580] __sys_sendmsg+0x195/0x230 [ 126.834138][ T5580] __x64_sys_sendmsg+0x42/0x50 [ 126.838885][ T5580] do_syscall_64+0x44/0xd0 [ 126.843282][ T5580] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 126.849235][ T5580] RIP: 0033:0x7ffb90e2cae9 [ 126.853626][ T5580] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 23:48:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 45) [ 126.873504][ T5580] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 126.881904][ T5580] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 126.889852][ T5580] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 126.897864][ T5580] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 126.905825][ T5580] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 126.913796][ T5580] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 126.921752][ T5580] [ 126.969537][ T5590] FAULT_INJECTION: forcing a failure. [ 126.969537][ T5590] name failslab, interval 1, probability 0, space 0, times 0 [ 126.982206][ T5590] CPU: 0 PID: 5590 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 126.990882][ T5590] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 127.000948][ T5590] Call Trace: [ 127.004221][ T5590] [ 127.007133][ T5590] dump_stack_lvl+0xd6/0x122 [ 127.011738][ T5590] dump_stack+0x11/0x1b [ 127.015872][ T5590] should_fail+0x23c/0x250 [ 127.020274][ T5590] ? __kernfs_new_node+0x6a/0x340 [ 127.025276][ T5590] __should_failslab+0x81/0x90 [ 127.030059][ T5590] should_failslab+0x5/0x20 [ 127.034743][ T5590] kmem_cache_alloc+0x4f/0x320 [ 127.039684][ T5590] ? __down_write_common+0x42/0x860 [ 127.044866][ T5590] __kernfs_new_node+0x6a/0x340 [ 127.049719][ T5590] ? up_write+0x25/0xc0 [ 127.053857][ T5590] kernfs_new_node+0x5b/0xd0 [ 127.058480][ T5590] __kernfs_create_file+0x45/0x1a0 [ 127.063759][ T5590] ? dev_attr_show+0x90/0x90 [ 127.068368][ T5590] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 127.073798][ T5590] internal_create_group+0x2dd/0x840 [ 127.079074][ T5590] sysfs_create_groups+0x3d/0xf0 [ 127.084039][ T5590] device_add+0x606/0xf40 [ 127.088409][ T5590] ? hrtimer_init+0xfc/0x1d0 [ 127.093064][ T5590] netdev_register_kobject+0xfd/0x230 [ 127.098452][ T5590] register_netdevice+0xba5/0x10b0 [ 127.103543][ T5590] hsr_dev_finalize+0x2da/0x460 [ 127.108388][ T5590] hsr_newlink+0x40d/0x450 [ 127.112783][ T5590] ? hsr_get_node_list+0x450/0x450 [ 127.117877][ T5590] rtnl_newlink+0xdae/0x13b0 [ 127.122454][ T5590] ? __rcu_read_unlock+0x5c/0x290 [ 127.127460][ T5590] ? rtnl_setlink+0x2a0/0x2a0 [ 127.132215][ T5590] rtnetlink_rcv_msg+0x745/0x7e0 [ 127.137148][ T5590] ? ___cache_free+0x46/0x300 [ 127.141851][ T5590] ? kmem_cache_free+0x65/0x110 [ 127.146800][ T5590] ? __kfree_skb+0xfe/0x150 [ 127.151295][ T5590] ? consume_skb+0x48/0x160 [ 127.155903][ T5590] ? nlmon_xmit+0x5f/0x70 [ 127.160232][ T5590] ? __this_cpu_preempt_check+0x18/0x20 [ 127.165845][ T5590] ? __local_bh_enable_ip+0x4d/0x70 [ 127.171026][ T5590] ? local_bh_enable+0x1b/0x20 [ 127.175770][ T5590] ? __dev_queue_xmit+0x597/0xf70 [ 127.180834][ T5590] ? __skb_clone+0x2db/0x300 [ 127.185412][ T5590] ? __rcu_read_unlock+0x5c/0x290 [ 127.190426][ T5590] netlink_rcv_skb+0x14e/0x250 [ 127.195176][ T5590] ? rtnetlink_bind+0x60/0x60 [ 127.199913][ T5590] rtnetlink_rcv+0x18/0x20 [ 127.204316][ T5590] netlink_unicast+0x5fc/0x6c0 [ 127.209126][ T5590] netlink_sendmsg+0x6e1/0x7d0 [ 127.213999][ T5590] ? netlink_getsockopt+0x720/0x720 [ 127.219247][ T5590] ____sys_sendmsg+0x39a/0x510 [ 127.224021][ T5590] __sys_sendmsg+0x195/0x230 [ 127.228610][ T5590] __x64_sys_sendmsg+0x42/0x50 [ 127.233357][ T5590] do_syscall_64+0x44/0xd0 [ 127.237751][ T5590] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 127.243703][ T5590] RIP: 0033:0x7ffb90e2cae9 [ 127.248127][ T5590] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 23:48:29 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x5c5, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:29 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x56, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 46) [ 127.267743][ T5590] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 127.276137][ T5590] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 127.284143][ T5590] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 127.292113][ T5590] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 127.300095][ T5590] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 127.308095][ T5590] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 127.316048][ T5590] 23:48:29 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x74, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:29 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x4a, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 127.387449][ T5597] FAULT_INJECTION: forcing a failure. [ 127.387449][ T5597] name failslab, interval 1, probability 0, space 0, times 0 [ 127.400179][ T5597] CPU: 0 PID: 5597 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 127.408838][ T5597] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 127.418884][ T5597] Call Trace: [ 127.422226][ T5597] [ 127.425184][ T5597] dump_stack_lvl+0xd6/0x122 [ 127.429756][ T5597] dump_stack+0x11/0x1b [ 127.433905][ T5597] should_fail+0x23c/0x250 [ 127.438302][ T5597] ? __kernfs_new_node+0x6a/0x340 [ 127.443366][ T5597] __should_failslab+0x81/0x90 [ 127.448143][ T5597] should_failslab+0x5/0x20 [ 127.452629][ T5597] kmem_cache_alloc+0x4f/0x320 [ 127.457497][ T5597] ? __down_write_common+0x42/0x860 [ 127.462759][ T5597] __kernfs_new_node+0x6a/0x340 [ 127.467605][ T5597] ? up_write+0x25/0xc0 [ 127.471747][ T5597] kernfs_new_node+0x5b/0xd0 [ 127.476398][ T5597] __kernfs_create_file+0x45/0x1a0 [ 127.481503][ T5597] ? dev_attr_show+0x90/0x90 [ 127.486177][ T5597] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 127.491532][ T5597] internal_create_group+0x2dd/0x840 [ 127.496796][ T5597] sysfs_create_groups+0x3d/0xf0 [ 127.502022][ T5597] device_add+0x606/0xf40 [ 127.506450][ T5597] ? hrtimer_init+0xfc/0x1d0 [ 127.511104][ T5597] netdev_register_kobject+0xfd/0x230 [ 127.516460][ T5597] register_netdevice+0xba5/0x10b0 [ 127.521623][ T5597] hsr_dev_finalize+0x2da/0x460 [ 127.526498][ T5597] hsr_newlink+0x40d/0x450 [ 127.530958][ T5597] ? hsr_get_node_list+0x450/0x450 [ 127.536056][ T5597] rtnl_newlink+0xdae/0x13b0 [ 127.540679][ T5597] ? __rcu_read_unlock+0x5c/0x290 [ 127.545771][ T5597] ? rtnl_setlink+0x2a0/0x2a0 [ 127.550511][ T5597] rtnetlink_rcv_msg+0x745/0x7e0 [ 127.555485][ T5597] ? ___cache_free+0x46/0x300 [ 127.560154][ T5597] ? kmem_cache_free+0x65/0x110 [ 127.564984][ T5597] ? __kfree_skb+0xfe/0x150 [ 127.569471][ T5597] ? consume_skb+0x48/0x160 [ 127.573956][ T5597] ? nlmon_xmit+0x5f/0x70 [ 127.578337][ T5597] ? __this_cpu_preempt_check+0x18/0x20 [ 127.583905][ T5597] ? __local_bh_enable_ip+0x4d/0x70 [ 127.589086][ T5597] ? local_bh_enable+0x1b/0x20 [ 127.593889][ T5597] ? __dev_queue_xmit+0x597/0xf70 [ 127.598937][ T5597] ? __skb_clone+0x2db/0x300 [ 127.603509][ T5597] ? __rcu_read_unlock+0x5c/0x290 [ 127.608535][ T5597] netlink_rcv_skb+0x14e/0x250 [ 127.613281][ T5597] ? rtnetlink_bind+0x60/0x60 [ 127.618013][ T5597] rtnetlink_rcv+0x18/0x20 [ 127.622485][ T5597] netlink_unicast+0x5fc/0x6c0 [ 127.627227][ T5597] netlink_sendmsg+0x6e1/0x7d0 [ 127.631981][ T5597] ? netlink_getsockopt+0x720/0x720 [ 127.637185][ T5597] ____sys_sendmsg+0x39a/0x510 [ 127.641952][ T5597] __sys_sendmsg+0x195/0x230 [ 127.646523][ T5597] __x64_sys_sendmsg+0x42/0x50 [ 127.651334][ T5597] do_syscall_64+0x44/0xd0 [ 127.655726][ T5597] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 127.661596][ T5597] RIP: 0033:0x7ffb90e2cae9 [ 127.666072][ T5597] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 23:48:30 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 47) [ 127.685864][ T5597] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 127.694269][ T5597] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 127.702316][ T5597] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 127.710353][ T5597] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 127.718356][ T5597] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 127.726376][ T5597] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 127.734331][ T5597] 23:48:30 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x3a, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) [ 127.781180][ T5605] FAULT_INJECTION: forcing a failure. [ 127.781180][ T5605] name failslab, interval 1, probability 0, space 0, times 0 [ 127.793951][ T5605] CPU: 1 PID: 5605 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 127.802681][ T5605] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 127.812730][ T5605] Call Trace: [ 127.815995][ T5605] [ 127.818901][ T5605] dump_stack_lvl+0xd6/0x122 [ 127.823472][ T5605] dump_stack+0x11/0x1b [ 127.827653][ T5605] should_fail+0x23c/0x250 [ 127.832051][ T5605] ? __kernfs_new_node+0x6a/0x340 [ 127.837056][ T5605] __should_failslab+0x81/0x90 [ 127.841831][ T5605] should_failslab+0x5/0x20 [ 127.846327][ T5605] kmem_cache_alloc+0x4f/0x320 [ 127.851075][ T5605] ? __down_write_common+0x42/0x860 [ 127.856272][ T5605] __kernfs_new_node+0x6a/0x340 [ 127.861106][ T5605] ? up_write+0x25/0xc0 [ 127.865248][ T5605] kernfs_new_node+0x5b/0xd0 [ 127.869822][ T5605] __kernfs_create_file+0x45/0x1a0 [ 127.874968][ T5605] ? dev_attr_show+0x90/0x90 [ 127.879543][ T5605] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 127.884914][ T5605] internal_create_group+0x2dd/0x840 [ 127.890202][ T5605] sysfs_create_groups+0x3d/0xf0 [ 127.895182][ T5605] device_add+0x606/0xf40 [ 127.899490][ T5605] ? hrtimer_init+0xfc/0x1d0 [ 127.904064][ T5605] netdev_register_kobject+0xfd/0x230 [ 127.909430][ T5605] register_netdevice+0xba5/0x10b0 [ 127.914598][ T5605] hsr_dev_finalize+0x2da/0x460 [ 127.919426][ T5605] hsr_newlink+0x40d/0x450 [ 127.923865][ T5605] ? hsr_get_node_list+0x450/0x450 [ 127.928953][ T5605] rtnl_newlink+0xdae/0x13b0 [ 127.933552][ T5605] ? __rcu_read_unlock+0x5c/0x290 [ 127.938599][ T5605] ? rtnl_setlink+0x2a0/0x2a0 [ 127.943290][ T5605] rtnetlink_rcv_msg+0x745/0x7e0 [ 127.948211][ T5605] ? ___cache_free+0x46/0x300 [ 127.952927][ T5605] ? kmem_cache_free+0x65/0x110 [ 127.957847][ T5605] ? __kfree_skb+0xfe/0x150 [ 127.962479][ T5605] ? consume_skb+0x48/0x160 [ 127.967042][ T5605] ? nlmon_xmit+0x5f/0x70 [ 127.971354][ T5605] ? __this_cpu_preempt_check+0x18/0x20 [ 127.976884][ T5605] ? __local_bh_enable_ip+0x4d/0x70 [ 127.982084][ T5605] ? local_bh_enable+0x1b/0x20 [ 127.986858][ T5605] ? __dev_queue_xmit+0x597/0xf70 [ 127.991960][ T5605] ? __skb_clone+0x2db/0x300 [ 127.996538][ T5605] ? __rcu_read_unlock+0x5c/0x290 [ 128.001657][ T5605] netlink_rcv_skb+0x14e/0x250 [ 128.006420][ T5605] ? rtnetlink_bind+0x60/0x60 [ 128.011077][ T5605] rtnetlink_rcv+0x18/0x20 [ 128.015495][ T5605] netlink_unicast+0x5fc/0x6c0 [ 128.020253][ T5605] netlink_sendmsg+0x6e1/0x7d0 [ 128.025000][ T5605] ? netlink_getsockopt+0x720/0x720 [ 128.030192][ T5605] ____sys_sendmsg+0x39a/0x510 [ 128.035039][ T5605] __sys_sendmsg+0x195/0x230 [ 128.039750][ T5605] __x64_sys_sendmsg+0x42/0x50 [ 128.044529][ T5605] do_syscall_64+0x44/0xd0 [ 128.048957][ T5605] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 128.054839][ T5605] RIP: 0033:0x7ffb90e2cae9 [ 128.059239][ T5605] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 23:48:30 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 48) [ 128.078906][ T5605] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 128.087365][ T5605] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 128.095424][ T5605] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 128.103591][ T5605] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 128.111631][ T5605] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 128.119584][ T5605] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 128.127644][ T5605] 23:48:30 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x7a, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:30 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x5d6, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:30 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x4c, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 128.172688][ T5614] FAULT_INJECTION: forcing a failure. [ 128.172688][ T5614] name failslab, interval 1, probability 0, space 0, times 0 [ 128.185368][ T5614] CPU: 1 PID: 5614 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 128.194061][ T5614] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 128.204114][ T5614] Call Trace: [ 128.207414][ T5614] [ 128.210334][ T5614] dump_stack_lvl+0xd6/0x122 [ 128.215032][ T5614] dump_stack+0x11/0x1b [ 128.219218][ T5614] should_fail+0x23c/0x250 [ 128.223618][ T5614] ? __kernfs_new_node+0x6a/0x340 [ 128.228683][ T5614] __should_failslab+0x81/0x90 [ 128.233431][ T5614] should_failslab+0x5/0x20 [ 128.237994][ T5614] kmem_cache_alloc+0x4f/0x320 [ 128.242749][ T5614] ? __down_write_common+0x42/0x860 [ 128.247935][ T5614] __kernfs_new_node+0x6a/0x340 [ 128.252882][ T5614] ? up_write+0x25/0xc0 [ 128.257017][ T5614] kernfs_new_node+0x5b/0xd0 [ 128.261640][ T5614] __kernfs_create_file+0x45/0x1a0 [ 128.266749][ T5614] ? dev_attr_show+0x90/0x90 [ 128.271350][ T5614] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 128.276714][ T5614] internal_create_group+0x2dd/0x840 [ 128.282065][ T5614] sysfs_create_groups+0x3d/0xf0 [ 128.286994][ T5614] device_add+0x606/0xf40 [ 128.291348][ T5614] ? hrtimer_init+0xfc/0x1d0 [ 128.295938][ T5614] netdev_register_kobject+0xfd/0x230 [ 128.301296][ T5614] register_netdevice+0xba5/0x10b0 [ 128.306455][ T5614] hsr_dev_finalize+0x2da/0x460 [ 128.311393][ T5614] hsr_newlink+0x40d/0x450 [ 128.316253][ T5614] ? hsr_get_node_list+0x450/0x450 [ 128.321369][ T5614] rtnl_newlink+0xdae/0x13b0 [ 128.326204][ T5614] ? __rcu_read_unlock+0x5c/0x290 [ 128.331293][ T5614] ? rtnl_setlink+0x2a0/0x2a0 [ 128.336007][ T5614] rtnetlink_rcv_msg+0x745/0x7e0 [ 128.341007][ T5614] ? ___cache_free+0x46/0x300 [ 128.345685][ T5614] ? kmem_cache_free+0x65/0x110 [ 128.350557][ T5614] ? __kfree_skb+0xfe/0x150 [ 128.355113][ T5614] ? consume_skb+0x48/0x160 [ 128.359601][ T5614] ? nlmon_xmit+0x5f/0x70 [ 128.363911][ T5614] ? __this_cpu_preempt_check+0x18/0x20 [ 128.369486][ T5614] ? __local_bh_enable_ip+0x4d/0x70 [ 128.374744][ T5614] ? local_bh_enable+0x1b/0x20 [ 128.379497][ T5614] ? __dev_queue_xmit+0x597/0xf70 [ 128.384547][ T5614] ? __skb_clone+0x2db/0x300 [ 128.389139][ T5614] ? __rcu_read_unlock+0x5c/0x290 [ 128.394184][ T5614] netlink_rcv_skb+0x14e/0x250 [ 128.399001][ T5614] ? rtnetlink_bind+0x60/0x60 [ 128.403666][ T5614] rtnetlink_rcv+0x18/0x20 [ 128.408121][ T5614] netlink_unicast+0x5fc/0x6c0 [ 128.412948][ T5614] netlink_sendmsg+0x6e1/0x7d0 [ 128.417884][ T5614] ? netlink_getsockopt+0x720/0x720 [ 128.423075][ T5614] ____sys_sendmsg+0x39a/0x510 [ 128.427834][ T5614] __sys_sendmsg+0x195/0x230 [ 128.432473][ T5614] __x64_sys_sendmsg+0x42/0x50 [ 128.437258][ T5614] do_syscall_64+0x44/0xd0 [ 128.441781][ T5614] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 128.447670][ T5614] RIP: 0033:0x7ffb90e2cae9 [ 128.452086][ T5614] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 128.471695][ T5614] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 128.480181][ T5614] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 128.488188][ T5614] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 128.496156][ T5614] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 128.504111][ T5614] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 128.512088][ T5614] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 128.520053][ T5614] 23:48:31 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 49) 23:48:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x60, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:31 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x95, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 128.591166][ T5627] FAULT_INJECTION: forcing a failure. [ 128.591166][ T5627] name failslab, interval 1, probability 0, space 0, times 0 [ 128.603836][ T5627] CPU: 0 PID: 5627 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 128.612512][ T5627] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 128.622558][ T5627] Call Trace: [ 128.625817][ T5627] [ 128.628765][ T5627] dump_stack_lvl+0xd6/0x122 [ 128.633379][ T5627] dump_stack+0x11/0x1b [ 128.637564][ T5627] should_fail+0x23c/0x250 [ 128.641976][ T5627] ? __kernfs_new_node+0x6a/0x340 [ 128.647008][ T5627] __should_failslab+0x81/0x90 [ 128.651751][ T5627] should_failslab+0x5/0x20 [ 128.656274][ T5627] kmem_cache_alloc+0x4f/0x320 [ 128.661041][ T5627] ? __down_write_common+0x42/0x860 [ 128.666238][ T5627] __kernfs_new_node+0x6a/0x340 [ 128.671069][ T5627] ? up_write+0x25/0xc0 [ 128.675320][ T5627] kernfs_new_node+0x5b/0xd0 [ 128.679896][ T5627] __kernfs_create_file+0x45/0x1a0 [ 128.684989][ T5627] ? dev_attr_show+0x90/0x90 [ 128.689632][ T5627] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 128.695001][ T5627] internal_create_group+0x2dd/0x840 [ 128.700348][ T5627] sysfs_create_groups+0x3d/0xf0 [ 128.705320][ T5627] device_add+0x606/0xf40 [ 128.709641][ T5627] ? hrtimer_init+0xfc/0x1d0 [ 128.714275][ T5627] netdev_register_kobject+0xfd/0x230 [ 128.719629][ T5627] register_netdevice+0xba5/0x10b0 [ 128.724727][ T5627] hsr_dev_finalize+0x2da/0x460 [ 128.729634][ T5627] hsr_newlink+0x40d/0x450 [ 128.734051][ T5627] ? hsr_get_node_list+0x450/0x450 [ 128.739146][ T5627] rtnl_newlink+0xdae/0x13b0 [ 128.743724][ T5627] ? rb_insert_color+0x2fa/0x310 [ 128.748680][ T5627] ? rtnl_setlink+0x2a0/0x2a0 [ 128.753492][ T5627] rtnetlink_rcv_msg+0x745/0x7e0 [ 128.758426][ T5627] ? ___cache_free+0x46/0x300 [ 128.763102][ T5627] ? kmem_cache_free+0x65/0x110 [ 128.767977][ T5627] ? __kfree_skb+0xfe/0x150 [ 128.772463][ T5627] ? consume_skb+0x48/0x160 [ 128.776950][ T5627] ? nlmon_xmit+0x5f/0x70 [ 128.781274][ T5627] ? __this_cpu_preempt_check+0x18/0x20 [ 128.786867][ T5627] ? __local_bh_enable_ip+0x4d/0x70 [ 128.792162][ T5627] ? local_bh_enable+0x1b/0x20 [ 128.796910][ T5627] ? __dev_queue_xmit+0x597/0xf70 [ 128.801917][ T5627] ? __skb_clone+0x2db/0x300 [ 128.806554][ T5627] ? __rcu_read_unlock+0x5c/0x290 [ 128.811571][ T5627] netlink_rcv_skb+0x14e/0x250 [ 128.816340][ T5627] ? rtnetlink_bind+0x60/0x60 [ 128.821074][ T5627] rtnetlink_rcv+0x18/0x20 [ 128.825513][ T5627] netlink_unicast+0x5fc/0x6c0 [ 128.830353][ T5627] netlink_sendmsg+0x6e1/0x7d0 [ 128.835137][ T5627] ? netlink_getsockopt+0x720/0x720 [ 128.840404][ T5627] ____sys_sendmsg+0x39a/0x510 [ 128.845245][ T5627] __sys_sendmsg+0x195/0x230 [ 128.849874][ T5627] __x64_sys_sendmsg+0x42/0x50 [ 128.854635][ T5627] do_syscall_64+0x44/0xd0 [ 128.859055][ T5627] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 128.864928][ T5627] RIP: 0033:0x7ffb90e2cae9 [ 128.869369][ T5627] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 23:48:31 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x48, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) [ 128.888967][ T5627] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 128.898893][ T5627] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 128.906999][ T5627] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 128.914956][ T5627] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 128.922904][ T5627] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 128.930938][ T5627] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 128.938889][ T5627] 23:48:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x68, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x56, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:31 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 50) 23:48:31 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xa5, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:31 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x600, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) [ 129.017455][ T5637] FAULT_INJECTION: forcing a failure. [ 129.017455][ T5637] name failslab, interval 1, probability 0, space 0, times 0 [ 129.030117][ T5637] CPU: 1 PID: 5637 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 129.038868][ T5637] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 129.048961][ T5637] Call Trace: [ 129.052231][ T5637] [ 129.055192][ T5637] dump_stack_lvl+0xd6/0x122 [ 129.059865][ T5637] dump_stack+0x11/0x1b [ 129.064000][ T5637] should_fail+0x23c/0x250 [ 129.068394][ T5637] ? __kernfs_new_node+0x6a/0x340 [ 129.073465][ T5637] __should_failslab+0x81/0x90 [ 129.078255][ T5637] should_failslab+0x5/0x20 [ 129.082739][ T5637] kmem_cache_alloc+0x4f/0x320 [ 129.087545][ T5637] ? __down_write_common+0x42/0x860 [ 129.092828][ T5637] __kernfs_new_node+0x6a/0x340 [ 129.097722][ T5637] ? up_write+0x25/0xc0 [ 129.101886][ T5637] kernfs_new_node+0x5b/0xd0 [ 129.106481][ T5637] __kernfs_create_file+0x45/0x1a0 [ 129.111658][ T5637] ? dev_attr_show+0x90/0x90 [ 129.116312][ T5637] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 129.121697][ T5637] internal_create_group+0x2dd/0x840 [ 129.126997][ T5637] sysfs_create_groups+0x3d/0xf0 [ 129.131921][ T5637] device_add+0x606/0xf40 [ 129.136234][ T5637] ? hrtimer_init+0xfc/0x1d0 [ 129.140826][ T5637] netdev_register_kobject+0xfd/0x230 [ 129.146246][ T5637] register_netdevice+0xba5/0x10b0 [ 129.151435][ T5637] hsr_dev_finalize+0x2da/0x460 [ 129.156340][ T5637] hsr_newlink+0x40d/0x450 [ 129.160765][ T5637] ? hsr_get_node_list+0x450/0x450 [ 129.165868][ T5637] rtnl_newlink+0xdae/0x13b0 [ 129.170449][ T5637] ? __rcu_read_unlock+0x5c/0x290 [ 129.175494][ T5637] ? rtnl_setlink+0x2a0/0x2a0 [ 129.180244][ T5637] rtnetlink_rcv_msg+0x745/0x7e0 [ 129.185166][ T5637] ? ___cache_free+0x46/0x300 [ 129.189862][ T5637] ? kmem_cache_free+0x65/0x110 [ 129.194702][ T5637] ? __kfree_skb+0xfe/0x150 [ 129.199213][ T5637] ? consume_skb+0x48/0x160 [ 129.203739][ T5637] ? nlmon_xmit+0x5f/0x70 [ 129.208062][ T5637] ? __this_cpu_preempt_check+0x18/0x20 [ 129.213686][ T5637] ? __local_bh_enable_ip+0x4d/0x70 [ 129.219109][ T5637] ? local_bh_enable+0x1b/0x20 [ 129.223854][ T5637] ? __dev_queue_xmit+0x597/0xf70 [ 129.228908][ T5637] ? __skb_clone+0x2db/0x300 [ 129.233529][ T5637] ? __rcu_read_unlock+0x5c/0x290 [ 129.238737][ T5637] netlink_rcv_skb+0x14e/0x250 [ 129.243517][ T5637] ? rtnetlink_bind+0x60/0x60 [ 129.248340][ T5637] rtnetlink_rcv+0x18/0x20 [ 129.252757][ T5637] netlink_unicast+0x5fc/0x6c0 [ 129.257737][ T5637] netlink_sendmsg+0x6e1/0x7d0 [ 129.262505][ T5637] ? netlink_getsockopt+0x720/0x720 [ 129.267767][ T5637] ____sys_sendmsg+0x39a/0x510 [ 129.272562][ T5637] __sys_sendmsg+0x195/0x230 [ 129.277141][ T5637] __x64_sys_sendmsg+0x42/0x50 [ 129.281980][ T5637] do_syscall_64+0x44/0xd0 [ 129.286444][ T5637] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 129.292368][ T5637] RIP: 0033:0x7ffb90e2cae9 [ 129.296819][ T5637] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 129.316412][ T5637] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 129.324809][ T5637] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 129.332784][ T5637] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 129.340735][ T5637] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 129.348695][ T5637] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 129.356751][ T5637] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 129.364738][ T5637] 23:48:31 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 51) [ 129.417022][ T5649] FAULT_INJECTION: forcing a failure. [ 129.417022][ T5649] name failslab, interval 1, probability 0, space 0, times 0 [ 129.429677][ T5649] CPU: 0 PID: 5649 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 129.438340][ T5649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 129.448372][ T5649] Call Trace: [ 129.451633][ T5649] [ 129.454547][ T5649] dump_stack_lvl+0xd6/0x122 [ 129.459142][ T5649] dump_stack+0x11/0x1b [ 129.463353][ T5649] should_fail+0x23c/0x250 [ 129.467779][ T5649] ? __kernfs_new_node+0x6a/0x340 [ 129.472887][ T5649] __should_failslab+0x81/0x90 [ 129.477739][ T5649] should_failslab+0x5/0x20 [ 129.482227][ T5649] kmem_cache_alloc+0x4f/0x320 [ 129.486988][ T5649] ? __down_write_common+0x42/0x860 [ 129.492183][ T5649] __kernfs_new_node+0x6a/0x340 [ 129.497108][ T5649] ? up_write+0x25/0xc0 [ 129.501251][ T5649] kernfs_new_node+0x5b/0xd0 [ 129.505907][ T5649] __kernfs_create_file+0x45/0x1a0 [ 129.511028][ T5649] ? dev_attr_show+0x90/0x90 [ 129.515678][ T5649] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 129.521114][ T5649] internal_create_group+0x2dd/0x840 [ 129.526433][ T5649] sysfs_create_groups+0x3d/0xf0 [ 129.531354][ T5649] device_add+0x606/0xf40 [ 129.535677][ T5649] ? hrtimer_init+0xfc/0x1d0 [ 129.540356][ T5649] netdev_register_kobject+0xfd/0x230 [ 129.545737][ T5649] register_netdevice+0xba5/0x10b0 [ 129.550833][ T5649] hsr_dev_finalize+0x2da/0x460 [ 129.555673][ T5649] hsr_newlink+0x40d/0x450 [ 129.560091][ T5649] ? hsr_get_node_list+0x450/0x450 [ 129.565229][ T5649] rtnl_newlink+0xdae/0x13b0 [ 129.569891][ T5649] ? rtnl_setlink+0x2a0/0x2a0 [ 129.574563][ T5649] rtnetlink_rcv_msg+0x745/0x7e0 [ 129.579553][ T5649] ? ___cache_free+0x46/0x300 [ 129.584349][ T5649] ? kmem_cache_free+0x65/0x110 [ 129.589245][ T5649] ? __kfree_skb+0xfe/0x150 [ 129.593812][ T5649] ? consume_skb+0x48/0x160 [ 129.598295][ T5649] ? nlmon_xmit+0x5f/0x70 [ 129.602605][ T5649] ? __this_cpu_preempt_check+0x18/0x20 [ 129.608154][ T5649] ? __local_bh_enable_ip+0x4d/0x70 [ 129.613393][ T5649] ? local_bh_enable+0x1b/0x20 [ 129.618135][ T5649] ? __dev_queue_xmit+0x597/0xf70 [ 129.623197][ T5649] ? __skb_clone+0x2db/0x300 [ 129.627816][ T5649] ? __rcu_read_unlock+0x5c/0x290 [ 129.632825][ T5649] netlink_rcv_skb+0x14e/0x250 [ 129.637589][ T5649] ? rtnetlink_bind+0x60/0x60 [ 129.642302][ T5649] rtnetlink_rcv+0x18/0x20 [ 129.646866][ T5649] netlink_unicast+0x5fc/0x6c0 [ 129.651744][ T5649] netlink_sendmsg+0x6e1/0x7d0 [ 129.656556][ T5649] ? netlink_getsockopt+0x720/0x720 [ 129.661792][ T5649] ____sys_sendmsg+0x39a/0x510 [ 129.666608][ T5649] __sys_sendmsg+0x195/0x230 [ 129.671473][ T5649] __x64_sys_sendmsg+0x42/0x50 [ 129.676270][ T5649] do_syscall_64+0x44/0xd0 [ 129.680683][ T5649] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 129.686584][ T5649] RIP: 0033:0x7ffb90e2cae9 [ 129.690976][ T5649] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 23:48:32 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 52) [ 129.710652][ T5649] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 129.719095][ T5649] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 129.727057][ T5649] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 129.735006][ T5649] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 129.743197][ T5649] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 129.751158][ T5649] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 129.759186][ T5649] [ 129.792337][ T5656] FAULT_INJECTION: forcing a failure. [ 129.792337][ T5656] name failslab, interval 1, probability 0, space 0, times 0 [ 129.804985][ T5656] CPU: 0 PID: 5656 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 129.813690][ T5656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 129.823768][ T5656] Call Trace: [ 129.827101][ T5656] [ 129.830052][ T5656] dump_stack_lvl+0xd6/0x122 [ 129.834649][ T5656] dump_stack+0x11/0x1b [ 129.838828][ T5656] should_fail+0x23c/0x250 [ 129.843235][ T5656] ? __kernfs_new_node+0x6a/0x340 [ 129.848403][ T5656] __should_failslab+0x81/0x90 [ 129.853168][ T5656] should_failslab+0x5/0x20 [ 129.857742][ T5656] kmem_cache_alloc+0x4f/0x320 [ 129.862505][ T5656] ? __down_write_common+0x42/0x860 [ 129.867689][ T5656] __kernfs_new_node+0x6a/0x340 [ 129.872588][ T5656] ? up_write+0x25/0xc0 [ 129.876844][ T5656] kernfs_new_node+0x5b/0xd0 [ 129.881474][ T5656] __kernfs_create_file+0x45/0x1a0 [ 129.886567][ T5656] ? dev_attr_show+0x90/0x90 [ 129.891370][ T5656] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 129.896772][ T5656] internal_create_group+0x2dd/0x840 [ 129.902137][ T5656] sysfs_create_groups+0x3d/0xf0 [ 129.907181][ T5656] device_add+0x606/0xf40 [ 129.911495][ T5656] ? hrtimer_init+0xfc/0x1d0 [ 129.916073][ T5656] netdev_register_kobject+0xfd/0x230 [ 129.921508][ T5656] register_netdevice+0xba5/0x10b0 [ 129.926657][ T5656] hsr_dev_finalize+0x2da/0x460 [ 129.931550][ T5656] hsr_newlink+0x40d/0x450 [ 129.935947][ T5656] ? hsr_get_node_list+0x450/0x450 [ 129.941116][ T5656] rtnl_newlink+0xdae/0x13b0 [ 129.945702][ T5656] ? __rcu_read_unlock+0x5c/0x290 [ 129.950735][ T5656] ? rtnl_setlink+0x2a0/0x2a0 [ 129.955395][ T5656] rtnetlink_rcv_msg+0x745/0x7e0 [ 129.960317][ T5656] ? ___cache_free+0x46/0x300 [ 129.965008][ T5656] ? kmem_cache_free+0x65/0x110 [ 129.969839][ T5656] ? __kfree_skb+0xfe/0x150 [ 129.974340][ T5656] ? consume_skb+0x48/0x160 [ 129.978911][ T5656] ? nlmon_xmit+0x5f/0x70 [ 129.983222][ T5656] ? __this_cpu_preempt_check+0x18/0x20 [ 129.988944][ T5656] ? __local_bh_enable_ip+0x4d/0x70 [ 129.994169][ T5656] ? local_bh_enable+0x1b/0x20 [ 129.998994][ T5656] ? __dev_queue_xmit+0x597/0xf70 [ 130.003998][ T5656] ? __skb_clone+0x2db/0x300 [ 130.008639][ T5656] ? __rcu_read_unlock+0x5c/0x290 [ 130.013644][ T5656] netlink_rcv_skb+0x14e/0x250 [ 130.018491][ T5656] ? rtnetlink_bind+0x60/0x60 [ 130.023159][ T5656] rtnetlink_rcv+0x18/0x20 [ 130.027676][ T5656] netlink_unicast+0x5fc/0x6c0 [ 130.032462][ T5656] netlink_sendmsg+0x6e1/0x7d0 [ 130.037251][ T5656] ? netlink_getsockopt+0x720/0x720 [ 130.042450][ T5656] ____sys_sendmsg+0x39a/0x510 [ 130.047240][ T5656] __sys_sendmsg+0x195/0x230 [ 130.051900][ T5656] __x64_sys_sendmsg+0x42/0x50 [ 130.056693][ T5656] do_syscall_64+0x44/0xd0 [ 130.061186][ T5656] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 130.067084][ T5656] RIP: 0033:0x7ffb90e2cae9 [ 130.071514][ T5656] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 23:48:32 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xc3, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x6c, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:32 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x60, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 130.091157][ T5656] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 130.099550][ T5656] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 130.107597][ T5656] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 130.115551][ T5656] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 130.123506][ T5656] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 130.131494][ T5656] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 130.139470][ T5656] 23:48:32 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x4a, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:32 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 53) 23:48:32 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x700, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x74, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 130.219471][ T5667] FAULT_INJECTION: forcing a failure. [ 130.219471][ T5667] name failslab, interval 1, probability 0, space 0, times 0 [ 130.232144][ T5667] CPU: 0 PID: 5667 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 130.240816][ T5667] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 130.250959][ T5667] Call Trace: [ 130.254227][ T5667] [ 130.257213][ T5667] dump_stack_lvl+0xd6/0x122 [ 130.261843][ T5667] dump_stack+0x11/0x1b [ 130.266055][ T5667] should_fail+0x23c/0x250 [ 130.270459][ T5667] ? __kernfs_new_node+0x6a/0x340 [ 130.275472][ T5667] __should_failslab+0x81/0x90 [ 130.280360][ T5667] should_failslab+0x5/0x20 [ 130.284893][ T5667] kmem_cache_alloc+0x4f/0x320 [ 130.289876][ T5667] ? __down_write_common+0x42/0x860 [ 130.295081][ T5667] __kernfs_new_node+0x6a/0x340 [ 130.299941][ T5667] ? up_write+0x25/0xc0 [ 130.304082][ T5667] kernfs_new_node+0x5b/0xd0 [ 130.308654][ T5667] __kernfs_create_file+0x45/0x1a0 [ 130.313818][ T5667] ? dev_attr_show+0x90/0x90 [ 130.318437][ T5667] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 130.323856][ T5667] internal_create_group+0x2dd/0x840 [ 130.329146][ T5667] sysfs_create_groups+0x3d/0xf0 [ 130.334068][ T5667] device_add+0x606/0xf40 [ 130.338444][ T5667] ? hrtimer_init+0xfc/0x1d0 [ 130.343103][ T5667] netdev_register_kobject+0xfd/0x230 [ 130.348477][ T5667] register_netdevice+0xba5/0x10b0 [ 130.353584][ T5667] hsr_dev_finalize+0x2da/0x460 [ 130.358425][ T5667] hsr_newlink+0x40d/0x450 [ 130.362848][ T5667] ? hsr_get_node_list+0x450/0x450 [ 130.367944][ T5667] rtnl_newlink+0xdae/0x13b0 [ 130.372604][ T5667] ? __rcu_read_unlock+0x5c/0x290 [ 130.377646][ T5667] ? rtnl_setlink+0x2a0/0x2a0 [ 130.382348][ T5667] rtnetlink_rcv_msg+0x745/0x7e0 [ 130.387276][ T5667] ? ___cache_free+0x46/0x300 [ 130.391966][ T5667] ? __rcu_read_unlock+0x5c/0x290 [ 130.397008][ T5667] ? kmem_cache_free+0x65/0x110 [ 130.401872][ T5667] ? __kfree_skb+0xfe/0x150 [ 130.406370][ T5667] ? consume_skb+0x48/0x160 [ 130.410858][ T5667] ? nlmon_xmit+0x5f/0x70 [ 130.415218][ T5667] ? __this_cpu_preempt_check+0x18/0x20 [ 130.420824][ T5667] ? __local_bh_enable_ip+0x4d/0x70 [ 130.426055][ T5667] ? local_bh_enable+0x1b/0x20 [ 130.430873][ T5667] ? __dev_queue_xmit+0x597/0xf70 [ 130.435879][ T5667] ? __skb_clone+0x2db/0x300 [ 130.440458][ T5667] ? __rcu_read_unlock+0x5c/0x290 [ 130.445467][ T5667] netlink_rcv_skb+0x14e/0x250 [ 130.450245][ T5667] ? rtnetlink_bind+0x60/0x60 [ 130.454923][ T5667] rtnetlink_rcv+0x18/0x20 [ 130.459345][ T5667] netlink_unicast+0x5fc/0x6c0 [ 130.464093][ T5667] netlink_sendmsg+0x6e1/0x7d0 [ 130.468845][ T5667] ? netlink_getsockopt+0x720/0x720 [ 130.474077][ T5667] ____sys_sendmsg+0x39a/0x510 [ 130.478869][ T5667] __sys_sendmsg+0x195/0x230 [ 130.483454][ T5667] __x64_sys_sendmsg+0x42/0x50 [ 130.488268][ T5667] do_syscall_64+0x44/0xd0 [ 130.492679][ T5667] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 130.498567][ T5667] RIP: 0033:0x7ffb90e2cae9 [ 130.502971][ T5667] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 130.522584][ T5667] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 130.531007][ T5667] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 130.538965][ T5667] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 130.546968][ T5667] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 130.554920][ T5667] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 130.562877][ T5667] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 23:48:33 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 54) [ 130.570867][ T5667] 23:48:33 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xc4, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 130.625454][ T5679] FAULT_INJECTION: forcing a failure. [ 130.625454][ T5679] name failslab, interval 1, probability 0, space 0, times 0 [ 130.638073][ T5679] CPU: 0 PID: 5679 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 130.646870][ T5679] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 130.656976][ T5679] Call Trace: [ 130.660315][ T5679] [ 130.663274][ T5679] dump_stack_lvl+0xd6/0x122 [ 130.667925][ T5679] dump_stack+0x11/0x1b [ 130.672139][ T5679] should_fail+0x23c/0x250 [ 130.676548][ T5679] ? __kernfs_new_node+0x6a/0x340 [ 130.681556][ T5679] __should_failslab+0x81/0x90 [ 130.686302][ T5679] should_failslab+0x5/0x20 [ 130.690801][ T5679] kmem_cache_alloc+0x4f/0x320 [ 130.695545][ T5679] ? __down_write_common+0x42/0x860 [ 130.700748][ T5679] __kernfs_new_node+0x6a/0x340 [ 130.705654][ T5679] ? up_write+0x25/0xc0 [ 130.709804][ T5679] kernfs_new_node+0x5b/0xd0 [ 130.714373][ T5679] __kernfs_create_file+0x45/0x1a0 [ 130.719475][ T5679] ? dev_attr_show+0x90/0x90 23:48:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x7a, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 130.724102][ T5679] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 130.729537][ T5679] internal_create_group+0x2dd/0x840 [ 130.734822][ T5679] sysfs_create_groups+0x3d/0xf0 [ 130.739758][ T5679] device_add+0x606/0xf40 [ 130.744221][ T5679] ? hrtimer_init+0xfc/0x1d0 [ 130.748812][ T5679] netdev_register_kobject+0xfd/0x230 [ 130.754217][ T5679] register_netdevice+0xba5/0x10b0 [ 130.759321][ T5679] hsr_dev_finalize+0x2da/0x460 [ 130.764166][ T5679] hsr_newlink+0x40d/0x450 [ 130.768563][ T5679] ? hsr_get_node_list+0x450/0x450 [ 130.773671][ T5679] rtnl_newlink+0xdae/0x13b0 [ 130.778386][ T5679] ? rtnl_setlink+0x2a0/0x2a0 [ 130.783113][ T5679] rtnetlink_rcv_msg+0x745/0x7e0 [ 130.788112][ T5679] ? ___cache_free+0x46/0x300 [ 130.792827][ T5679] ? kmem_cache_free+0x65/0x110 [ 130.797688][ T5679] ? __kfree_skb+0xfe/0x150 [ 130.802181][ T5679] ? consume_skb+0x48/0x160 [ 130.806688][ T5679] ? nlmon_xmit+0x5f/0x70 [ 130.811076][ T5679] ? __this_cpu_preempt_check+0x18/0x20 [ 130.816628][ T5679] ? __local_bh_enable_ip+0x4d/0x70 [ 130.821858][ T5679] ? local_bh_enable+0x1b/0x20 [ 130.826607][ T5679] ? __dev_queue_xmit+0x597/0xf70 [ 130.831637][ T5679] ? __skb_clone+0x2db/0x300 [ 130.836208][ T5679] ? __rcu_read_unlock+0x5c/0x290 [ 130.841214][ T5679] netlink_rcv_skb+0x14e/0x250 [ 130.846030][ T5679] ? rtnetlink_bind+0x60/0x60 [ 130.850707][ T5679] rtnetlink_rcv+0x18/0x20 [ 130.855256][ T5679] netlink_unicast+0x5fc/0x6c0 [ 130.860065][ T5679] netlink_sendmsg+0x6e1/0x7d0 [ 130.864943][ T5679] ? netlink_getsockopt+0x720/0x720 [ 130.870182][ T5679] ____sys_sendmsg+0x39a/0x510 [ 130.875007][ T5679] __sys_sendmsg+0x195/0x230 [ 130.879745][ T5679] __x64_sys_sendmsg+0x42/0x50 [ 130.884494][ T5679] do_syscall_64+0x44/0xd0 [ 130.888976][ T5679] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 130.894877][ T5679] RIP: 0033:0x7ffb90e2cae9 [ 130.899320][ T5679] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 23:48:33 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 55) 23:48:33 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x68, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 130.919000][ T5679] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 130.927437][ T5679] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 130.935469][ T5679] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 130.943426][ T5679] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 130.951393][ T5679] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 130.959370][ T5679] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 130.967366][ T5679] 23:48:33 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x900, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) [ 131.025136][ T5688] FAULT_INJECTION: forcing a failure. [ 131.025136][ T5688] name failslab, interval 1, probability 0, space 0, times 0 [ 131.037798][ T5688] CPU: 0 PID: 5688 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 131.046471][ T5688] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 131.056503][ T5688] Call Trace: [ 131.059764][ T5688] [ 131.062693][ T5688] dump_stack_lvl+0xd6/0x122 [ 131.067331][ T5688] dump_stack+0x11/0x1b [ 131.071516][ T5688] should_fail+0x23c/0x250 [ 131.075912][ T5688] ? __kernfs_new_node+0x6a/0x340 [ 131.081008][ T5688] __should_failslab+0x81/0x90 [ 131.085804][ T5688] should_failslab+0x5/0x20 [ 131.090328][ T5688] kmem_cache_alloc+0x4f/0x320 [ 131.095076][ T5688] ? __down_write_common+0x42/0x860 [ 131.100310][ T5688] __kernfs_new_node+0x6a/0x340 [ 131.105236][ T5688] ? up_write+0x25/0xc0 [ 131.109374][ T5688] kernfs_new_node+0x5b/0xd0 [ 131.113968][ T5688] __kernfs_create_file+0x45/0x1a0 [ 131.119063][ T5688] ? dev_attr_show+0x90/0x90 [ 131.123653][ T5688] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 131.129167][ T5688] internal_create_group+0x2dd/0x840 [ 131.134449][ T5688] sysfs_create_groups+0x3d/0xf0 [ 131.139368][ T5688] device_add+0x606/0xf40 [ 131.143811][ T5688] ? hrtimer_init+0xfc/0x1d0 [ 131.148388][ T5688] netdev_register_kobject+0xfd/0x230 [ 131.153795][ T5688] register_netdevice+0xba5/0x10b0 [ 131.158960][ T5688] hsr_dev_finalize+0x2da/0x460 [ 131.163798][ T5688] hsr_newlink+0x40d/0x450 [ 131.168251][ T5688] ? hsr_get_node_list+0x450/0x450 [ 131.173399][ T5688] rtnl_newlink+0xdae/0x13b0 [ 131.177982][ T5688] ? rtnl_setlink+0x2a0/0x2a0 [ 131.182744][ T5688] rtnetlink_rcv_msg+0x745/0x7e0 [ 131.187687][ T5688] ? ___cache_free+0x46/0x300 [ 131.192394][ T5688] ? kmem_cache_free+0x65/0x110 [ 131.197397][ T5688] ? __kfree_skb+0xfe/0x150 [ 131.201899][ T5688] ? consume_skb+0x48/0x160 [ 131.206389][ T5688] ? nlmon_xmit+0x5f/0x70 [ 131.210749][ T5688] ? __this_cpu_preempt_check+0x18/0x20 [ 131.216284][ T5688] ? __local_bh_enable_ip+0x4d/0x70 [ 131.221484][ T5688] ? local_bh_enable+0x1b/0x20 [ 131.226227][ T5688] ? __dev_queue_xmit+0x597/0xf70 [ 131.231277][ T5688] ? __skb_clone+0x2db/0x300 [ 131.235854][ T5688] ? __rcu_read_unlock+0x5c/0x290 [ 131.240878][ T5688] netlink_rcv_skb+0x14e/0x250 [ 131.245625][ T5688] ? rtnetlink_bind+0x60/0x60 [ 131.250333][ T5688] rtnetlink_rcv+0x18/0x20 [ 131.254738][ T5688] netlink_unicast+0x5fc/0x6c0 [ 131.259496][ T5688] netlink_sendmsg+0x6e1/0x7d0 [ 131.264316][ T5688] ? netlink_getsockopt+0x720/0x720 [ 131.269511][ T5688] ____sys_sendmsg+0x39a/0x510 [ 131.274303][ T5688] __sys_sendmsg+0x195/0x230 [ 131.278953][ T5688] __x64_sys_sendmsg+0x42/0x50 [ 131.283771][ T5688] do_syscall_64+0x44/0xd0 [ 131.288185][ T5688] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 131.294096][ T5688] RIP: 0033:0x7ffb90e2cae9 [ 131.298493][ T5688] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 131.318088][ T5688] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 23:48:33 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x10e, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 131.326511][ T5688] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 131.334505][ T5688] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 131.342468][ T5688] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 131.350446][ T5688] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 131.358568][ T5688] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 131.366519][ T5688] 23:48:33 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x4c, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x8a, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:33 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x6a, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:33 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 56) [ 131.476509][ T5706] FAULT_INJECTION: forcing a failure. [ 131.476509][ T5706] name failslab, interval 1, probability 0, space 0, times 0 [ 131.489417][ T5706] CPU: 0 PID: 5706 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 131.498210][ T5706] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 131.508308][ T5706] Call Trace: [ 131.511569][ T5706] [ 131.514480][ T5706] dump_stack_lvl+0xd6/0x122 [ 131.519331][ T5706] dump_stack+0x11/0x1b [ 131.523540][ T5706] should_fail+0x23c/0x250 [ 131.527973][ T5706] ? __kernfs_new_node+0x6a/0x340 [ 131.533004][ T5706] __should_failslab+0x81/0x90 [ 131.537776][ T5706] should_failslab+0x5/0x20 [ 131.542271][ T5706] kmem_cache_alloc+0x4f/0x320 [ 131.547027][ T5706] ? __down_write_common+0x42/0x860 [ 131.552265][ T5706] __kernfs_new_node+0x6a/0x340 [ 131.557132][ T5706] ? up_write+0x25/0xc0 [ 131.561316][ T5706] kernfs_new_node+0x5b/0xd0 [ 131.565885][ T5706] __kernfs_create_file+0x45/0x1a0 [ 131.571018][ T5706] ? dev_attr_show+0x90/0x90 [ 131.575641][ T5706] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 131.581060][ T5706] internal_create_group+0x2dd/0x840 [ 131.586369][ T5706] sysfs_create_groups+0x3d/0xf0 [ 131.591287][ T5706] device_add+0x606/0xf40 [ 131.595618][ T5706] ? hrtimer_init+0xfc/0x1d0 [ 131.600257][ T5706] netdev_register_kobject+0xfd/0x230 [ 131.605612][ T5706] register_netdevice+0xba5/0x10b0 [ 131.610716][ T5706] hsr_dev_finalize+0x2da/0x460 [ 131.615552][ T5706] hsr_newlink+0x40d/0x450 [ 131.619967][ T5706] ? hsr_get_node_list+0x450/0x450 [ 131.625074][ T5706] rtnl_newlink+0xdae/0x13b0 [ 131.629735][ T5706] ? rtnl_setlink+0x2a0/0x2a0 [ 131.634390][ T5706] rtnetlink_rcv_msg+0x745/0x7e0 [ 131.639389][ T5706] ? ___cache_free+0x46/0x300 [ 131.644119][ T5706] ? kmem_cache_free+0x65/0x110 [ 131.648968][ T5706] ? __kfree_skb+0xfe/0x150 [ 131.653453][ T5706] ? consume_skb+0x48/0x160 [ 131.657970][ T5706] ? nlmon_xmit+0x5f/0x70 [ 131.662362][ T5706] ? __this_cpu_preempt_check+0x18/0x20 [ 131.667903][ T5706] ? __local_bh_enable_ip+0x4d/0x70 [ 131.673165][ T5706] ? local_bh_enable+0x1b/0x20 [ 131.677925][ T5706] ? __dev_queue_xmit+0x597/0xf70 [ 131.682944][ T5706] ? __skb_clone+0x2db/0x300 [ 131.687605][ T5706] ? __rcu_read_unlock+0x5c/0x290 [ 131.692681][ T5706] netlink_rcv_skb+0x14e/0x250 [ 131.697432][ T5706] ? rtnetlink_bind+0x60/0x60 [ 131.702318][ T5706] rtnetlink_rcv+0x18/0x20 [ 131.706715][ T5706] netlink_unicast+0x5fc/0x6c0 [ 131.711555][ T5706] netlink_sendmsg+0x6e1/0x7d0 [ 131.716358][ T5706] ? netlink_getsockopt+0x720/0x720 [ 131.721547][ T5706] ____sys_sendmsg+0x39a/0x510 [ 131.726306][ T5706] __sys_sendmsg+0x195/0x230 [ 131.730916][ T5706] __x64_sys_sendmsg+0x42/0x50 [ 131.735743][ T5706] do_syscall_64+0x44/0xd0 [ 131.740140][ T5706] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 131.746034][ T5706] RIP: 0033:0x7ffb90e2cae9 [ 131.750461][ T5706] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 23:48:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x120, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 131.770193][ T5706] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 131.778650][ T5706] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 131.786694][ T5706] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 131.794658][ T5706] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 131.802607][ T5706] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 131.810601][ T5706] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 131.818625][ T5706] 23:48:34 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 57) 23:48:34 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0xa00, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x95, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:34 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x6c, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 131.897738][ T5720] FAULT_INJECTION: forcing a failure. [ 131.897738][ T5720] name failslab, interval 1, probability 0, space 0, times 0 [ 131.910398][ T5720] CPU: 1 PID: 5720 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 131.919138][ T5720] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 131.929170][ T5720] Call Trace: [ 131.932428][ T5720] [ 131.935335][ T5720] dump_stack_lvl+0xd6/0x122 [ 131.939946][ T5720] dump_stack+0x11/0x1b [ 131.944108][ T5720] should_fail+0x23c/0x250 [ 131.948518][ T5720] ? __kernfs_new_node+0x6a/0x340 [ 131.953586][ T5720] __should_failslab+0x81/0x90 [ 131.958357][ T5720] should_failslab+0x5/0x20 [ 131.962893][ T5720] kmem_cache_alloc+0x4f/0x320 [ 131.967682][ T5720] ? __down_write_common+0x42/0x860 [ 131.972889][ T5720] __kernfs_new_node+0x6a/0x340 [ 131.977720][ T5720] ? up_write+0x25/0xc0 [ 131.981878][ T5720] kernfs_new_node+0x5b/0xd0 [ 131.986463][ T5720] __kernfs_create_file+0x45/0x1a0 [ 131.991637][ T5720] ? dev_attr_show+0x90/0x90 [ 131.996214][ T5720] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 132.001643][ T5720] internal_create_group+0x2dd/0x840 [ 132.006963][ T5720] sysfs_create_groups+0x3d/0xf0 [ 132.011890][ T5720] device_add+0x606/0xf40 [ 132.016221][ T5720] ? hrtimer_init+0xfc/0x1d0 [ 132.020827][ T5720] netdev_register_kobject+0xfd/0x230 [ 132.026192][ T5720] register_netdevice+0xba5/0x10b0 [ 132.031357][ T5720] hsr_dev_finalize+0x2da/0x460 [ 132.036234][ T5720] hsr_newlink+0x40d/0x450 [ 132.040632][ T5720] ? hsr_get_node_list+0x450/0x450 [ 132.045740][ T5720] rtnl_newlink+0xdae/0x13b0 [ 132.050342][ T5720] ? rtnl_setlink+0x2a0/0x2a0 [ 132.055189][ T5720] rtnetlink_rcv_msg+0x745/0x7e0 [ 132.060101][ T5720] ? ___cache_free+0x46/0x300 [ 132.064763][ T5720] ? kmem_cache_free+0x65/0x110 [ 132.069609][ T5720] ? __kfree_skb+0xfe/0x150 [ 132.074116][ T5720] ? consume_skb+0x48/0x160 [ 132.078614][ T5720] ? nlmon_xmit+0x5f/0x70 [ 132.082936][ T5720] ? __this_cpu_preempt_check+0x18/0x20 [ 132.088460][ T5720] ? __local_bh_enable_ip+0x4d/0x70 [ 132.093649][ T5720] ? local_bh_enable+0x1b/0x20 [ 132.098475][ T5720] ? __dev_queue_xmit+0x597/0xf70 [ 132.103490][ T5720] ? __skb_clone+0x2db/0x300 [ 132.108082][ T5720] ? __rcu_read_unlock+0x5c/0x290 [ 132.113103][ T5720] netlink_rcv_skb+0x14e/0x250 [ 132.117858][ T5720] ? rtnetlink_bind+0x60/0x60 [ 132.122577][ T5720] rtnetlink_rcv+0x18/0x20 [ 132.126974][ T5720] netlink_unicast+0x5fc/0x6c0 [ 132.131803][ T5720] netlink_sendmsg+0x6e1/0x7d0 [ 132.136546][ T5720] ? netlink_getsockopt+0x720/0x720 [ 132.141786][ T5720] ____sys_sendmsg+0x39a/0x510 [ 132.146541][ T5720] __sys_sendmsg+0x195/0x230 [ 132.151139][ T5720] __x64_sys_sendmsg+0x42/0x50 [ 132.155906][ T5720] do_syscall_64+0x44/0xd0 [ 132.160300][ T5720] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 132.166260][ T5720] RIP: 0033:0x7ffb90e2cae9 [ 132.170649][ T5720] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 132.190266][ T5720] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 23:48:34 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x58, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) [ 132.198688][ T5720] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 132.206697][ T5720] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 132.214650][ T5720] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 132.222617][ T5720] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 132.230573][ T5720] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 132.238529][ T5720] 23:48:34 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 58) 23:48:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x1d5, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xc3, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:34 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0xb00, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:34 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x74, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 132.319633][ T5731] FAULT_INJECTION: forcing a failure. [ 132.319633][ T5731] name failslab, interval 1, probability 0, space 0, times 0 [ 132.332476][ T5731] CPU: 0 PID: 5731 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 132.341279][ T5731] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 132.351329][ T5731] Call Trace: [ 132.354588][ T5731] [ 132.357504][ T5731] dump_stack_lvl+0xd6/0x122 [ 132.362092][ T5731] dump_stack+0x11/0x1b [ 132.366246][ T5731] should_fail+0x23c/0x250 [ 132.370727][ T5731] ? __kernfs_new_node+0x6a/0x340 [ 132.375850][ T5731] __should_failslab+0x81/0x90 [ 132.380615][ T5731] should_failslab+0x5/0x20 [ 132.385118][ T5731] kmem_cache_alloc+0x4f/0x320 [ 132.389873][ T5731] ? __down_write_common+0x42/0x860 [ 132.395048][ T5731] __kernfs_new_node+0x6a/0x340 [ 132.399889][ T5731] ? up_write+0x25/0xc0 [ 132.404030][ T5731] kernfs_new_node+0x5b/0xd0 [ 132.408638][ T5731] __kernfs_create_file+0x45/0x1a0 [ 132.413788][ T5731] ? dev_attr_show+0x90/0x90 [ 132.418401][ T5731] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 132.423755][ T5731] internal_create_group+0x2dd/0x840 [ 132.429018][ T5731] sysfs_create_groups+0x3d/0xf0 [ 132.433934][ T5731] device_add+0x606/0xf40 [ 132.438244][ T5731] ? hrtimer_init+0xfc/0x1d0 [ 132.442816][ T5731] netdev_register_kobject+0xfd/0x230 [ 132.448230][ T5731] register_netdevice+0xba5/0x10b0 [ 132.453396][ T5731] hsr_dev_finalize+0x2da/0x460 [ 132.458272][ T5731] hsr_newlink+0x40d/0x450 [ 132.462672][ T5731] ? hsr_get_node_list+0x450/0x450 [ 132.467763][ T5731] rtnl_newlink+0xdae/0x13b0 [ 132.472499][ T5731] ? __rcu_read_unlock+0x5c/0x290 [ 132.477521][ T5731] ? rtnl_setlink+0x2a0/0x2a0 [ 132.482240][ T5731] rtnetlink_rcv_msg+0x745/0x7e0 [ 132.487185][ T5731] ? ___cache_free+0x46/0x300 [ 132.491852][ T5731] ? kmem_cache_free+0x65/0x110 [ 132.496753][ T5731] ? __kfree_skb+0xfe/0x150 [ 132.501257][ T5731] ? consume_skb+0x48/0x160 [ 132.505805][ T5731] ? nlmon_xmit+0x5f/0x70 [ 132.510224][ T5731] ? __this_cpu_preempt_check+0x18/0x20 [ 132.515853][ T5731] ? __local_bh_enable_ip+0x4d/0x70 [ 132.521060][ T5731] ? local_bh_enable+0x1b/0x20 [ 132.525857][ T5731] ? __dev_queue_xmit+0x597/0xf70 [ 132.530916][ T5731] ? __skb_clone+0x2db/0x300 [ 132.535549][ T5731] ? __rcu_read_unlock+0x5c/0x290 [ 132.540569][ T5731] netlink_rcv_skb+0x14e/0x250 [ 132.545361][ T5731] ? rtnetlink_bind+0x60/0x60 [ 132.550057][ T5731] rtnetlink_rcv+0x18/0x20 [ 132.554463][ T5731] netlink_unicast+0x5fc/0x6c0 [ 132.559212][ T5731] netlink_sendmsg+0x6e1/0x7d0 [ 132.564007][ T5731] ? netlink_getsockopt+0x720/0x720 [ 132.569239][ T5731] ____sys_sendmsg+0x39a/0x510 [ 132.574062][ T5731] __sys_sendmsg+0x195/0x230 [ 132.578634][ T5731] __x64_sys_sendmsg+0x42/0x50 [ 132.583408][ T5731] do_syscall_64+0x44/0xd0 [ 132.587812][ T5731] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 132.593768][ T5731] RIP: 0033:0x7ffb90e2cae9 [ 132.598159][ T5731] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 23:48:35 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 59) [ 132.617801][ T5731] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 132.626242][ T5731] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 132.634193][ T5731] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 132.642349][ T5731] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 132.650368][ T5731] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 132.658403][ T5731] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 132.666444][ T5731] [ 132.706121][ T5740] FAULT_INJECTION: forcing a failure. [ 132.706121][ T5740] name failslab, interval 1, probability 0, space 0, times 0 [ 132.718935][ T5740] CPU: 1 PID: 5740 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 132.727658][ T5740] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 132.737699][ T5740] Call Trace: [ 132.740962][ T5740] [ 132.743876][ T5740] dump_stack_lvl+0xd6/0x122 [ 132.748455][ T5740] dump_stack+0x11/0x1b [ 132.752596][ T5740] should_fail+0x23c/0x250 [ 132.757047][ T5740] ? __kernfs_new_node+0x6a/0x340 [ 132.762058][ T5740] __should_failslab+0x81/0x90 [ 132.766897][ T5740] should_failslab+0x5/0x20 [ 132.771471][ T5740] kmem_cache_alloc+0x4f/0x320 [ 132.776247][ T5740] ? __down_write_common+0x42/0x860 [ 132.781429][ T5740] __kernfs_new_node+0x6a/0x340 [ 132.786288][ T5740] ? up_write+0x25/0xc0 [ 132.790431][ T5740] kernfs_new_node+0x5b/0xd0 [ 132.795005][ T5740] __kernfs_create_file+0x45/0x1a0 [ 132.800110][ T5740] ? dev_attr_show+0x90/0x90 [ 132.804754][ T5740] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 132.810227][ T5740] internal_create_group+0x2dd/0x840 [ 132.815496][ T5740] sysfs_create_groups+0x3d/0xf0 [ 132.820498][ T5740] device_add+0x606/0xf40 [ 132.824812][ T5740] ? hrtimer_init+0xfc/0x1d0 [ 132.829452][ T5740] netdev_register_kobject+0xfd/0x230 [ 132.834821][ T5740] register_netdevice+0xba5/0x10b0 [ 132.839961][ T5740] hsr_dev_finalize+0x2da/0x460 [ 132.844801][ T5740] hsr_newlink+0x40d/0x450 [ 132.849205][ T5740] ? hsr_get_node_list+0x450/0x450 [ 132.854355][ T5740] rtnl_newlink+0xdae/0x13b0 [ 132.858929][ T5740] ? rb_insert_color+0x2fa/0x310 [ 132.863871][ T5740] ? rtnl_setlink+0x2a0/0x2a0 [ 132.868579][ T5740] rtnetlink_rcv_msg+0x745/0x7e0 [ 132.873506][ T5740] ? ___cache_free+0x46/0x300 [ 132.878177][ T5740] ? kmem_cache_free+0x65/0x110 [ 132.883057][ T5740] ? __kfree_skb+0xfe/0x150 [ 132.887548][ T5740] ? consume_skb+0x48/0x160 [ 132.892033][ T5740] ? nlmon_xmit+0x5f/0x70 [ 132.896352][ T5740] ? __this_cpu_preempt_check+0x18/0x20 [ 132.901922][ T5740] ? __local_bh_enable_ip+0x4d/0x70 [ 132.907113][ T5740] ? local_bh_enable+0x1b/0x20 [ 132.911869][ T5740] ? __dev_queue_xmit+0x597/0xf70 [ 132.916882][ T5740] ? __skb_clone+0x2db/0x300 [ 132.921561][ T5740] ? __rcu_read_unlock+0x5c/0x290 [ 132.926611][ T5740] netlink_rcv_skb+0x14e/0x250 [ 132.931371][ T5740] ? rtnetlink_bind+0x60/0x60 [ 132.936038][ T5740] rtnetlink_rcv+0x18/0x20 [ 132.940538][ T5740] netlink_unicast+0x5fc/0x6c0 [ 132.945310][ T5740] netlink_sendmsg+0x6e1/0x7d0 [ 132.950140][ T5740] ? netlink_getsockopt+0x720/0x720 [ 132.955355][ T5740] ____sys_sendmsg+0x39a/0x510 [ 132.960148][ T5740] __sys_sendmsg+0x195/0x230 [ 132.964733][ T5740] __x64_sys_sendmsg+0x42/0x50 [ 132.969510][ T5740] do_syscall_64+0x44/0xd0 [ 132.973929][ T5740] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 132.979829][ T5740] RIP: 0033:0x7ffb90e2cae9 [ 132.984242][ T5740] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 23:48:35 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 60) [ 133.003836][ T5740] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 133.012230][ T5740] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 133.020182][ T5740] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 133.028150][ T5740] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 133.036110][ T5740] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 133.044164][ T5740] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 133.052178][ T5740] [ 133.094610][ T5745] FAULT_INJECTION: forcing a failure. [ 133.094610][ T5745] name failslab, interval 1, probability 0, space 0, times 0 [ 133.107348][ T5745] CPU: 0 PID: 5745 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 133.116037][ T5745] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 133.126070][ T5745] Call Trace: [ 133.129330][ T5745] [ 133.132239][ T5745] dump_stack_lvl+0xd6/0x122 [ 133.136809][ T5745] dump_stack+0x11/0x1b [ 133.140941][ T5745] should_fail+0x23c/0x250 [ 133.145351][ T5745] ? __kernfs_new_node+0x6a/0x340 [ 133.150357][ T5745] __should_failslab+0x81/0x90 [ 133.155226][ T5745] should_failslab+0x5/0x20 [ 133.159731][ T5745] kmem_cache_alloc+0x4f/0x320 [ 133.164597][ T5745] ? __down_write_common+0x42/0x860 [ 133.169835][ T5745] __kernfs_new_node+0x6a/0x340 [ 133.174669][ T5745] ? up_write+0x25/0xc0 [ 133.178810][ T5745] kernfs_new_node+0x5b/0xd0 [ 133.183449][ T5745] __kernfs_create_file+0x45/0x1a0 [ 133.188630][ T5745] ? dev_attr_show+0x90/0x90 [ 133.193324][ T5745] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 133.198746][ T5745] internal_create_group+0x2dd/0x840 [ 133.204010][ T5745] sysfs_create_groups+0x3d/0xf0 [ 133.208924][ T5745] device_add+0x606/0xf40 [ 133.213277][ T5745] ? hrtimer_init+0xfc/0x1d0 [ 133.217849][ T5745] netdev_register_kobject+0xfd/0x230 [ 133.223207][ T5745] register_netdevice+0xba5/0x10b0 [ 133.228306][ T5745] hsr_dev_finalize+0x2da/0x460 [ 133.233202][ T5745] hsr_newlink+0x40d/0x450 [ 133.237705][ T5745] ? hsr_get_node_list+0x450/0x450 [ 133.242924][ T5745] rtnl_newlink+0xdae/0x13b0 [ 133.247648][ T5745] ? __rcu_read_unlock+0x5c/0x290 [ 133.252648][ T5745] ? rtnl_setlink+0x2a0/0x2a0 [ 133.257999][ T5745] rtnetlink_rcv_msg+0x745/0x7e0 [ 133.262995][ T5745] ? ___cache_free+0x46/0x300 [ 133.267712][ T5745] ? kmem_cache_free+0x65/0x110 [ 133.272552][ T5745] ? __kfree_skb+0xfe/0x150 [ 133.277036][ T5745] ? consume_skb+0x48/0x160 [ 133.281600][ T5745] ? nlmon_xmit+0x5f/0x70 [ 133.286003][ T5745] ? __this_cpu_preempt_check+0x18/0x20 [ 133.291604][ T5745] ? __local_bh_enable_ip+0x4d/0x70 [ 133.299116][ T5745] ? local_bh_enable+0x1b/0x20 [ 133.304122][ T5745] ? __dev_queue_xmit+0x597/0xf70 [ 133.309124][ T5745] ? __skb_clone+0x2db/0x300 [ 133.313728][ T5745] ? __rcu_read_unlock+0x5c/0x290 [ 133.318741][ T5745] netlink_rcv_skb+0x14e/0x250 [ 133.323534][ T5745] ? rtnetlink_bind+0x60/0x60 [ 133.328191][ T5745] rtnetlink_rcv+0x18/0x20 [ 133.332667][ T5745] netlink_unicast+0x5fc/0x6c0 [ 133.337425][ T5745] netlink_sendmsg+0x6e1/0x7d0 [ 133.342206][ T5745] ? netlink_getsockopt+0x720/0x720 [ 133.347384][ T5745] ____sys_sendmsg+0x39a/0x510 [ 133.352131][ T5745] __sys_sendmsg+0x195/0x230 [ 133.356727][ T5745] __x64_sys_sendmsg+0x42/0x50 [ 133.361489][ T5745] do_syscall_64+0x44/0xd0 [ 133.365892][ T5745] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 133.371776][ T5745] RIP: 0033:0x7ffb90e2cae9 [ 133.376262][ T5745] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 133.395936][ T5745] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 133.404379][ T5745] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 133.412351][ T5745] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 133.420424][ T5745] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 133.428379][ T5745] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 133.436331][ T5745] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 23:48:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x211, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:36 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x7a, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 133.444289][ T5745] 23:48:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x211, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:36 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 61) 23:48:36 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x60, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:36 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0xc00, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) [ 133.525729][ T5759] FAULT_INJECTION: forcing a failure. [ 133.525729][ T5759] name failslab, interval 1, probability 0, space 0, times 0 [ 133.538427][ T5759] CPU: 0 PID: 5759 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 133.547097][ T5759] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 133.557143][ T5759] Call Trace: [ 133.560403][ T5759] [ 133.563323][ T5759] dump_stack_lvl+0xd6/0x122 [ 133.567954][ T5759] dump_stack+0x11/0x1b [ 133.572094][ T5759] should_fail+0x23c/0x250 [ 133.576511][ T5759] ? __kernfs_new_node+0x6a/0x340 [ 133.581544][ T5759] __should_failslab+0x81/0x90 [ 133.586289][ T5759] should_failslab+0x5/0x20 [ 133.590790][ T5759] kmem_cache_alloc+0x4f/0x320 [ 133.595530][ T5759] ? __down_write_common+0x42/0x860 [ 133.600706][ T5759] __kernfs_new_node+0x6a/0x340 [ 133.605609][ T5759] ? up_write+0x25/0xc0 [ 133.609817][ T5759] kernfs_new_node+0x5b/0xd0 [ 133.614394][ T5759] __kernfs_create_file+0x45/0x1a0 [ 133.619487][ T5759] ? dev_attr_show+0x90/0x90 [ 133.624138][ T5759] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 133.629503][ T5759] internal_create_group+0x2dd/0x840 [ 133.634843][ T5759] sysfs_create_groups+0x3d/0xf0 [ 133.639799][ T5759] device_add+0x606/0xf40 [ 133.644147][ T5759] ? hrtimer_init+0xfc/0x1d0 [ 133.648807][ T5759] netdev_register_kobject+0xfd/0x230 [ 133.654161][ T5759] register_netdevice+0xba5/0x10b0 [ 133.659338][ T5759] hsr_dev_finalize+0x2da/0x460 [ 133.664242][ T5759] hsr_newlink+0x40d/0x450 [ 133.668685][ T5759] ? hsr_get_node_list+0x450/0x450 [ 133.673778][ T5759] rtnl_newlink+0xdae/0x13b0 [ 133.678357][ T5759] ? rb_insert_color+0x2fa/0x310 [ 133.683343][ T5759] ? rtnl_setlink+0x2a0/0x2a0 [ 133.688000][ T5759] rtnetlink_rcv_msg+0x745/0x7e0 [ 133.692931][ T5759] ? ___cache_free+0x46/0x300 [ 133.697590][ T5759] ? kmem_cache_free+0x65/0x110 [ 133.702439][ T5759] ? __kfree_skb+0xfe/0x150 [ 133.706990][ T5759] ? consume_skb+0x48/0x160 [ 133.711579][ T5759] ? nlmon_xmit+0x5f/0x70 [ 133.716008][ T5759] ? __this_cpu_preempt_check+0x18/0x20 [ 133.721542][ T5759] ? __local_bh_enable_ip+0x4d/0x70 [ 133.726813][ T5759] ? local_bh_enable+0x1b/0x20 [ 133.731589][ T5759] ? __dev_queue_xmit+0x597/0xf70 [ 133.736662][ T5759] ? __skb_clone+0x2db/0x300 [ 133.741235][ T5759] ? __rcu_read_unlock+0x5c/0x290 [ 133.746313][ T5759] netlink_rcv_skb+0x14e/0x250 [ 133.751063][ T5759] ? rtnetlink_bind+0x60/0x60 [ 133.755788][ T5759] rtnetlink_rcv+0x18/0x20 [ 133.760325][ T5759] netlink_unicast+0x5fc/0x6c0 [ 133.765095][ T5759] netlink_sendmsg+0x6e1/0x7d0 [ 133.769847][ T5759] ? netlink_getsockopt+0x720/0x720 [ 133.775049][ T5759] ____sys_sendmsg+0x39a/0x510 [ 133.779978][ T5759] __sys_sendmsg+0x195/0x230 [ 133.784558][ T5759] __x64_sys_sendmsg+0x42/0x50 [ 133.789314][ T5759] do_syscall_64+0x44/0xd0 [ 133.793726][ T5759] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 133.799682][ T5759] RIP: 0033:0x7ffb90e2cae9 [ 133.804073][ T5759] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 23:48:36 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 62) [ 133.823718][ T5759] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 133.832193][ T5759] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 133.840143][ T5759] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 133.848202][ T5759] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 133.856210][ T5759] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 133.864232][ T5759] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 133.872231][ T5759] 23:48:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x21c, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x233, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 133.924478][ T5768] FAULT_INJECTION: forcing a failure. [ 133.924478][ T5768] name failslab, interval 1, probability 0, space 0, times 0 [ 133.937107][ T5768] CPU: 1 PID: 5768 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 133.945773][ T5768] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 133.955823][ T5768] Call Trace: [ 133.959095][ T5768] [ 133.962036][ T5768] dump_stack_lvl+0xd6/0x122 [ 133.966653][ T5768] dump_stack+0x11/0x1b [ 133.970804][ T5768] should_fail+0x23c/0x250 [ 133.975243][ T5768] ? __kernfs_new_node+0x6a/0x340 [ 133.980244][ T5768] __should_failslab+0x81/0x90 [ 133.984989][ T5768] should_failslab+0x5/0x20 [ 133.989471][ T5768] kmem_cache_alloc+0x4f/0x320 [ 133.994285][ T5768] ? __down_write_common+0x42/0x860 [ 133.999645][ T5768] __kernfs_new_node+0x6a/0x340 [ 134.004495][ T5768] ? up_write+0x25/0xc0 [ 134.008644][ T5768] kernfs_new_node+0x5b/0xd0 [ 134.013215][ T5768] __kernfs_create_file+0x45/0x1a0 [ 134.018354][ T5768] ? dev_attr_show+0x90/0x90 [ 134.023000][ T5768] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 134.028375][ T5768] internal_create_group+0x2dd/0x840 [ 134.033643][ T5768] sysfs_create_groups+0x3d/0xf0 [ 134.038576][ T5768] device_add+0x606/0xf40 [ 134.042993][ T5768] ? hrtimer_init+0xfc/0x1d0 [ 134.047582][ T5768] netdev_register_kobject+0xfd/0x230 [ 134.052947][ T5768] register_netdevice+0xba5/0x10b0 [ 134.058075][ T5768] hsr_dev_finalize+0x2da/0x460 [ 134.062912][ T5768] hsr_newlink+0x40d/0x450 [ 134.067450][ T5768] ? hsr_get_node_list+0x450/0x450 [ 134.072614][ T5768] rtnl_newlink+0xdae/0x13b0 [ 134.077207][ T5768] ? __rcu_read_unlock+0x5c/0x290 [ 134.082221][ T5768] ? rtnl_setlink+0x2a0/0x2a0 [ 134.086888][ T5768] rtnetlink_rcv_msg+0x745/0x7e0 [ 134.091878][ T5768] ? ___cache_free+0x46/0x300 [ 134.096561][ T5768] ? kmem_cache_free+0x65/0x110 [ 134.101408][ T5768] ? __kfree_skb+0xfe/0x150 [ 134.105906][ T5768] ? consume_skb+0x48/0x160 [ 134.110477][ T5768] ? nlmon_xmit+0x5f/0x70 [ 134.114787][ T5768] ? __this_cpu_preempt_check+0x18/0x20 [ 134.120469][ T5768] ? __local_bh_enable_ip+0x4d/0x70 [ 134.125660][ T5768] ? local_bh_enable+0x1b/0x20 [ 134.130453][ T5768] ? __dev_queue_xmit+0x597/0xf70 [ 134.135489][ T5768] ? __skb_clone+0x2db/0x300 [ 134.140095][ T5768] ? __rcu_read_unlock+0x5c/0x290 [ 134.145097][ T5768] netlink_rcv_skb+0x14e/0x250 [ 134.150343][ T5768] ? rtnetlink_bind+0x60/0x60 [ 134.155001][ T5768] rtnetlink_rcv+0x18/0x20 [ 134.159428][ T5768] netlink_unicast+0x5fc/0x6c0 [ 134.164176][ T5768] netlink_sendmsg+0x6e1/0x7d0 [ 134.168954][ T5768] ? netlink_getsockopt+0x720/0x720 [ 134.174155][ T5768] ____sys_sendmsg+0x39a/0x510 [ 134.178900][ T5768] __sys_sendmsg+0x195/0x230 [ 134.183566][ T5768] __x64_sys_sendmsg+0x42/0x50 [ 134.188329][ T5768] do_syscall_64+0x44/0xd0 [ 134.192736][ T5768] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 134.198730][ T5768] RIP: 0033:0x7ffb90e2cae9 [ 134.203146][ T5768] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 134.222858][ T5768] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 134.231317][ T5768] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 134.239378][ T5768] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 134.247418][ T5768] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 134.255383][ T5768] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 134.263334][ T5768] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 134.271336][ T5768] 23:48:36 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 63) 23:48:36 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0xd00, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) [ 134.326796][ T5779] FAULT_INJECTION: forcing a failure. [ 134.326796][ T5779] name failslab, interval 1, probability 0, space 0, times 0 [ 134.339471][ T5779] CPU: 0 PID: 5779 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 134.348180][ T5779] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 134.358217][ T5779] Call Trace: [ 134.361490][ T5779] [ 134.364408][ T5779] dump_stack_lvl+0xd6/0x122 [ 134.368992][ T5779] dump_stack+0x11/0x1b [ 134.373179][ T5779] should_fail+0x23c/0x250 [ 134.377596][ T5779] ? __kernfs_new_node+0x6a/0x340 [ 134.382649][ T5779] __should_failslab+0x81/0x90 [ 134.387430][ T5779] should_failslab+0x5/0x20 [ 134.391961][ T5779] kmem_cache_alloc+0x4f/0x320 [ 134.396825][ T5779] __kernfs_new_node+0x6a/0x340 [ 134.401708][ T5779] ? __down_write_common+0x42/0x860 [ 134.406902][ T5779] ? idr_alloc_cyclic+0x26b/0x2f0 [ 134.411918][ T5779] ? __down_write_common+0x42/0x860 [ 134.417176][ T5779] ? rb_insert_color+0x7e/0x310 [ 134.422125][ T5779] kernfs_new_node+0x5b/0xd0 [ 134.426801][ T5779] __kernfs_create_file+0x45/0x1a0 [ 134.432023][ T5779] ? dev_attr_show+0x90/0x90 [ 134.436610][ T5779] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 134.441962][ T5779] internal_create_group+0x2dd/0x840 [ 134.447254][ T5779] sysfs_create_groups+0x3d/0xf0 [ 134.452314][ T5779] device_add+0x66a/0xf40 [ 134.456624][ T5779] netdev_register_kobject+0xfd/0x230 [ 134.462010][ T5779] register_netdevice+0xba5/0x10b0 [ 134.467121][ T5779] hsr_dev_finalize+0x2da/0x460 [ 134.471984][ T5779] hsr_newlink+0x40d/0x450 [ 134.476396][ T5779] ? hsr_get_node_list+0x450/0x450 [ 134.481484][ T5779] rtnl_newlink+0xdae/0x13b0 [ 134.486139][ T5779] ? __rcu_read_unlock+0x5c/0x290 [ 134.491213][ T5779] ? rtnl_setlink+0x2a0/0x2a0 [ 134.495975][ T5779] rtnetlink_rcv_msg+0x745/0x7e0 [ 134.501016][ T5779] ? ___cache_free+0x46/0x300 [ 134.505674][ T5779] ? kmem_cache_free+0x65/0x110 [ 134.510507][ T5779] ? __kfree_skb+0xfe/0x150 [ 134.515004][ T5779] ? consume_skb+0x48/0x160 [ 134.519541][ T5779] ? nlmon_xmit+0x5f/0x70 [ 134.523884][ T5779] ? __this_cpu_preempt_check+0x18/0x20 [ 134.529411][ T5779] ? __local_bh_enable_ip+0x4d/0x70 [ 134.534603][ T5779] ? local_bh_enable+0x1b/0x20 [ 134.539451][ T5779] ? __dev_queue_xmit+0x597/0xf70 [ 134.544536][ T5779] ? __skb_clone+0x2db/0x300 [ 134.549122][ T5779] ? __rcu_read_unlock+0x5c/0x290 [ 134.554124][ T5779] netlink_rcv_skb+0x14e/0x250 [ 134.558934][ T5779] ? rtnetlink_bind+0x60/0x60 [ 134.563669][ T5779] rtnetlink_rcv+0x18/0x20 [ 134.568083][ T5779] netlink_unicast+0x5fc/0x6c0 [ 134.572847][ T5779] netlink_sendmsg+0x6e1/0x7d0 [ 134.577677][ T5779] ? netlink_getsockopt+0x720/0x720 [ 134.582862][ T5779] ____sys_sendmsg+0x39a/0x510 [ 134.587658][ T5779] __sys_sendmsg+0x195/0x230 [ 134.592343][ T5779] __x64_sys_sendmsg+0x42/0x50 [ 134.597133][ T5779] do_syscall_64+0x44/0xd0 [ 134.601581][ T5779] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 134.607472][ T5779] RIP: 0033:0x7ffb90e2cae9 [ 134.611875][ T5779] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 134.631524][ T5779] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 134.639917][ T5779] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 134.647912][ T5779] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 134.655881][ T5779] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 134.663874][ T5779] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 23:48:37 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 64) [ 134.671838][ T5779] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 134.679788][ T5779] 23:48:37 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x68, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:37 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x8d, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:37 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2e0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 134.747010][ T5783] FAULT_INJECTION: forcing a failure. [ 134.747010][ T5783] name failslab, interval 1, probability 0, space 0, times 0 [ 134.759720][ T5783] CPU: 0 PID: 5783 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 134.768454][ T5783] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 134.778487][ T5783] Call Trace: [ 134.781748][ T5783] [ 134.784659][ T5783] dump_stack_lvl+0xd6/0x122 [ 134.789246][ T5783] dump_stack+0x11/0x1b [ 134.793428][ T5783] should_fail+0x23c/0x250 [ 134.797823][ T5783] ? __kernfs_new_node+0x6a/0x340 [ 134.802834][ T5783] __should_failslab+0x81/0x90 [ 134.807576][ T5783] should_failslab+0x5/0x20 [ 134.812074][ T5783] kmem_cache_alloc+0x4f/0x320 [ 134.816934][ T5783] __kernfs_new_node+0x6a/0x340 [ 134.821787][ T5783] ? __down_write_common+0x2de/0x860 [ 134.827086][ T5783] ? __down_write_common+0x2de/0x860 [ 134.832355][ T5783] kernfs_new_node+0x5b/0xd0 [ 134.836948][ T5783] __kernfs_create_file+0x45/0x1a0 [ 134.842072][ T5783] ? dev_attr_show+0x90/0x90 [ 134.846651][ T5783] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 134.852059][ T5783] internal_create_group+0x2dd/0x840 [ 134.857325][ T5783] sysfs_create_groups+0x3d/0xf0 [ 134.862346][ T5783] device_add+0x66a/0xf40 [ 134.866655][ T5783] netdev_register_kobject+0xfd/0x230 [ 134.872027][ T5783] register_netdevice+0xba5/0x10b0 [ 134.877292][ T5783] hsr_dev_finalize+0x2da/0x460 [ 134.882137][ T5783] hsr_newlink+0x40d/0x450 [ 134.886582][ T5783] ? hsr_get_node_list+0x450/0x450 [ 134.891806][ T5783] rtnl_newlink+0xdae/0x13b0 [ 134.896423][ T5783] ? rb_insert_color+0x2fa/0x310 [ 134.901449][ T5783] ? rtnl_setlink+0x2a0/0x2a0 [ 134.906106][ T5783] rtnetlink_rcv_msg+0x745/0x7e0 [ 134.911028][ T5783] ? ___cache_free+0x46/0x300 [ 134.915695][ T5783] ? kmem_cache_free+0x65/0x110 [ 134.920539][ T5783] ? __kfree_skb+0xfe/0x150 [ 134.925109][ T5783] ? consume_skb+0x48/0x160 [ 134.929641][ T5783] ? nlmon_xmit+0x5f/0x70 [ 134.933972][ T5783] ? __this_cpu_preempt_check+0x18/0x20 [ 134.943040][ T5783] ? __local_bh_enable_ip+0x4d/0x70 [ 134.948250][ T5783] ? local_bh_enable+0x1b/0x20 [ 134.952989][ T5783] ? __dev_queue_xmit+0x597/0xf70 [ 134.958018][ T5783] ? __skb_clone+0x2db/0x300 [ 134.962599][ T5783] ? __rcu_read_unlock+0x5c/0x290 [ 134.967673][ T5783] netlink_rcv_skb+0x14e/0x250 [ 134.972423][ T5783] ? rtnetlink_bind+0x60/0x60 [ 134.977115][ T5783] rtnetlink_rcv+0x18/0x20 [ 134.981599][ T5783] netlink_unicast+0x5fc/0x6c0 [ 134.986406][ T5783] netlink_sendmsg+0x6e1/0x7d0 [ 134.991169][ T5783] ? netlink_getsockopt+0x720/0x720 [ 134.996383][ T5783] ____sys_sendmsg+0x39a/0x510 [ 135.001153][ T5783] __sys_sendmsg+0x195/0x230 [ 135.005749][ T5783] __x64_sys_sendmsg+0x42/0x50 [ 135.010498][ T5783] do_syscall_64+0x44/0xd0 [ 135.014916][ T5783] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 135.020797][ T5783] RIP: 0033:0x7ffb90e2cae9 [ 135.025208][ T5783] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 23:48:37 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 65) [ 135.044855][ T5783] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 135.053245][ T5783] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 135.061250][ T5783] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 135.069216][ T5783] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 135.077220][ T5783] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 135.086635][ T5783] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 135.094636][ T5783] 23:48:37 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0xe00, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:37 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x233, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:37 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x95, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 135.171278][ T5792] FAULT_INJECTION: forcing a failure. [ 135.171278][ T5792] name failslab, interval 1, probability 0, space 0, times 0 [ 135.184035][ T5792] CPU: 0 PID: 5792 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 135.192697][ T5792] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 135.202931][ T5792] Call Trace: [ 135.206192][ T5792] [ 135.209210][ T5792] dump_stack_lvl+0xd6/0x122 [ 135.213791][ T5792] dump_stack+0x11/0x1b [ 135.217997][ T5792] should_fail+0x23c/0x250 [ 135.222467][ T5792] ? __kernfs_new_node+0x6a/0x340 [ 135.227495][ T5792] __should_failslab+0x81/0x90 [ 135.232244][ T5792] should_failslab+0x5/0x20 [ 135.236786][ T5792] kmem_cache_alloc+0x4f/0x320 [ 135.241590][ T5792] ? __down_write_common+0x42/0x860 [ 135.246769][ T5792] __kernfs_new_node+0x6a/0x340 [ 135.251605][ T5792] ? up_write+0x25/0xc0 [ 135.255756][ T5792] kernfs_new_node+0x5b/0xd0 [ 135.260490][ T5792] __kernfs_create_file+0x45/0x1a0 [ 135.265692][ T5792] ? dev_attr_show+0x90/0x90 [ 135.270336][ T5792] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 135.275795][ T5792] internal_create_group+0x2dd/0x840 [ 135.281110][ T5792] sysfs_create_groups+0x3d/0xf0 [ 135.286036][ T5792] device_add+0x66a/0xf40 [ 135.290400][ T5792] netdev_register_kobject+0xfd/0x230 [ 135.295814][ T5792] register_netdevice+0xba5/0x10b0 [ 135.300914][ T5792] hsr_dev_finalize+0x2da/0x460 [ 135.305746][ T5792] hsr_newlink+0x40d/0x450 [ 135.310206][ T5792] ? hsr_get_node_list+0x450/0x450 [ 135.315404][ T5792] rtnl_newlink+0xdae/0x13b0 [ 135.319996][ T5792] ? rtnl_setlink+0x2a0/0x2a0 [ 135.324722][ T5792] rtnetlink_rcv_msg+0x745/0x7e0 [ 135.329736][ T5792] ? ___cache_free+0x46/0x300 [ 135.334479][ T5792] ? kmem_cache_free+0x65/0x110 [ 135.339318][ T5792] ? __kfree_skb+0xfe/0x150 [ 135.343907][ T5792] ? consume_skb+0x48/0x160 [ 135.348489][ T5792] ? nlmon_xmit+0x5f/0x70 [ 135.352853][ T5792] ? __this_cpu_preempt_check+0x18/0x20 [ 135.358395][ T5792] ? __local_bh_enable_ip+0x4d/0x70 [ 135.363574][ T5792] ? local_bh_enable+0x1b/0x20 [ 135.368355][ T5792] ? __dev_queue_xmit+0x597/0xf70 [ 135.373410][ T5792] ? __skb_clone+0x2db/0x300 [ 135.377980][ T5792] ? __rcu_read_unlock+0x5c/0x290 [ 135.383041][ T5792] netlink_rcv_skb+0x14e/0x250 [ 135.387908][ T5792] ? rtnetlink_bind+0x60/0x60 [ 135.392567][ T5792] rtnetlink_rcv+0x18/0x20 [ 135.396963][ T5792] netlink_unicast+0x5fc/0x6c0 [ 135.401710][ T5792] netlink_sendmsg+0x6e1/0x7d0 [ 135.406456][ T5792] ? netlink_getsockopt+0x720/0x720 [ 135.411671][ T5792] ____sys_sendmsg+0x39a/0x510 [ 135.416464][ T5792] __sys_sendmsg+0x195/0x230 [ 135.421230][ T5792] __x64_sys_sendmsg+0x42/0x50 [ 135.425987][ T5792] do_syscall_64+0x44/0xd0 [ 135.430395][ T5792] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 135.436286][ T5792] RIP: 0033:0x7ffb90e2cae9 [ 135.440766][ T5792] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 135.460436][ T5792] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 23:48:38 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 66) 23:48:38 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2f2, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 135.468831][ T5792] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 135.477128][ T5792] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 135.485094][ T5792] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 135.493077][ T5792] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 135.501187][ T5792] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 135.509151][ T5792] 23:48:38 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0xf00, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) [ 135.556225][ T5806] FAULT_INJECTION: forcing a failure. [ 135.556225][ T5806] name failslab, interval 1, probability 0, space 0, times 0 [ 135.568870][ T5806] CPU: 0 PID: 5806 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 135.577522][ T5806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 135.587557][ T5806] Call Trace: [ 135.590903][ T5806] [ 135.593828][ T5806] dump_stack_lvl+0xd6/0x122 [ 135.598403][ T5806] dump_stack+0x11/0x1b [ 135.602650][ T5806] should_fail+0x23c/0x250 [ 135.607047][ T5806] ? __kernfs_new_node+0x6a/0x340 [ 135.612105][ T5806] __should_failslab+0x81/0x90 [ 135.616863][ T5806] should_failslab+0x5/0x20 [ 135.621345][ T5806] kmem_cache_alloc+0x4f/0x320 [ 135.626087][ T5806] ? __down_write_common+0x42/0x860 [ 135.631368][ T5806] __kernfs_new_node+0x6a/0x340 [ 135.636331][ T5806] ? up_write+0x25/0xc0 [ 135.640496][ T5806] kernfs_new_node+0x5b/0xd0 [ 135.645086][ T5806] __kernfs_create_file+0x45/0x1a0 [ 135.650222][ T5806] ? dev_attr_show+0x90/0x90 [ 135.654810][ T5806] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 135.660193][ T5806] internal_create_group+0x2dd/0x840 [ 135.665471][ T5806] sysfs_create_groups+0x3d/0xf0 [ 135.670458][ T5806] device_add+0x66a/0xf40 [ 135.674771][ T5806] netdev_register_kobject+0xfd/0x230 [ 135.680140][ T5806] register_netdevice+0xba5/0x10b0 [ 135.685335][ T5806] hsr_dev_finalize+0x2da/0x460 [ 135.690179][ T5806] hsr_newlink+0x40d/0x450 [ 135.694665][ T5806] ? hsr_get_node_list+0x450/0x450 [ 135.699868][ T5806] rtnl_newlink+0xdae/0x13b0 [ 135.704520][ T5806] ? __rcu_read_unlock+0x5c/0x290 [ 135.709802][ T5806] ? rtnl_setlink+0x2a0/0x2a0 [ 135.714472][ T5806] rtnetlink_rcv_msg+0x745/0x7e0 [ 135.719431][ T5806] ? ___cache_free+0x46/0x300 [ 135.724173][ T5806] ? kmem_cache_free+0x65/0x110 [ 135.729005][ T5806] ? __kfree_skb+0xfe/0x150 [ 135.733517][ T5806] ? consume_skb+0x48/0x160 [ 135.738036][ T5806] ? nlmon_xmit+0x5f/0x70 [ 135.742361][ T5806] ? __this_cpu_preempt_check+0x18/0x20 [ 135.747896][ T5806] ? __local_bh_enable_ip+0x4d/0x70 [ 135.753199][ T5806] ? local_bh_enable+0x1b/0x20 [ 135.757953][ T5806] ? __dev_queue_xmit+0x597/0xf70 [ 135.762959][ T5806] ? __skb_clone+0x2db/0x300 [ 135.767611][ T5806] ? __rcu_read_unlock+0x5c/0x290 [ 135.772691][ T5806] netlink_rcv_skb+0x14e/0x250 [ 135.777539][ T5806] ? rtnetlink_bind+0x60/0x60 [ 135.782257][ T5806] rtnetlink_rcv+0x18/0x20 [ 135.786667][ T5806] netlink_unicast+0x5fc/0x6c0 [ 135.791432][ T5806] netlink_sendmsg+0x6e1/0x7d0 [ 135.796347][ T5806] ? netlink_getsockopt+0x720/0x720 [ 135.801537][ T5806] ____sys_sendmsg+0x39a/0x510 [ 135.806427][ T5806] __sys_sendmsg+0x195/0x230 [ 135.811079][ T5806] __x64_sys_sendmsg+0x42/0x50 [ 135.815894][ T5806] do_syscall_64+0x44/0xd0 [ 135.820292][ T5806] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 135.826164][ T5806] RIP: 0033:0x7ffb90e2cae9 [ 135.830561][ T5806] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 23:48:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x300, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 135.850433][ T5806] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 135.858864][ T5806] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 135.866821][ T5806] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 135.874867][ T5806] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 135.882842][ T5806] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 135.890793][ T5806] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 135.898832][ T5806] 23:48:38 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xc3, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:38 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x6c, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:38 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 67) 23:48:38 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x300, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 135.993352][ T5817] FAULT_INJECTION: forcing a failure. [ 135.993352][ T5817] name failslab, interval 1, probability 0, space 0, times 0 [ 136.006439][ T5817] CPU: 0 PID: 5817 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 136.015122][ T5817] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 136.025164][ T5817] Call Trace: [ 136.028462][ T5817] [ 136.031370][ T5817] dump_stack_lvl+0xd6/0x122 [ 136.035946][ T5817] dump_stack+0x11/0x1b [ 136.040083][ T5817] should_fail+0x23c/0x250 [ 136.044504][ T5817] ? __kernfs_new_node+0x6a/0x340 [ 136.049546][ T5817] __should_failslab+0x81/0x90 [ 136.054329][ T5817] should_failslab+0x5/0x20 [ 136.058895][ T5817] kmem_cache_alloc+0x4f/0x320 [ 136.063647][ T5817] ? __down_write_common+0x42/0x860 [ 136.068835][ T5817] __kernfs_new_node+0x6a/0x340 [ 136.073671][ T5817] ? up_write+0x25/0xc0 [ 136.077817][ T5817] kernfs_new_node+0x5b/0xd0 [ 136.082387][ T5817] __kernfs_create_file+0x45/0x1a0 [ 136.087508][ T5817] ? dev_attr_show+0x90/0x90 [ 136.092175][ T5817] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 136.097573][ T5817] internal_create_group+0x2dd/0x840 [ 136.102838][ T5817] sysfs_create_groups+0x3d/0xf0 [ 136.107772][ T5817] device_add+0x66a/0xf40 [ 136.112108][ T5817] netdev_register_kobject+0xfd/0x230 [ 136.117502][ T5817] register_netdevice+0xba5/0x10b0 [ 136.122679][ T5817] hsr_dev_finalize+0x2da/0x460 [ 136.127511][ T5817] hsr_newlink+0x40d/0x450 [ 136.131912][ T5817] ? hsr_get_node_list+0x450/0x450 [ 136.137061][ T5817] rtnl_newlink+0xdae/0x13b0 [ 136.141653][ T5817] ? __rcu_read_unlock+0x5c/0x290 [ 136.146692][ T5817] ? rtnl_setlink+0x2a0/0x2a0 [ 136.151362][ T5817] rtnetlink_rcv_msg+0x745/0x7e0 [ 136.156364][ T5817] ? ___cache_free+0x46/0x300 [ 136.161027][ T5817] ? kmem_cache_free+0x65/0x110 [ 136.165875][ T5817] ? __kfree_skb+0xfe/0x150 [ 136.170470][ T5817] ? consume_skb+0x48/0x160 [ 136.175057][ T5817] ? nlmon_xmit+0x5f/0x70 [ 136.179410][ T5817] ? __this_cpu_preempt_check+0x18/0x20 [ 136.185011][ T5817] ? __local_bh_enable_ip+0x4d/0x70 [ 136.190230][ T5817] ? local_bh_enable+0x1b/0x20 [ 136.194973][ T5817] ? __dev_queue_xmit+0x597/0xf70 [ 136.199975][ T5817] ? __skb_clone+0x2db/0x300 [ 136.204544][ T5817] ? __rcu_read_unlock+0x5c/0x290 [ 136.209622][ T5817] netlink_rcv_skb+0x14e/0x250 [ 136.214394][ T5817] ? rtnetlink_bind+0x60/0x60 [ 136.219065][ T5817] rtnetlink_rcv+0x18/0x20 [ 136.223550][ T5817] netlink_unicast+0x5fc/0x6c0 [ 136.228368][ T5817] netlink_sendmsg+0x6e1/0x7d0 [ 136.233132][ T5817] ? netlink_getsockopt+0x720/0x720 [ 136.238343][ T5817] ____sys_sendmsg+0x39a/0x510 [ 136.243120][ T5817] __sys_sendmsg+0x195/0x230 [ 136.247846][ T5817] __x64_sys_sendmsg+0x42/0x50 [ 136.252614][ T5817] do_syscall_64+0x44/0xd0 [ 136.257014][ T5817] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 136.262896][ T5817] RIP: 0033:0x7ffb90e2cae9 [ 136.267383][ T5817] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 23:48:38 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 68) [ 136.286997][ T5817] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 136.295540][ T5817] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 136.303497][ T5817] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 136.311525][ T5817] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 136.319474][ T5817] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 136.327425][ T5817] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 136.335393][ T5817] 23:48:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x38d, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:38 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x211, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:38 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x1100, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) [ 136.416705][ T5829] FAULT_INJECTION: forcing a failure. [ 136.416705][ T5829] name failslab, interval 1, probability 0, space 0, times 0 [ 136.429411][ T5829] CPU: 0 PID: 5829 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 136.438218][ T5829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 136.448372][ T5829] Call Trace: [ 136.451685][ T5829] [ 136.454595][ T5829] dump_stack_lvl+0xd6/0x122 [ 136.459168][ T5829] dump_stack+0x11/0x1b [ 136.463305][ T5829] should_fail+0x23c/0x250 [ 136.467703][ T5829] ? __kernfs_new_node+0x6a/0x340 [ 136.472708][ T5829] __should_failslab+0x81/0x90 [ 136.477451][ T5829] should_failslab+0x5/0x20 [ 136.482094][ T5829] kmem_cache_alloc+0x4f/0x320 [ 136.486927][ T5829] ? __down_write_common+0x42/0x860 [ 136.492155][ T5829] __kernfs_new_node+0x6a/0x340 [ 136.497112][ T5829] ? up_write+0x25/0xc0 [ 136.501278][ T5829] kernfs_new_node+0x5b/0xd0 [ 136.505916][ T5829] __kernfs_create_file+0x45/0x1a0 [ 136.511009][ T5829] ? dev_attr_show+0x90/0x90 [ 136.515589][ T5829] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 136.521043][ T5829] internal_create_group+0x2dd/0x840 [ 136.526357][ T5829] sysfs_create_groups+0x3d/0xf0 [ 136.531351][ T5829] device_add+0x66a/0xf40 [ 136.535676][ T5829] netdev_register_kobject+0xfd/0x230 [ 136.541144][ T5829] register_netdevice+0xba5/0x10b0 [ 136.546465][ T5829] hsr_dev_finalize+0x2da/0x460 [ 136.551306][ T5829] hsr_newlink+0x40d/0x450 [ 136.555704][ T5829] ? hsr_get_node_list+0x450/0x450 [ 136.560813][ T5829] rtnl_newlink+0xdae/0x13b0 [ 136.565395][ T5829] ? rtnl_setlink+0x2a0/0x2a0 [ 136.570131][ T5829] rtnetlink_rcv_msg+0x745/0x7e0 [ 136.575083][ T5829] ? ___cache_free+0x46/0x300 [ 136.579744][ T5829] ? kmem_cache_free+0x65/0x110 [ 136.584627][ T5829] ? __kfree_skb+0xfe/0x150 [ 136.589113][ T5829] ? consume_skb+0x48/0x160 [ 136.593596][ T5829] ? nlmon_xmit+0x5f/0x70 [ 136.597906][ T5829] ? __this_cpu_preempt_check+0x18/0x20 [ 136.603474][ T5829] ? __local_bh_enable_ip+0x4d/0x70 [ 136.608773][ T5829] ? local_bh_enable+0x1b/0x20 [ 136.613539][ T5829] ? __dev_queue_xmit+0x597/0xf70 [ 136.618643][ T5829] ? __skb_clone+0x2db/0x300 [ 136.623371][ T5829] ? __rcu_read_unlock+0x5c/0x290 [ 136.628375][ T5829] netlink_rcv_skb+0x14e/0x250 [ 136.633167][ T5829] ? rtnetlink_bind+0x60/0x60 [ 136.637841][ T5829] rtnetlink_rcv+0x18/0x20 [ 136.642273][ T5829] netlink_unicast+0x5fc/0x6c0 [ 136.647067][ T5829] netlink_sendmsg+0x6e1/0x7d0 [ 136.651955][ T5829] ? netlink_getsockopt+0x720/0x720 [ 136.657223][ T5829] ____sys_sendmsg+0x39a/0x510 [ 136.662005][ T5829] __sys_sendmsg+0x195/0x230 [ 136.666598][ T5829] __x64_sys_sendmsg+0x42/0x50 [ 136.671349][ T5829] do_syscall_64+0x44/0xd0 [ 136.675750][ T5829] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 136.681752][ T5829] RIP: 0033:0x7ffb90e2cae9 [ 136.686231][ T5829] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 136.705823][ T5829] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 23:48:39 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 69) [ 136.714215][ T5829] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 136.722168][ T5829] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 136.730137][ T5829] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 136.738092][ T5829] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 136.746105][ T5829] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 136.754056][ T5829] 23:48:39 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x38d, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 136.787658][ T5838] FAULT_INJECTION: forcing a failure. [ 136.787658][ T5838] name failslab, interval 1, probability 0, space 0, times 0 [ 136.800315][ T5838] CPU: 1 PID: 5838 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 136.808990][ T5838] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 136.819045][ T5838] Call Trace: [ 136.822323][ T5838] [ 136.825238][ T5838] dump_stack_lvl+0xd6/0x122 [ 136.829818][ T5838] dump_stack+0x11/0x1b [ 136.833955][ T5838] should_fail+0x23c/0x250 [ 136.838356][ T5838] ? radix_tree_node_alloc+0x142/0x200 [ 136.843898][ T5838] __should_failslab+0x81/0x90 [ 136.848712][ T5838] should_failslab+0x5/0x20 [ 136.853212][ T5838] kmem_cache_alloc+0x4f/0x320 [ 136.857990][ T5838] radix_tree_node_alloc+0x142/0x200 [ 136.863259][ T5838] ? delete_node+0x45c/0x480 [ 136.867849][ T5838] idr_get_free+0x22a/0x5d0 [ 136.872355][ T5838] ? kernfs_xattr_get+0x63/0x70 [ 136.877283][ T5838] idr_alloc_cyclic+0xf4/0x2f0 [ 136.882033][ T5838] __kernfs_new_node+0xb4/0x340 [ 136.886882][ T5838] ? up_write+0x25/0xc0 [ 136.891044][ T5838] kernfs_new_node+0x5b/0xd0 [ 136.895628][ T5838] __kernfs_create_file+0x45/0x1a0 [ 136.900731][ T5838] ? dev_attr_show+0x90/0x90 [ 136.905327][ T5838] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 136.910686][ T5838] internal_create_group+0x2dd/0x840 [ 136.916016][ T5838] sysfs_create_groups+0x3d/0xf0 [ 136.920945][ T5838] device_add+0x66a/0xf40 [ 136.925263][ T5838] netdev_register_kobject+0xfd/0x230 [ 136.930619][ T5838] register_netdevice+0xba5/0x10b0 [ 136.935821][ T5838] hsr_dev_finalize+0x2da/0x460 [ 136.940658][ T5838] hsr_newlink+0x40d/0x450 [ 136.945071][ T5838] ? hsr_get_node_list+0x450/0x450 [ 136.950246][ T5838] rtnl_newlink+0xdae/0x13b0 [ 136.954876][ T5838] ? __rcu_read_unlock+0x5c/0x290 [ 136.959884][ T5838] ? rtnl_setlink+0x2a0/0x2a0 [ 136.964547][ T5838] rtnetlink_rcv_msg+0x745/0x7e0 [ 136.969472][ T5838] ? ___cache_free+0x46/0x300 [ 136.974134][ T5838] ? kmem_cache_free+0x65/0x110 [ 136.979108][ T5838] ? __kfree_skb+0xfe/0x150 [ 136.983644][ T5838] ? consume_skb+0x48/0x160 [ 136.988145][ T5838] ? nlmon_xmit+0x5f/0x70 [ 136.992473][ T5838] ? __this_cpu_preempt_check+0x18/0x20 [ 136.998011][ T5838] ? __local_bh_enable_ip+0x4d/0x70 [ 137.003259][ T5838] ? local_bh_enable+0x1b/0x20 [ 137.008017][ T5838] ? __dev_queue_xmit+0x597/0xf70 [ 137.013027][ T5838] ? __skb_clone+0x2db/0x300 [ 137.017616][ T5838] ? __rcu_read_unlock+0x5c/0x290 [ 137.022647][ T5838] netlink_rcv_skb+0x14e/0x250 [ 137.027411][ T5838] ? rtnetlink_bind+0x60/0x60 [ 137.032187][ T5838] rtnetlink_rcv+0x18/0x20 [ 137.036590][ T5838] netlink_unicast+0x5fc/0x6c0 [ 137.041341][ T5838] netlink_sendmsg+0x6e1/0x7d0 [ 137.046171][ T5838] ? netlink_getsockopt+0x720/0x720 [ 137.051355][ T5838] ____sys_sendmsg+0x39a/0x510 [ 137.056131][ T5838] __sys_sendmsg+0x195/0x230 [ 137.060737][ T5838] __x64_sys_sendmsg+0x42/0x50 [ 137.065570][ T5838] do_syscall_64+0x44/0xd0 [ 137.070028][ T5838] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 137.076076][ T5838] RIP: 0033:0x7ffb90e2cae9 [ 137.080475][ T5838] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 137.100063][ T5838] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 137.108460][ T5838] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 137.116497][ T5838] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 137.124466][ T5838] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 23:48:39 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x74, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) [ 137.132520][ T5838] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 137.140476][ T5838] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 137.148525][ T5838] 23:48:39 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x233, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:39 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 70) 23:48:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x398, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 137.217010][ T5838] syz-executor.4 (5838) used greatest stack depth: 9384 bytes left [ 137.253678][ T5853] FAULT_INJECTION: forcing a failure. [ 137.253678][ T5853] name failslab, interval 1, probability 0, space 0, times 0 23:48:39 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x500, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:39 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x1102, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) [ 137.266323][ T5853] CPU: 1 PID: 5853 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 137.274999][ T5853] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 137.285051][ T5853] Call Trace: [ 137.288397][ T5853] [ 137.291386][ T5853] dump_stack_lvl+0xd6/0x122 [ 137.296012][ T5853] dump_stack+0x11/0x1b [ 137.300175][ T5853] should_fail+0x23c/0x250 [ 137.304699][ T5853] ? __kernfs_new_node+0x6a/0x340 [ 137.309781][ T5853] __should_failslab+0x81/0x90 [ 137.314527][ T5853] should_failslab+0x5/0x20 [ 137.319271][ T5853] kmem_cache_alloc+0x4f/0x320 [ 137.324056][ T5853] ? __down_write_common+0x42/0x860 [ 137.329259][ T5853] __kernfs_new_node+0x6a/0x340 [ 137.334146][ T5853] ? up_write+0x25/0xc0 [ 137.338366][ T5853] kernfs_new_node+0x5b/0xd0 [ 137.342959][ T5853] __kernfs_create_file+0x45/0x1a0 [ 137.348174][ T5853] ? dev_attr_show+0x90/0x90 [ 137.352748][ T5853] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 137.358103][ T5853] internal_create_group+0x2dd/0x840 [ 137.363443][ T5853] sysfs_create_groups+0x3d/0xf0 [ 137.368375][ T5853] device_add+0x66a/0xf40 [ 137.372697][ T5853] netdev_register_kobject+0xfd/0x230 [ 137.378073][ T5853] register_netdevice+0xba5/0x10b0 [ 137.383247][ T5853] hsr_dev_finalize+0x2da/0x460 [ 137.388083][ T5853] hsr_newlink+0x40d/0x450 [ 137.392575][ T5853] ? hsr_get_node_list+0x450/0x450 [ 137.397734][ T5853] rtnl_newlink+0xdae/0x13b0 [ 137.402327][ T5853] ? rtnl_setlink+0x2a0/0x2a0 [ 137.407041][ T5853] rtnetlink_rcv_msg+0x745/0x7e0 [ 137.412120][ T5853] ? ___cache_free+0x46/0x300 [ 137.416827][ T5853] ? kmem_cache_free+0x65/0x110 [ 137.421670][ T5853] ? __kfree_skb+0xfe/0x150 [ 137.426166][ T5853] ? consume_skb+0x48/0x160 [ 137.430649][ T5853] ? nlmon_xmit+0x5f/0x70 [ 137.434975][ T5853] ? __this_cpu_preempt_check+0x18/0x20 [ 137.440502][ T5853] ? __local_bh_enable_ip+0x4d/0x70 [ 137.445712][ T5853] ? local_bh_enable+0x1b/0x20 [ 137.450516][ T5853] ? __dev_queue_xmit+0x597/0xf70 [ 137.455536][ T5853] ? __skb_clone+0x2db/0x300 [ 137.460155][ T5853] ? __rcu_read_unlock+0x5c/0x290 [ 137.465164][ T5853] netlink_rcv_skb+0x14e/0x250 [ 137.469908][ T5853] ? rtnetlink_bind+0x60/0x60 [ 137.474572][ T5853] rtnetlink_rcv+0x18/0x20 [ 137.478998][ T5853] netlink_unicast+0x5fc/0x6c0 [ 137.483745][ T5853] netlink_sendmsg+0x6e1/0x7d0 [ 137.488556][ T5853] ? netlink_getsockopt+0x720/0x720 [ 137.493772][ T5853] ____sys_sendmsg+0x39a/0x510 [ 137.498544][ T5853] __sys_sendmsg+0x195/0x230 [ 137.503140][ T5853] __x64_sys_sendmsg+0x42/0x50 [ 137.507915][ T5853] do_syscall_64+0x44/0xd0 [ 137.512316][ T5853] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 137.518202][ T5853] RIP: 0033:0x7ffb90e2cae9 [ 137.522593][ T5853] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 137.542180][ T5853] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 137.550661][ T5853] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 137.558619][ T5853] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 137.566602][ T5853] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 137.574645][ T5853] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 137.582614][ T5853] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 137.590649][ T5853] 23:48:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 71) 23:48:40 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x23f, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 137.659413][ T5863] FAULT_INJECTION: forcing a failure. [ 137.659413][ T5863] name failslab, interval 1, probability 0, space 0, times 0 [ 137.672058][ T5863] CPU: 0 PID: 5863 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 137.680814][ T5863] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 137.690845][ T5863] Call Trace: [ 137.694129][ T5863] [ 137.697118][ T5863] dump_stack_lvl+0xd6/0x122 [ 137.701868][ T5863] dump_stack+0x11/0x1b [ 137.706016][ T5863] should_fail+0x23c/0x250 [ 137.710416][ T5863] ? __kernfs_new_node+0x6a/0x340 [ 137.715421][ T5863] __should_failslab+0x81/0x90 [ 137.720171][ T5863] should_failslab+0x5/0x20 [ 137.724725][ T5863] kmem_cache_alloc+0x4f/0x320 [ 137.729487][ T5863] ? __down_write_common+0x42/0x860 [ 137.734673][ T5863] __kernfs_new_node+0x6a/0x340 [ 137.739554][ T5863] ? up_write+0x25/0xc0 [ 137.743684][ T5863] kernfs_new_node+0x5b/0xd0 [ 137.748252][ T5863] __kernfs_create_file+0x45/0x1a0 [ 137.753374][ T5863] ? dev_attr_show+0x90/0x90 [ 137.758026][ T5863] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 137.763393][ T5863] internal_create_group+0x2dd/0x840 [ 137.768680][ T5863] sysfs_create_groups+0x3d/0xf0 [ 137.773603][ T5863] device_add+0x66a/0xf40 [ 137.777928][ T5863] netdev_register_kobject+0xfd/0x230 [ 137.783381][ T5863] register_netdevice+0xba5/0x10b0 [ 137.788483][ T5863] hsr_dev_finalize+0x2da/0x460 [ 137.793374][ T5863] hsr_newlink+0x40d/0x450 [ 137.797769][ T5863] ? hsr_get_node_list+0x450/0x450 [ 137.802987][ T5863] rtnl_newlink+0xdae/0x13b0 [ 137.807806][ T5863] ? __rcu_read_unlock+0x5c/0x290 [ 137.812812][ T5863] ? rtnl_setlink+0x2a0/0x2a0 [ 137.817482][ T5863] rtnetlink_rcv_msg+0x745/0x7e0 [ 137.822613][ T5863] ? ___cache_free+0x46/0x300 [ 137.827311][ T5863] ? kmem_cache_free+0x65/0x110 [ 137.832167][ T5863] ? __kfree_skb+0xfe/0x150 [ 137.836685][ T5863] ? consume_skb+0x48/0x160 [ 137.841196][ T5863] ? nlmon_xmit+0x5f/0x70 [ 137.845603][ T5863] ? __this_cpu_preempt_check+0x18/0x20 [ 137.851128][ T5863] ? __local_bh_enable_ip+0x4d/0x70 [ 137.856342][ T5863] ? local_bh_enable+0x1b/0x20 [ 137.861103][ T5863] ? __dev_queue_xmit+0x597/0xf70 [ 137.866109][ T5863] ? __skb_clone+0x2db/0x300 [ 137.870772][ T5863] ? __rcu_read_unlock+0x5c/0x290 [ 137.875870][ T5863] netlink_rcv_skb+0x14e/0x250 [ 137.880670][ T5863] ? rtnetlink_bind+0x60/0x60 [ 137.885330][ T5863] rtnetlink_rcv+0x18/0x20 [ 137.889730][ T5863] netlink_unicast+0x5fc/0x6c0 [ 137.894476][ T5863] netlink_sendmsg+0x6e1/0x7d0 [ 137.899371][ T5863] ? netlink_getsockopt+0x720/0x720 [ 137.904614][ T5863] ____sys_sendmsg+0x39a/0x510 [ 137.909448][ T5863] __sys_sendmsg+0x195/0x230 [ 137.914201][ T5863] __x64_sys_sendmsg+0x42/0x50 [ 137.918989][ T5863] do_syscall_64+0x44/0xd0 [ 137.923395][ T5863] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 137.929333][ T5863] RIP: 0033:0x7ffb90e2cae9 [ 137.933759][ T5863] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 23:48:40 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x3aa, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 72) [ 137.953734][ T5863] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 137.962142][ T5863] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 137.970152][ T5863] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 137.978167][ T5863] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 137.986121][ T5863] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 137.994085][ T5863] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 138.002043][ T5863] [ 138.045261][ T5870] FAULT_INJECTION: forcing a failure. [ 138.045261][ T5870] name failslab, interval 1, probability 0, space 0, times 0 [ 138.057893][ T5870] CPU: 0 PID: 5870 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 138.066596][ T5870] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 138.076649][ T5870] Call Trace: [ 138.080012][ T5870] [ 138.082937][ T5870] dump_stack_lvl+0xd6/0x122 [ 138.087528][ T5870] dump_stack+0x11/0x1b [ 138.091686][ T5870] should_fail+0x23c/0x250 [ 138.096087][ T5870] ? __kernfs_new_node+0x6a/0x340 [ 138.101107][ T5870] __should_failslab+0x81/0x90 [ 138.105853][ T5870] should_failslab+0x5/0x20 [ 138.110413][ T5870] kmem_cache_alloc+0x4f/0x320 [ 138.115168][ T5870] ? __down_write_common+0x42/0x860 [ 138.120376][ T5870] __kernfs_new_node+0x6a/0x340 [ 138.125261][ T5870] ? up_write+0x25/0xc0 [ 138.129512][ T5870] kernfs_new_node+0x5b/0xd0 [ 138.134084][ T5870] __kernfs_create_file+0x45/0x1a0 [ 138.139243][ T5870] ? dev_attr_show+0x90/0x90 [ 138.143840][ T5870] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 138.149259][ T5870] internal_create_group+0x2dd/0x840 [ 138.154533][ T5870] sysfs_create_groups+0x3d/0xf0 [ 138.159587][ T5870] device_add+0x66a/0xf40 [ 138.164014][ T5870] netdev_register_kobject+0xfd/0x230 [ 138.169375][ T5870] register_netdevice+0xba5/0x10b0 [ 138.174534][ T5870] hsr_dev_finalize+0x2da/0x460 [ 138.179429][ T5870] hsr_newlink+0x40d/0x450 [ 138.183835][ T5870] ? hsr_get_node_list+0x450/0x450 [ 138.188930][ T5870] rtnl_newlink+0xdae/0x13b0 [ 138.193613][ T5870] ? __rcu_read_unlock+0x5c/0x290 [ 138.198614][ T5870] ? rtnl_setlink+0x2a0/0x2a0 [ 138.203269][ T5870] rtnetlink_rcv_msg+0x745/0x7e0 [ 138.208259][ T5870] ? ___cache_free+0x46/0x300 [ 138.212986][ T5870] ? kmem_cache_free+0x65/0x110 [ 138.217889][ T5870] ? __kfree_skb+0xfe/0x150 [ 138.222384][ T5870] ? consume_skb+0x48/0x160 [ 138.226928][ T5870] ? nlmon_xmit+0x5f/0x70 [ 138.231295][ T5870] ? __this_cpu_preempt_check+0x18/0x20 [ 138.236869][ T5870] ? __local_bh_enable_ip+0x4d/0x70 [ 138.242052][ T5870] ? local_bh_enable+0x1b/0x20 [ 138.246793][ T5870] ? __dev_queue_xmit+0x597/0xf70 [ 138.251878][ T5870] ? __skb_clone+0x2db/0x300 [ 138.256488][ T5870] ? __rcu_read_unlock+0x5c/0x290 [ 138.261504][ T5870] netlink_rcv_skb+0x14e/0x250 [ 138.266257][ T5870] ? rtnetlink_bind+0x60/0x60 [ 138.270925][ T5870] rtnetlink_rcv+0x18/0x20 [ 138.275322][ T5870] netlink_unicast+0x5fc/0x6c0 [ 138.280067][ T5870] netlink_sendmsg+0x6e1/0x7d0 [ 138.284879][ T5870] ? netlink_getsockopt+0x720/0x720 [ 138.290086][ T5870] ____sys_sendmsg+0x39a/0x510 [ 138.294987][ T5870] __sys_sendmsg+0x195/0x230 [ 138.299575][ T5870] __x64_sys_sendmsg+0x42/0x50 [ 138.304329][ T5870] do_syscall_64+0x44/0xd0 [ 138.308725][ T5870] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 138.314598][ T5870] RIP: 0033:0x7ffb90e2cae9 [ 138.318991][ T5870] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 23:48:40 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x7a, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:40 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x1200, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:40 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x591, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 138.338646][ T5870] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 138.347041][ T5870] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 138.355028][ T5870] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 138.363011][ T5870] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 138.371008][ T5870] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 138.379005][ T5870] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 138.386984][ T5870] 23:48:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 73) 23:48:40 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x300, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 138.450305][ T5879] FAULT_INJECTION: forcing a failure. [ 138.450305][ T5879] name failslab, interval 1, probability 0, space 0, times 0 [ 138.463003][ T5879] CPU: 1 PID: 5879 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 138.471672][ T5879] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 138.481712][ T5879] Call Trace: [ 138.485012][ T5879] [ 138.487923][ T5879] dump_stack_lvl+0xd6/0x122 [ 138.492558][ T5879] dump_stack+0x11/0x1b [ 138.496710][ T5879] should_fail+0x23c/0x250 [ 138.501106][ T5879] ? __kernfs_new_node+0x6a/0x340 [ 138.506127][ T5879] __should_failslab+0x81/0x90 [ 138.510906][ T5879] should_failslab+0x5/0x20 [ 138.515418][ T5879] kmem_cache_alloc+0x4f/0x320 [ 138.520174][ T5879] ? __down_write_common+0x42/0x860 [ 138.525352][ T5879] __kernfs_new_node+0x6a/0x340 [ 138.530203][ T5879] ? up_write+0x25/0xc0 [ 138.534396][ T5879] kernfs_new_node+0x5b/0xd0 [ 138.538977][ T5879] __kernfs_create_file+0x45/0x1a0 [ 138.544150][ T5879] ? dev_attr_show+0x90/0x90 [ 138.548741][ T5879] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 138.554172][ T5879] internal_create_group+0x2dd/0x840 [ 138.559458][ T5879] sysfs_create_groups+0x3d/0xf0 [ 138.564395][ T5879] device_add+0x66a/0xf40 [ 138.568726][ T5879] netdev_register_kobject+0xfd/0x230 [ 138.574087][ T5879] register_netdevice+0xba5/0x10b0 [ 138.579257][ T5879] hsr_dev_finalize+0x2da/0x460 [ 138.584096][ T5879] hsr_newlink+0x40d/0x450 [ 138.588515][ T5879] ? hsr_get_node_list+0x450/0x450 [ 138.593612][ T5879] rtnl_newlink+0xdae/0x13b0 [ 138.598194][ T5879] ? rtnl_setlink+0x2a0/0x2a0 [ 138.602922][ T5879] rtnetlink_rcv_msg+0x745/0x7e0 [ 138.607867][ T5879] ? ___cache_free+0x46/0x300 [ 138.612537][ T5879] ? kmem_cache_free+0x65/0x110 [ 138.617441][ T5879] ? __kfree_skb+0xfe/0x150 [ 138.622018][ T5879] ? consume_skb+0x48/0x160 [ 138.626514][ T5879] ? nlmon_xmit+0x5f/0x70 [ 138.630861][ T5879] ? __this_cpu_preempt_check+0x18/0x20 [ 138.636471][ T5879] ? __local_bh_enable_ip+0x4d/0x70 [ 138.641676][ T5879] ? local_bh_enable+0x1b/0x20 [ 138.646480][ T5879] ? __dev_queue_xmit+0x597/0xf70 [ 138.651494][ T5879] ? __skb_clone+0x2db/0x300 [ 138.656082][ T5879] ? __rcu_read_unlock+0x5c/0x290 [ 138.661148][ T5879] netlink_rcv_skb+0x14e/0x250 [ 138.665909][ T5879] ? rtnetlink_bind+0x60/0x60 [ 138.670575][ T5879] rtnetlink_rcv+0x18/0x20 [ 138.674997][ T5879] netlink_unicast+0x5fc/0x6c0 [ 138.679818][ T5879] netlink_sendmsg+0x6e1/0x7d0 [ 138.684559][ T5879] ? netlink_getsockopt+0x720/0x720 [ 138.689773][ T5879] ____sys_sendmsg+0x39a/0x510 [ 138.694577][ T5879] __sys_sendmsg+0x195/0x230 [ 138.699172][ T5879] __x64_sys_sendmsg+0x42/0x50 [ 138.703972][ T5879] do_syscall_64+0x44/0xd0 [ 138.708392][ T5879] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 138.714263][ T5879] RIP: 0033:0x7ffb90e2cae9 [ 138.718658][ T5879] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 138.738258][ T5879] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 23:48:41 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x500, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:41 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 74) [ 138.746658][ T5879] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 138.754606][ T5879] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 138.762558][ T5879] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 138.770530][ T5879] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 138.778494][ T5879] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 138.786576][ T5879] 23:48:41 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x59f, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:41 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x1500, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:41 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x95, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:41 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x38d, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 138.888626][ T5893] FAULT_INJECTION: forcing a failure. [ 138.888626][ T5893] name failslab, interval 1, probability 0, space 0, times 0 [ 138.901409][ T5893] CPU: 0 PID: 5893 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 138.910126][ T5893] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 138.920247][ T5893] Call Trace: [ 138.923522][ T5893] [ 138.926447][ T5893] dump_stack_lvl+0xd6/0x122 [ 138.931038][ T5893] dump_stack+0x11/0x1b [ 138.935295][ T5893] should_fail+0x23c/0x250 [ 138.939694][ T5893] ? __kernfs_new_node+0x6a/0x340 [ 138.944767][ T5893] __should_failslab+0x81/0x90 [ 138.949512][ T5893] should_failslab+0x5/0x20 [ 138.954075][ T5893] kmem_cache_alloc+0x4f/0x320 [ 138.958828][ T5893] ? __down_write_common+0x42/0x860 [ 138.964011][ T5893] __kernfs_new_node+0x6a/0x340 [ 138.968947][ T5893] ? up_write+0x25/0xc0 [ 138.973090][ T5893] kernfs_new_node+0x5b/0xd0 [ 138.977772][ T5893] __kernfs_create_file+0x45/0x1a0 [ 138.982867][ T5893] ? dev_attr_show+0x90/0x90 [ 138.987508][ T5893] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 138.992948][ T5893] internal_create_group+0x2dd/0x840 [ 138.998215][ T5893] sysfs_create_groups+0x3d/0xf0 [ 139.003150][ T5893] device_add+0x66a/0xf40 [ 139.007628][ T5893] netdev_register_kobject+0xfd/0x230 [ 139.013020][ T5893] register_netdevice+0xba5/0x10b0 [ 139.018120][ T5893] hsr_dev_finalize+0x2da/0x460 [ 139.022980][ T5893] hsr_newlink+0x40d/0x450 [ 139.027446][ T5893] ? hsr_get_node_list+0x450/0x450 [ 139.032556][ T5893] rtnl_newlink+0xdae/0x13b0 [ 139.037219][ T5893] ? __rcu_read_unlock+0x5c/0x290 [ 139.042231][ T5893] ? rtnl_setlink+0x2a0/0x2a0 [ 139.046949][ T5893] rtnetlink_rcv_msg+0x745/0x7e0 [ 139.051937][ T5893] ? ___cache_free+0x46/0x300 [ 139.056601][ T5893] ? kmem_cache_free+0x65/0x110 [ 139.061495][ T5893] ? __kfree_skb+0xfe/0x150 [ 139.065997][ T5893] ? consume_skb+0x48/0x160 [ 139.070572][ T5893] ? nlmon_xmit+0x5f/0x70 [ 139.074922][ T5893] ? __this_cpu_preempt_check+0x18/0x20 [ 139.080504][ T5893] ? __local_bh_enable_ip+0x4d/0x70 [ 139.085775][ T5893] ? local_bh_enable+0x1b/0x20 [ 139.090517][ T5893] ? __dev_queue_xmit+0x597/0xf70 [ 139.095580][ T5893] ? __skb_clone+0x2db/0x300 [ 139.100217][ T5893] ? __rcu_read_unlock+0x5c/0x290 [ 139.105287][ T5893] netlink_rcv_skb+0x14e/0x250 [ 139.110093][ T5893] ? rtnetlink_bind+0x60/0x60 [ 139.114753][ T5893] rtnetlink_rcv+0x18/0x20 [ 139.119153][ T5893] netlink_unicast+0x5fc/0x6c0 [ 139.123920][ T5893] netlink_sendmsg+0x6e1/0x7d0 [ 139.128685][ T5893] ? netlink_getsockopt+0x720/0x720 [ 139.133933][ T5893] ____sys_sendmsg+0x39a/0x510 [ 139.138707][ T5893] __sys_sendmsg+0x195/0x230 [ 139.143592][ T5893] __x64_sys_sendmsg+0x42/0x50 [ 139.148341][ T5893] do_syscall_64+0x44/0xd0 [ 139.152828][ T5893] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 139.158780][ T5893] RIP: 0033:0x7ffb90e2cae9 [ 139.163249][ T5893] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 23:48:41 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 75) [ 139.182849][ T5893] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 139.191252][ T5893] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 139.199216][ T5893] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 139.207703][ T5893] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 139.215662][ T5893] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 139.223615][ T5893] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 139.231583][ T5893] 23:48:41 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x591, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:41 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) [ 139.272786][ T5904] FAULT_INJECTION: forcing a failure. [ 139.272786][ T5904] name failslab, interval 1, probability 0, space 0, times 0 [ 139.285445][ T5904] CPU: 0 PID: 5904 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 139.294123][ T5904] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 139.304209][ T5904] Call Trace: [ 139.307570][ T5904] [ 139.310520][ T5904] dump_stack_lvl+0xd6/0x122 [ 139.315184][ T5904] dump_stack+0x11/0x1b [ 139.319339][ T5904] should_fail+0x23c/0x250 [ 139.323827][ T5904] ? __kernfs_new_node+0x6a/0x340 [ 139.328885][ T5904] __should_failslab+0x81/0x90 [ 139.333634][ T5904] should_failslab+0x5/0x20 [ 139.338231][ T5904] kmem_cache_alloc+0x4f/0x320 [ 139.343040][ T5904] ? __down_write_common+0x42/0x860 [ 139.348229][ T5904] __kernfs_new_node+0x6a/0x340 [ 139.353110][ T5904] ? up_write+0x25/0xc0 [ 139.357379][ T5904] kernfs_new_node+0x5b/0xd0 [ 139.361959][ T5904] __kernfs_create_file+0x45/0x1a0 [ 139.367072][ T5904] ? dev_attr_show+0x90/0x90 [ 139.371686][ T5904] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 139.377111][ T5904] internal_create_group+0x2dd/0x840 [ 139.382377][ T5904] sysfs_create_groups+0x3d/0xf0 [ 139.387296][ T5904] device_add+0x66a/0xf40 [ 139.391617][ T5904] netdev_register_kobject+0xfd/0x230 [ 139.396967][ T5904] register_netdevice+0xba5/0x10b0 [ 139.402172][ T5904] hsr_dev_finalize+0x2da/0x460 [ 139.407175][ T5904] hsr_newlink+0x40d/0x450 [ 139.411584][ T5904] ? hsr_get_node_list+0x450/0x450 [ 139.416705][ T5904] rtnl_newlink+0xdae/0x13b0 [ 139.421356][ T5904] ? rtnl_setlink+0x2a0/0x2a0 [ 139.426041][ T5904] rtnetlink_rcv_msg+0x745/0x7e0 [ 139.431078][ T5904] ? ___cache_free+0x46/0x300 [ 139.435740][ T5904] ? kmem_cache_free+0x65/0x110 [ 139.440581][ T5904] ? __kfree_skb+0xfe/0x150 [ 139.445111][ T5904] ? consume_skb+0x48/0x160 [ 139.449598][ T5904] ? nlmon_xmit+0x5f/0x70 [ 139.453975][ T5904] ? __this_cpu_preempt_check+0x18/0x20 [ 139.459535][ T5904] ? __local_bh_enable_ip+0x4d/0x70 [ 139.464777][ T5904] ? local_bh_enable+0x1b/0x20 [ 139.469531][ T5904] ? __dev_queue_xmit+0x597/0xf70 [ 139.474620][ T5904] ? __skb_clone+0x2db/0x300 [ 139.479235][ T5904] ? __rcu_read_unlock+0x5c/0x290 [ 139.484243][ T5904] netlink_rcv_skb+0x14e/0x250 [ 139.489069][ T5904] ? rtnetlink_bind+0x60/0x60 [ 139.493791][ T5904] rtnetlink_rcv+0x18/0x20 [ 139.498297][ T5904] netlink_unicast+0x5fc/0x6c0 [ 139.503050][ T5904] netlink_sendmsg+0x6e1/0x7d0 [ 139.507937][ T5904] ? netlink_getsockopt+0x720/0x720 [ 139.513158][ T5904] ____sys_sendmsg+0x39a/0x510 [ 139.517943][ T5904] __sys_sendmsg+0x195/0x230 [ 139.522541][ T5904] __x64_sys_sendmsg+0x42/0x50 [ 139.527309][ T5904] do_syscall_64+0x44/0xd0 [ 139.531726][ T5904] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 139.537732][ T5904] RIP: 0033:0x7ffb90e2cae9 [ 139.542127][ T5904] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 139.561820][ T5904] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 23:48:42 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 76) [ 139.570320][ T5904] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 139.578278][ T5904] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 139.586235][ T5904] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 139.594199][ T5904] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 139.602149][ T5904] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 139.610151][ T5904] 23:48:42 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0xa0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:42 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x500, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 139.677330][ T5913] FAULT_INJECTION: forcing a failure. [ 139.677330][ T5913] name failslab, interval 1, probability 0, space 0, times 0 [ 139.690025][ T5913] CPU: 1 PID: 5913 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 139.698786][ T5913] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 139.708843][ T5913] Call Trace: [ 139.712119][ T5913] [ 139.715145][ T5913] dump_stack_lvl+0xd6/0x122 [ 139.719751][ T5913] dump_stack+0x11/0x1b 23:48:42 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x5c4, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x59f, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 139.724011][ T5913] should_fail+0x23c/0x250 [ 139.728516][ T5913] ? __kernfs_new_node+0x6a/0x340 [ 139.733901][ T5913] __should_failslab+0x81/0x90 [ 139.738779][ T5913] should_failslab+0x5/0x20 [ 139.743309][ T5913] kmem_cache_alloc+0x4f/0x320 [ 139.748155][ T5913] ? __down_write_common+0x42/0x860 [ 139.753358][ T5913] __kernfs_new_node+0x6a/0x340 [ 139.758336][ T5913] ? up_write+0x25/0xc0 [ 139.762537][ T5913] kernfs_new_node+0x5b/0xd0 [ 139.767121][ T5913] __kernfs_create_file+0x45/0x1a0 [ 139.772490][ T5913] ? dev_attr_show+0x90/0x90 [ 139.777097][ T5913] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 139.782500][ T5913] internal_create_group+0x2dd/0x840 [ 139.787964][ T5913] sysfs_create_groups+0x3d/0xf0 [ 139.792883][ T5913] device_add+0x66a/0xf40 [ 139.797235][ T5913] netdev_register_kobject+0xfd/0x230 [ 139.802599][ T5913] register_netdevice+0xba5/0x10b0 [ 139.807736][ T5913] hsr_dev_finalize+0x2da/0x460 [ 139.812583][ T5913] hsr_newlink+0x40d/0x450 [ 139.817259][ T5913] ? hsr_get_node_list+0x450/0x450 [ 139.822352][ T5913] rtnl_newlink+0xdae/0x13b0 [ 139.826938][ T5913] ? __rcu_read_unlock+0x5c/0x290 [ 139.832090][ T5913] ? rtnl_setlink+0x2a0/0x2a0 [ 139.836832][ T5913] rtnetlink_rcv_msg+0x745/0x7e0 [ 139.841755][ T5913] ? ___cache_free+0x46/0x300 [ 139.846468][ T5913] ? kmem_cache_free+0x65/0x110 [ 139.851309][ T5913] ? __kfree_skb+0xfe/0x150 [ 139.855819][ T5913] ? consume_skb+0x48/0x160 [ 139.860389][ T5913] ? nlmon_xmit+0x5f/0x70 [ 139.864720][ T5913] ? __this_cpu_preempt_check+0x18/0x20 [ 139.870279][ T5913] ? __local_bh_enable_ip+0x4d/0x70 [ 139.875530][ T5913] ? local_bh_enable+0x1b/0x20 [ 139.880273][ T5913] ? __dev_queue_xmit+0x597/0xf70 [ 139.885276][ T5913] ? __skb_clone+0x2db/0x300 [ 139.889869][ T5913] ? __rcu_read_unlock+0x5c/0x290 [ 139.894995][ T5913] netlink_rcv_skb+0x14e/0x250 [ 139.899754][ T5913] ? rtnetlink_bind+0x60/0x60 [ 139.904415][ T5913] rtnetlink_rcv+0x18/0x20 [ 139.909070][ T5913] netlink_unicast+0x5fc/0x6c0 [ 139.913853][ T5913] netlink_sendmsg+0x6e1/0x7d0 [ 139.918606][ T5913] ? netlink_getsockopt+0x720/0x720 [ 139.923848][ T5913] ____sys_sendmsg+0x39a/0x510 [ 139.928598][ T5913] __sys_sendmsg+0x195/0x230 [ 139.933180][ T5913] __x64_sys_sendmsg+0x42/0x50 [ 139.938001][ T5913] do_syscall_64+0x44/0xd0 [ 139.942483][ T5913] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 139.948570][ T5913] RIP: 0033:0x7ffb90e2cae9 [ 139.953035][ T5913] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 23:48:42 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 77) [ 139.972664][ T5913] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 139.981133][ T5913] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 139.989093][ T5913] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 139.997181][ T5913] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 140.005149][ T5913] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 140.013099][ T5913] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 140.021192][ T5913] [ 140.064749][ T5924] FAULT_INJECTION: forcing a failure. [ 140.064749][ T5924] name failslab, interval 1, probability 0, space 0, times 0 [ 140.077665][ T5924] CPU: 0 PID: 5924 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 140.086321][ T5924] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 140.096361][ T5924] Call Trace: [ 140.099639][ T5924] [ 140.102697][ T5924] dump_stack_lvl+0xd6/0x122 [ 140.107290][ T5924] dump_stack+0x11/0x1b [ 140.111442][ T5924] should_fail+0x23c/0x250 [ 140.115893][ T5924] ? __kernfs_new_node+0x6a/0x340 [ 140.120996][ T5924] __should_failslab+0x81/0x90 [ 140.125804][ T5924] should_failslab+0x5/0x20 [ 140.130314][ T5924] kmem_cache_alloc+0x4f/0x320 [ 140.135060][ T5924] ? __down_write_common+0x42/0x860 [ 140.140344][ T5924] __kernfs_new_node+0x6a/0x340 [ 140.145209][ T5924] ? up_write+0x25/0xc0 [ 140.149390][ T5924] kernfs_new_node+0x5b/0xd0 [ 140.153962][ T5924] __kernfs_create_file+0x45/0x1a0 [ 140.159197][ T5924] ? dev_attr_show+0x90/0x90 [ 140.163784][ T5924] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 140.169187][ T5924] internal_create_group+0x2dd/0x840 [ 140.174455][ T5924] sysfs_create_groups+0x3d/0xf0 [ 140.179443][ T5924] device_add+0x66a/0xf40 [ 140.183777][ T5924] netdev_register_kobject+0xfd/0x230 [ 140.189144][ T5924] register_netdevice+0xba5/0x10b0 [ 140.194263][ T5924] hsr_dev_finalize+0x2da/0x460 [ 140.199108][ T5924] hsr_newlink+0x40d/0x450 [ 140.203627][ T5924] ? hsr_get_node_list+0x450/0x450 [ 140.208722][ T5924] rtnl_newlink+0xdae/0x13b0 [ 140.213330][ T5924] ? __rcu_read_unlock+0x5c/0x290 [ 140.218354][ T5924] ? rtnl_setlink+0x2a0/0x2a0 [ 140.223021][ T5924] rtnetlink_rcv_msg+0x745/0x7e0 [ 140.227981][ T5924] ? ___cache_free+0x46/0x300 [ 140.232643][ T5924] ? kmem_cache_free+0x65/0x110 [ 140.237476][ T5924] ? __kfree_skb+0xfe/0x150 [ 140.241994][ T5924] ? consume_skb+0x48/0x160 [ 140.246489][ T5924] ? nlmon_xmit+0x5f/0x70 [ 140.250825][ T5924] ? __this_cpu_preempt_check+0x18/0x20 [ 140.256441][ T5924] ? __local_bh_enable_ip+0x4d/0x70 [ 140.261688][ T5924] ? local_bh_enable+0x1b/0x20 [ 140.266501][ T5924] ? __dev_queue_xmit+0x597/0xf70 [ 140.271547][ T5924] ? __skb_clone+0x2db/0x300 [ 140.276200][ T5924] ? __rcu_read_unlock+0x5c/0x290 [ 140.281222][ T5924] netlink_rcv_skb+0x14e/0x250 [ 140.286007][ T5924] ? rtnetlink_bind+0x60/0x60 [ 140.290682][ T5924] rtnetlink_rcv+0x18/0x20 [ 140.295139][ T5924] netlink_unicast+0x5fc/0x6c0 [ 140.299927][ T5924] netlink_sendmsg+0x6e1/0x7d0 [ 140.304768][ T5924] ? netlink_getsockopt+0x720/0x720 [ 140.310048][ T5924] ____sys_sendmsg+0x39a/0x510 [ 140.314818][ T5924] __sys_sendmsg+0x195/0x230 [ 140.319404][ T5924] __x64_sys_sendmsg+0x42/0x50 [ 140.324179][ T5924] do_syscall_64+0x44/0xd0 [ 140.328654][ T5924] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 140.334551][ T5924] RIP: 0033:0x7ffb90e2cae9 [ 140.338959][ T5924] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 23:48:42 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x591, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:42 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2500, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) [ 140.358632][ T5924] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 140.367061][ T5924] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 140.375143][ T5924] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 140.383094][ T5924] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 140.391059][ T5924] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 140.399009][ T5924] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 140.406964][ T5924] 23:48:43 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x5c5, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x5c4, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:43 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 78) 23:48:43 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0xc3, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) [ 140.507901][ T5937] FAULT_INJECTION: forcing a failure. [ 140.507901][ T5937] name failslab, interval 1, probability 0, space 0, times 0 [ 140.520579][ T5937] CPU: 0 PID: 5937 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 140.529270][ T5937] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 140.539323][ T5937] Call Trace: [ 140.542689][ T5937] [ 140.545614][ T5937] dump_stack_lvl+0xd6/0x122 [ 140.550186][ T5937] dump_stack+0x11/0x1b [ 140.554324][ T5937] should_fail+0x23c/0x250 [ 140.558744][ T5937] ? __kernfs_new_node+0x6a/0x340 [ 140.563770][ T5937] __should_failslab+0x81/0x90 [ 140.568547][ T5937] should_failslab+0x5/0x20 [ 140.573063][ T5937] kmem_cache_alloc+0x4f/0x320 [ 140.577835][ T5937] ? __down_write_common+0x42/0x860 [ 140.583056][ T5937] __kernfs_new_node+0x6a/0x340 [ 140.587891][ T5937] ? up_write+0x25/0xc0 [ 140.592055][ T5937] kernfs_new_node+0x5b/0xd0 [ 140.596630][ T5937] __kernfs_create_file+0x45/0x1a0 [ 140.601801][ T5937] ? dev_attr_show+0x90/0x90 [ 140.606378][ T5937] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 140.611753][ T5937] internal_create_group+0x2dd/0x840 [ 140.617040][ T5937] sysfs_create_groups+0x3d/0xf0 [ 140.621965][ T5937] device_add+0x66a/0xf40 [ 140.626292][ T5937] netdev_register_kobject+0xfd/0x230 [ 140.631656][ T5937] register_netdevice+0xba5/0x10b0 [ 140.636794][ T5937] hsr_dev_finalize+0x2da/0x460 [ 140.641678][ T5937] hsr_newlink+0x40d/0x450 [ 140.646078][ T5937] ? hsr_get_node_list+0x450/0x450 [ 140.651245][ T5937] rtnl_newlink+0xdae/0x13b0 [ 140.655904][ T5937] ? __rcu_read_unlock+0x5c/0x290 [ 140.661034][ T5937] ? rtnl_setlink+0x2a0/0x2a0 [ 140.665700][ T5937] rtnetlink_rcv_msg+0x745/0x7e0 [ 140.670704][ T5937] ? ___cache_free+0x46/0x300 [ 140.675378][ T5937] ? kmem_cache_free+0x65/0x110 [ 140.680257][ T5937] ? __kfree_skb+0xfe/0x150 [ 140.684815][ T5937] ? consume_skb+0x48/0x160 [ 140.689398][ T5937] ? nlmon_xmit+0x5f/0x70 [ 140.693887][ T5937] ? __this_cpu_preempt_check+0x18/0x20 [ 140.699422][ T5937] ? __local_bh_enable_ip+0x4d/0x70 [ 140.704675][ T5937] ? local_bh_enable+0x1b/0x20 [ 140.709428][ T5937] ? __dev_queue_xmit+0x597/0xf70 [ 140.714443][ T5937] ? __skb_clone+0x2db/0x300 [ 140.719024][ T5937] ? __rcu_read_unlock+0x5c/0x290 [ 140.724079][ T5937] netlink_rcv_skb+0x14e/0x250 [ 140.728925][ T5937] ? rtnetlink_bind+0x60/0x60 [ 140.733589][ T5937] rtnetlink_rcv+0x18/0x20 [ 140.737990][ T5937] netlink_unicast+0x5fc/0x6c0 [ 140.742867][ T5937] netlink_sendmsg+0x6e1/0x7d0 [ 140.747614][ T5937] ? netlink_getsockopt+0x720/0x720 [ 140.752812][ T5937] ____sys_sendmsg+0x39a/0x510 [ 140.757565][ T5937] __sys_sendmsg+0x195/0x230 [ 140.762239][ T5937] __x64_sys_sendmsg+0x42/0x50 [ 140.767032][ T5937] do_syscall_64+0x44/0xd0 [ 140.771498][ T5937] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 140.777481][ T5937] RIP: 0033:0x7ffb90e2cae9 [ 140.782147][ T5937] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 23:48:43 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x59f, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 140.801738][ T5937] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 140.810135][ T5937] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 140.818108][ T5937] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 140.826082][ T5937] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 140.834031][ T5937] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 140.841983][ T5937] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 140.849941][ T5937] 23:48:43 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 79) 23:48:43 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2f00, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:43 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x5d6, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x5c5, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 140.912996][ T5944] FAULT_INJECTION: forcing a failure. [ 140.912996][ T5944] name failslab, interval 1, probability 0, space 0, times 0 [ 140.925647][ T5944] CPU: 1 PID: 5944 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 140.934416][ T5944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 140.944601][ T5944] Call Trace: [ 140.947875][ T5944] [ 140.950803][ T5944] dump_stack_lvl+0xd6/0x122 [ 140.955402][ T5944] dump_stack+0x11/0x1b [ 140.959560][ T5944] should_fail+0x23c/0x250 [ 140.964122][ T5944] ? __kernfs_new_node+0x6a/0x340 [ 140.969179][ T5944] __should_failslab+0x81/0x90 [ 140.973928][ T5944] should_failslab+0x5/0x20 [ 140.978501][ T5944] kmem_cache_alloc+0x4f/0x320 [ 140.983248][ T5944] ? __down_write_common+0x42/0x860 [ 140.988444][ T5944] __kernfs_new_node+0x6a/0x340 [ 140.993327][ T5944] ? up_write+0x25/0xc0 [ 140.997468][ T5944] kernfs_new_node+0x5b/0xd0 [ 141.002057][ T5944] __kernfs_create_file+0x45/0x1a0 [ 141.007163][ T5944] ? dev_attr_show+0x90/0x90 [ 141.011791][ T5944] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 141.017155][ T5944] internal_create_group+0x2dd/0x840 [ 141.022428][ T5944] sysfs_create_groups+0x3d/0xf0 [ 141.027355][ T5944] device_add+0x66a/0xf40 [ 141.031689][ T5944] netdev_register_kobject+0xfd/0x230 [ 141.037129][ T5944] register_netdevice+0xba5/0x10b0 [ 141.042348][ T5944] hsr_dev_finalize+0x2da/0x460 [ 141.047189][ T5944] hsr_newlink+0x40d/0x450 [ 141.051608][ T5944] ? hsr_get_node_list+0x450/0x450 [ 141.056705][ T5944] rtnl_newlink+0xdae/0x13b0 [ 141.061323][ T5944] ? __rcu_read_unlock+0x5c/0x290 [ 141.066356][ T5944] ? rtnl_setlink+0x2a0/0x2a0 [ 141.071033][ T5944] rtnetlink_rcv_msg+0x745/0x7e0 [ 141.075987][ T5944] ? ___cache_free+0x46/0x300 [ 141.080684][ T5944] ? kmem_cache_free+0x65/0x110 [ 141.085573][ T5944] ? __kfree_skb+0xfe/0x150 [ 141.090126][ T5944] ? consume_skb+0x48/0x160 [ 141.094627][ T5944] ? nlmon_xmit+0x5f/0x70 [ 141.099011][ T5944] ? __this_cpu_preempt_check+0x18/0x20 [ 141.104541][ T5944] ? __local_bh_enable_ip+0x4d/0x70 [ 141.109725][ T5944] ? local_bh_enable+0x1b/0x20 [ 141.114565][ T5944] ? __dev_queue_xmit+0x597/0xf70 [ 141.119575][ T5944] ? __skb_clone+0x2db/0x300 [ 141.124158][ T5944] ? __rcu_read_unlock+0x5c/0x290 [ 141.129177][ T5944] netlink_rcv_skb+0x14e/0x250 [ 141.133927][ T5944] ? rtnetlink_bind+0x60/0x60 [ 141.138596][ T5944] rtnetlink_rcv+0x18/0x20 [ 141.143041][ T5944] netlink_unicast+0x5fc/0x6c0 [ 141.147810][ T5944] netlink_sendmsg+0x6e1/0x7d0 [ 141.152577][ T5944] ? netlink_getsockopt+0x720/0x720 [ 141.157833][ T5944] ____sys_sendmsg+0x39a/0x510 [ 141.162898][ T5944] __sys_sendmsg+0x195/0x230 [ 141.167491][ T5944] __x64_sys_sendmsg+0x42/0x50 [ 141.172295][ T5944] do_syscall_64+0x44/0xd0 [ 141.176701][ T5944] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 141.182581][ T5944] RIP: 0033:0x7ffb90e2cae9 [ 141.186984][ T5944] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 23:48:43 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 80) [ 141.206659][ T5944] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 141.215066][ T5944] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 141.223019][ T5944] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 141.230981][ T5944] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 141.238947][ T5944] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 141.246900][ T5944] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 141.254982][ T5944] 23:48:43 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x5c4, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 141.303797][ T5958] FAULT_INJECTION: forcing a failure. [ 141.303797][ T5958] name failslab, interval 1, probability 0, space 0, times 0 [ 141.316608][ T5958] CPU: 1 PID: 5958 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 141.325287][ T5958] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 141.335354][ T5958] Call Trace: [ 141.338626][ T5958] [ 141.341549][ T5958] dump_stack_lvl+0xd6/0x122 [ 141.346314][ T5958] dump_stack+0x11/0x1b [ 141.350537][ T5958] should_fail+0x23c/0x250 [ 141.354978][ T5958] ? __kernfs_new_node+0x6a/0x340 [ 141.359996][ T5958] __should_failslab+0x81/0x90 [ 141.364783][ T5958] should_failslab+0x5/0x20 [ 141.369355][ T5958] kmem_cache_alloc+0x4f/0x320 [ 141.374178][ T5958] ? __down_write_common+0x42/0x860 [ 141.379360][ T5958] __kernfs_new_node+0x6a/0x340 [ 141.384297][ T5958] ? up_write+0x25/0xc0 [ 141.388434][ T5958] kernfs_new_node+0x5b/0xd0 [ 141.393018][ T5958] __kernfs_create_file+0x45/0x1a0 [ 141.398114][ T5958] ? dev_attr_show+0x90/0x90 [ 141.402786][ T5958] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 141.408241][ T5958] internal_create_group+0x2dd/0x840 [ 141.413527][ T5958] sysfs_create_groups+0x3d/0xf0 [ 141.418502][ T5958] device_add+0x66a/0xf40 [ 141.422821][ T5958] netdev_register_kobject+0xfd/0x230 [ 141.428186][ T5958] register_netdevice+0xba5/0x10b0 [ 141.433281][ T5958] hsr_dev_finalize+0x2da/0x460 [ 141.438120][ T5958] hsr_newlink+0x40d/0x450 [ 141.442518][ T5958] ? hsr_get_node_list+0x450/0x450 [ 141.447626][ T5958] rtnl_newlink+0xdae/0x13b0 [ 141.452257][ T5958] ? rtnl_setlink+0x2a0/0x2a0 [ 141.456928][ T5958] rtnetlink_rcv_msg+0x745/0x7e0 [ 141.461959][ T5958] ? ___cache_free+0x46/0x300 [ 141.466702][ T5958] ? xfd_validate_state+0x4e/0xf0 [ 141.471707][ T5958] ? kmem_cache_free+0x65/0x110 [ 141.476665][ T5958] ? __kfree_skb+0xfe/0x150 [ 141.481180][ T5958] ? consume_skb+0x48/0x160 [ 141.485768][ T5958] ? nlmon_xmit+0x5f/0x70 [ 141.490264][ T5958] ? __this_cpu_preempt_check+0x18/0x20 [ 141.495860][ T5958] ? __local_bh_enable_ip+0x4d/0x70 [ 141.501126][ T5958] ? local_bh_enable+0x1b/0x20 [ 141.505956][ T5958] ? __dev_queue_xmit+0x597/0xf70 [ 141.511081][ T5958] ? __skb_clone+0x2db/0x300 [ 141.515743][ T5958] ? __rcu_read_unlock+0x5c/0x290 [ 141.520751][ T5958] netlink_rcv_skb+0x14e/0x250 [ 141.525591][ T5958] ? rtnetlink_bind+0x60/0x60 [ 141.530251][ T5958] rtnetlink_rcv+0x18/0x20 [ 141.534648][ T5958] netlink_unicast+0x5fc/0x6c0 [ 141.539407][ T5958] netlink_sendmsg+0x6e1/0x7d0 [ 141.544229][ T5958] ? netlink_getsockopt+0x720/0x720 [ 141.549415][ T5958] ____sys_sendmsg+0x39a/0x510 [ 141.554163][ T5958] __sys_sendmsg+0x195/0x230 [ 141.558768][ T5958] __x64_sys_sendmsg+0x42/0x50 [ 141.563633][ T5958] do_syscall_64+0x44/0xd0 [ 141.568061][ T5958] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 141.573954][ T5958] RIP: 0033:0x7ffb90e2cae9 [ 141.578452][ T5958] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 23:48:44 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 81) 23:48:44 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x5d6, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 141.598057][ T5958] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 141.606522][ T5958] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 141.614494][ T5958] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 141.622489][ T5958] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 141.630453][ T5958] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 141.638405][ T5958] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 141.646364][ T5958] [ 141.679791][ T5963] FAULT_INJECTION: forcing a failure. [ 141.679791][ T5963] name failslab, interval 1, probability 0, space 0, times 0 [ 141.692445][ T5963] CPU: 1 PID: 5963 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 141.701206][ T5963] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 141.711253][ T5963] Call Trace: [ 141.714514][ T5963] [ 141.717436][ T5963] dump_stack_lvl+0xd6/0x122 [ 141.722099][ T5963] dump_stack+0x11/0x1b [ 141.726238][ T5963] should_fail+0x23c/0x250 [ 141.730791][ T5963] ? __kernfs_new_node+0x6a/0x340 [ 141.735823][ T5963] __should_failslab+0x81/0x90 [ 141.740622][ T5963] should_failslab+0x5/0x20 [ 141.745124][ T5963] kmem_cache_alloc+0x4f/0x320 [ 141.749880][ T5963] ? __down_write_common+0x42/0x860 [ 141.755065][ T5963] __kernfs_new_node+0x6a/0x340 [ 141.759902][ T5963] ? up_write+0x25/0xc0 [ 141.764118][ T5963] kernfs_new_node+0x5b/0xd0 [ 141.768702][ T5963] __kernfs_create_file+0x45/0x1a0 [ 141.773810][ T5963] ? dev_attr_show+0x90/0x90 [ 141.778412][ T5963] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 141.783819][ T5963] internal_create_group+0x2dd/0x840 [ 141.789105][ T5963] sysfs_create_groups+0x3d/0xf0 [ 141.794037][ T5963] device_add+0x66a/0xf40 [ 141.798377][ T5963] netdev_register_kobject+0xfd/0x230 [ 141.803861][ T5963] register_netdevice+0xba5/0x10b0 [ 141.809217][ T5963] hsr_dev_finalize+0x2da/0x460 [ 141.814166][ T5963] hsr_newlink+0x40d/0x450 [ 141.818612][ T5963] ? hsr_get_node_list+0x450/0x450 [ 141.823940][ T5963] rtnl_newlink+0xdae/0x13b0 [ 141.828586][ T5963] ? __rcu_read_unlock+0x5c/0x290 [ 141.833662][ T5963] ? rtnl_setlink+0x2a0/0x2a0 [ 141.838335][ T5963] rtnetlink_rcv_msg+0x745/0x7e0 [ 141.843258][ T5963] ? ___cache_free+0x46/0x300 [ 141.847923][ T5963] ? kmem_cache_free+0x65/0x110 [ 141.852764][ T5963] ? __kfree_skb+0xfe/0x150 [ 141.857252][ T5963] ? consume_skb+0x48/0x160 [ 141.861748][ T5963] ? nlmon_xmit+0x5f/0x70 [ 141.866074][ T5963] ? __this_cpu_preempt_check+0x18/0x20 [ 141.871615][ T5963] ? __local_bh_enable_ip+0x4d/0x70 [ 141.876861][ T5963] ? local_bh_enable+0x1b/0x20 [ 141.881609][ T5963] ? __dev_queue_xmit+0x597/0xf70 [ 141.886629][ T5963] ? __skb_clone+0x2db/0x300 [ 141.891205][ T5963] ? __rcu_read_unlock+0x5c/0x290 [ 141.896300][ T5963] netlink_rcv_skb+0x14e/0x250 [ 141.901053][ T5963] ? rtnetlink_bind+0x60/0x60 [ 141.905831][ T5963] rtnetlink_rcv+0x18/0x20 [ 141.910237][ T5963] netlink_unicast+0x5fc/0x6c0 [ 141.914999][ T5963] netlink_sendmsg+0x6e1/0x7d0 [ 141.919771][ T5963] ? netlink_getsockopt+0x720/0x720 [ 141.924979][ T5963] ____sys_sendmsg+0x39a/0x510 [ 141.929753][ T5963] __sys_sendmsg+0x195/0x230 [ 141.934387][ T5963] __x64_sys_sendmsg+0x42/0x50 [ 141.939207][ T5963] do_syscall_64+0x44/0xd0 [ 141.943630][ T5963] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 141.949543][ T5963] RIP: 0033:0x7ffb90e2cae9 [ 141.953976][ T5963] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 23:48:44 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 82) 23:48:44 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x1b7, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) [ 141.973577][ T5963] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 141.982090][ T5963] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 141.990099][ T5963] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 141.998048][ T5963] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 142.006262][ T5963] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 142.014230][ T5963] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 142.022257][ T5963] 23:48:44 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x600, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:44 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x5c5, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:44 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x3302, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) [ 142.083135][ T5973] FAULT_INJECTION: forcing a failure. [ 142.083135][ T5973] name failslab, interval 1, probability 0, space 0, times 0 [ 142.095810][ T5973] CPU: 0 PID: 5973 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 142.104528][ T5973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 142.114582][ T5973] Call Trace: [ 142.117911][ T5973] [ 142.120834][ T5973] dump_stack_lvl+0xd6/0x122 [ 142.125438][ T5973] dump_stack+0x11/0x1b [ 142.129677][ T5973] should_fail+0x23c/0x250 [ 142.134132][ T5973] ? __kernfs_new_node+0x6a/0x340 [ 142.139148][ T5973] __should_failslab+0x81/0x90 [ 142.143921][ T5973] should_failslab+0x5/0x20 [ 142.148463][ T5973] kmem_cache_alloc+0x4f/0x320 [ 142.153258][ T5973] ? __down_write_common+0x42/0x860 [ 142.158437][ T5973] __kernfs_new_node+0x6a/0x340 [ 142.163276][ T5973] ? up_write+0x25/0xc0 [ 142.167421][ T5973] kernfs_new_node+0x5b/0xd0 [ 142.172021][ T5973] __kernfs_create_file+0x45/0x1a0 [ 142.177132][ T5973] ? dev_attr_show+0x90/0x90 [ 142.181725][ T5973] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 142.187096][ T5973] internal_create_group+0x2dd/0x840 [ 142.192384][ T5973] sysfs_create_groups+0x3d/0xf0 [ 142.197319][ T5973] device_add+0x66a/0xf40 [ 142.201652][ T5973] netdev_register_kobject+0xfd/0x230 [ 142.207015][ T5973] register_netdevice+0xba5/0x10b0 [ 142.212154][ T5973] hsr_dev_finalize+0x2da/0x460 [ 142.217002][ T5973] hsr_newlink+0x40d/0x450 [ 142.221400][ T5973] ? hsr_get_node_list+0x450/0x450 [ 142.226656][ T5973] rtnl_newlink+0xdae/0x13b0 [ 142.231254][ T5973] ? rtnl_setlink+0x2a0/0x2a0 [ 142.235912][ T5973] rtnetlink_rcv_msg+0x745/0x7e0 [ 142.240874][ T5973] ? ___cache_free+0x46/0x300 [ 142.245538][ T5973] ? kmem_cache_free+0x65/0x110 [ 142.250370][ T5973] ? __kfree_skb+0xfe/0x150 [ 142.254979][ T5973] ? consume_skb+0x48/0x160 [ 142.259464][ T5973] ? nlmon_xmit+0x5f/0x70 [ 142.263774][ T5973] ? __this_cpu_preempt_check+0x18/0x20 [ 142.269406][ T5973] ? __local_bh_enable_ip+0x4d/0x70 [ 142.274759][ T5973] ? local_bh_enable+0x1b/0x20 [ 142.279512][ T5973] ? __dev_queue_xmit+0x597/0xf70 [ 142.284517][ T5973] ? __skb_clone+0x2db/0x300 [ 142.289085][ T5973] ? __rcu_read_unlock+0x5c/0x290 [ 142.294175][ T5973] netlink_rcv_skb+0x14e/0x250 [ 142.298957][ T5973] ? rtnetlink_bind+0x60/0x60 [ 142.303619][ T5973] rtnetlink_rcv+0x18/0x20 [ 142.308029][ T5973] netlink_unicast+0x5fc/0x6c0 [ 142.312817][ T5973] netlink_sendmsg+0x6e1/0x7d0 [ 142.317564][ T5973] ? netlink_getsockopt+0x720/0x720 [ 142.322888][ T5973] ____sys_sendmsg+0x39a/0x510 [ 142.327761][ T5973] __sys_sendmsg+0x195/0x230 [ 142.332353][ T5973] __x64_sys_sendmsg+0x42/0x50 [ 142.337238][ T5973] do_syscall_64+0x44/0xd0 [ 142.341721][ T5973] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 142.347688][ T5973] RIP: 0033:0x7ffb90e2cae9 [ 142.352275][ T5973] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 142.371880][ T5973] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 23:48:45 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 83) 23:48:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x600, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 142.380292][ T5973] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 142.388391][ T5973] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 142.396347][ T5973] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 142.404308][ T5973] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 142.412390][ T5973] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 142.420387][ T5973] [ 142.485019][ T5985] FAULT_INJECTION: forcing a failure. [ 142.485019][ T5985] name failslab, interval 1, probability 0, space 0, times 0 [ 142.497693][ T5985] CPU: 1 PID: 5985 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 142.506395][ T5985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 142.516450][ T5985] Call Trace: [ 142.519783][ T5985] [ 142.522701][ T5985] dump_stack_lvl+0xd6/0x122 [ 142.527316][ T5985] dump_stack+0x11/0x1b [ 142.531469][ T5985] should_fail+0x23c/0x250 [ 142.536085][ T5985] ? __kernfs_new_node+0x6a/0x340 [ 142.541112][ T5985] __should_failslab+0x81/0x90 [ 142.545925][ T5985] should_failslab+0x5/0x20 [ 142.550439][ T5985] kmem_cache_alloc+0x4f/0x320 [ 142.555227][ T5985] ? __down_write_common+0x42/0x860 [ 142.560417][ T5985] __kernfs_new_node+0x6a/0x340 [ 142.565272][ T5985] ? up_write+0x25/0xc0 [ 142.569424][ T5985] kernfs_new_node+0x5b/0xd0 [ 142.574068][ T5985] __kernfs_create_file+0x45/0x1a0 [ 142.579240][ T5985] ? dev_attr_show+0x90/0x90 [ 142.583881][ T5985] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 142.589245][ T5985] internal_create_group+0x2dd/0x840 [ 142.594542][ T5985] sysfs_create_groups+0x3d/0xf0 [ 142.599467][ T5985] device_add+0x66a/0xf40 [ 142.603803][ T5985] netdev_register_kobject+0xfd/0x230 [ 142.609162][ T5985] register_netdevice+0xba5/0x10b0 [ 142.614262][ T5985] hsr_dev_finalize+0x2da/0x460 [ 142.619191][ T5985] hsr_newlink+0x40d/0x450 [ 142.623621][ T5985] ? hsr_get_node_list+0x450/0x450 [ 142.628747][ T5985] rtnl_newlink+0xdae/0x13b0 [ 142.633404][ T5985] ? __rcu_read_unlock+0x5c/0x290 [ 142.638423][ T5985] ? rtnl_setlink+0x2a0/0x2a0 [ 142.643169][ T5985] rtnetlink_rcv_msg+0x745/0x7e0 [ 142.648127][ T5985] ? ___cache_free+0x46/0x300 [ 142.652793][ T5985] ? kmem_cache_free+0x65/0x110 [ 142.657681][ T5985] ? __kfree_skb+0xfe/0x150 [ 142.662175][ T5985] ? consume_skb+0x48/0x160 [ 142.666671][ T5985] ? nlmon_xmit+0x5f/0x70 [ 142.671035][ T5985] ? __this_cpu_preempt_check+0x18/0x20 [ 142.676587][ T5985] ? __local_bh_enable_ip+0x4d/0x70 [ 142.681844][ T5985] ? local_bh_enable+0x1b/0x20 [ 142.686600][ T5985] ? __dev_queue_xmit+0x597/0xf70 [ 142.691613][ T5985] ? __skb_clone+0x2db/0x300 [ 142.696207][ T5985] ? __rcu_read_unlock+0x5c/0x290 [ 142.701282][ T5985] netlink_rcv_skb+0x14e/0x250 [ 142.706090][ T5985] ? rtnetlink_bind+0x60/0x60 [ 142.710757][ T5985] rtnetlink_rcv+0x18/0x20 [ 142.715174][ T5985] netlink_unicast+0x5fc/0x6c0 [ 142.719927][ T5985] netlink_sendmsg+0x6e1/0x7d0 [ 142.724723][ T5985] ? netlink_getsockopt+0x720/0x720 [ 142.729950][ T5985] ____sys_sendmsg+0x39a/0x510 [ 142.734990][ T5985] __sys_sendmsg+0x195/0x230 [ 142.739657][ T5985] __x64_sys_sendmsg+0x42/0x50 [ 142.744435][ T5985] do_syscall_64+0x44/0xd0 [ 142.748853][ T5985] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 142.754737][ T5985] RIP: 0033:0x7ffb90e2cae9 [ 142.759145][ T5985] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 23:48:45 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 84) 23:48:45 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x700, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 142.778834][ T5985] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 142.787401][ T5985] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 142.795770][ T5985] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 142.803731][ T5985] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 142.811757][ T5985] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 142.819710][ T5985] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 142.827665][ T5985] 23:48:45 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x211, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x700, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 142.890949][ T5990] FAULT_INJECTION: forcing a failure. [ 142.890949][ T5990] name failslab, interval 1, probability 0, space 0, times 0 [ 142.903691][ T5990] CPU: 0 PID: 5990 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 142.912368][ T5990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 142.922495][ T5990] Call Trace: [ 142.925755][ T5990] [ 142.928666][ T5990] dump_stack_lvl+0xd6/0x122 [ 142.933284][ T5990] dump_stack+0x11/0x1b [ 142.937418][ T5990] should_fail+0x23c/0x250 [ 142.941846][ T5990] ? __kernfs_new_node+0x6a/0x340 [ 142.946863][ T5990] __should_failslab+0x81/0x90 [ 142.951609][ T5990] should_failslab+0x5/0x20 [ 142.956214][ T5990] kmem_cache_alloc+0x4f/0x320 [ 142.960959][ T5990] ? __down_write_common+0x42/0x860 [ 142.966198][ T5990] __kernfs_new_node+0x6a/0x340 [ 142.971080][ T5990] ? up_write+0x25/0xc0 [ 142.975267][ T5990] kernfs_new_node+0x5b/0xd0 [ 142.979937][ T5990] __kernfs_create_file+0x45/0x1a0 [ 142.985033][ T5990] ? dev_attr_show+0x90/0x90 [ 142.989602][ T5990] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 142.995028][ T5990] internal_create_group+0x2dd/0x840 [ 143.000358][ T5990] sysfs_create_groups+0x3d/0xf0 [ 143.005289][ T5990] device_add+0x66a/0xf40 [ 143.009636][ T5990] netdev_register_kobject+0xfd/0x230 [ 143.015005][ T5990] register_netdevice+0xba5/0x10b0 [ 143.020134][ T5990] hsr_dev_finalize+0x2da/0x460 [ 143.024965][ T5990] hsr_newlink+0x40d/0x450 [ 143.029387][ T5990] ? hsr_get_node_list+0x450/0x450 [ 143.034514][ T5990] rtnl_newlink+0xdae/0x13b0 [ 143.039174][ T5990] ? __rcu_read_unlock+0x5c/0x290 [ 143.044248][ T5990] ? rtnl_setlink+0x2a0/0x2a0 [ 143.048994][ T5990] rtnetlink_rcv_msg+0x745/0x7e0 [ 143.053910][ T5990] ? ___cache_free+0x46/0x300 [ 143.058609][ T5990] ? kmem_cache_free+0x65/0x110 [ 143.063454][ T5990] ? __kfree_skb+0xfe/0x150 [ 143.067947][ T5990] ? consume_skb+0x48/0x160 [ 143.072445][ T5990] ? nlmon_xmit+0x5f/0x70 [ 143.076755][ T5990] ? __this_cpu_preempt_check+0x18/0x20 [ 143.082280][ T5990] ? __local_bh_enable_ip+0x4d/0x70 [ 143.087468][ T5990] ? local_bh_enable+0x1b/0x20 [ 143.092280][ T5990] ? __dev_queue_xmit+0x597/0xf70 [ 143.097294][ T5990] ? __skb_clone+0x2db/0x300 [ 143.101900][ T5990] ? __rcu_read_unlock+0x5c/0x290 [ 143.106923][ T5990] netlink_rcv_skb+0x14e/0x250 [ 143.111683][ T5990] ? rtnetlink_bind+0x60/0x60 [ 143.116344][ T5990] rtnetlink_rcv+0x18/0x20 [ 143.120754][ T5990] netlink_unicast+0x5fc/0x6c0 [ 143.125560][ T5990] netlink_sendmsg+0x6e1/0x7d0 [ 143.130306][ T5990] ? netlink_getsockopt+0x720/0x720 [ 143.135564][ T5990] ____sys_sendmsg+0x39a/0x510 [ 143.140390][ T5990] __sys_sendmsg+0x195/0x230 [ 143.145007][ T5990] __x64_sys_sendmsg+0x42/0x50 [ 143.149817][ T5990] do_syscall_64+0x44/0xd0 [ 143.154221][ T5990] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 143.160095][ T5990] RIP: 0033:0x7ffb90e2cae9 [ 143.164486][ T5990] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 143.184085][ T5990] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 23:48:45 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x5d6, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:45 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x3a00, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) [ 143.192543][ T5990] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 143.200495][ T5990] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 143.208451][ T5990] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 143.216407][ T5990] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 143.224354][ T5990] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 143.232384][ T5990] 23:48:45 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 85) [ 143.274309][ T1844] ================================================================== [ 143.282407][ T1844] BUG: KCSAN: data-race in ext4_mb_regular_allocator / mb_mark_used [ 143.290390][ T1844] [ 143.292707][ T1844] write to 0xffff8881013d2b54 of 4 bytes by task 1832 on cpu 1: [ 143.300314][ T1844] mb_mark_used+0x13b/0xc50 [ 143.304806][ T1844] ext4_mb_use_best_found+0x102/0x300 [ 143.310154][ T1844] ext4_mb_complex_scan_group+0x359/0x880 [ 143.315869][ T1844] ext4_mb_regular_allocator+0x19c8/0x24a0 [ 143.321667][ T1844] ext4_mb_new_blocks+0x78c/0x1ee0 [ 143.326757][ T1844] ext4_ext_map_blocks+0x1658/0x2120 [ 143.332026][ T1844] ext4_map_blocks+0x71e/0xf00 [ 143.336790][ T1844] ext4_getblk+0xc6/0x3e0 [ 143.341099][ T1844] ext4_bread+0x28/0x100 [ 143.345320][ T1844] ext4_append+0xd1/0x1c0 [ 143.349624][ T1844] ext4_init_new_dir+0x177/0x500 [ 143.354537][ T1844] ext4_mkdir+0x329/0x760 [ 143.358840][ T1844] vfs_mkdir+0x2c8/0x3d0 [ 143.363057][ T1844] do_mkdirat+0x12e/0x2c0 [ 143.367388][ T1844] __x64_sys_mkdir+0x40/0x50 [ 143.371955][ T1844] do_syscall_64+0x44/0xd0 [ 143.376352][ T1844] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 143.382244][ T1844] [ 143.384554][ T1844] read to 0xffff8881013d2b54 of 4 bytes by task 1844 on cpu 0: [ 143.392069][ T1844] ext4_mb_regular_allocator+0xa97/0x24a0 [ 143.397773][ T1844] ext4_mb_new_blocks+0x78c/0x1ee0 [ 143.402895][ T1844] ext4_ext_map_blocks+0x1658/0x2120 [ 143.408168][ T1844] ext4_map_blocks+0x71e/0xf00 [ 143.412925][ T1844] ext4_getblk+0xc6/0x3e0 [ 143.417234][ T1844] ext4_bread+0x28/0x100 [ 143.421454][ T1844] ext4_append+0xd1/0x1c0 [ 143.425848][ T1844] ext4_init_new_dir+0x177/0x500 [ 143.430775][ T1844] ext4_mkdir+0x329/0x760 [ 143.435079][ T1844] vfs_mkdir+0x2c8/0x3d0 [ 143.439302][ T1844] do_mkdirat+0x12e/0x2c0 [ 143.443648][ T1844] __x64_sys_mkdir+0x40/0x50 [ 143.448216][ T1844] do_syscall_64+0x44/0xd0 [ 143.452625][ T1844] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 143.458513][ T1844] [ 143.460816][ T1844] value changed: 0x000007e2 -> 0x000007e1 [ 143.466512][ T1844] [ 143.468846][ T1844] Reported by Kernel Concurrency Sanitizer on: [ 143.474976][ T1844] CPU: 0 PID: 1844 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 143.483668][ T1844] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 143.493700][ T1844] ================================================================== [ 143.518079][ T6004] FAULT_INJECTION: forcing a failure. [ 143.518079][ T6004] name failslab, interval 1, probability 0, space 0, times 0 [ 143.530754][ T6004] CPU: 0 PID: 6004 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 143.539433][ T6004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 143.549648][ T6004] Call Trace: [ 143.552908][ T6004] [ 143.555844][ T6004] dump_stack_lvl+0xd6/0x122 [ 143.560425][ T6004] dump_stack+0x11/0x1b [ 143.564566][ T6004] should_fail+0x23c/0x250 [ 143.568967][ T6004] ? __kernfs_new_node+0x6a/0x340 [ 143.574042][ T6004] __should_failslab+0x81/0x90 [ 143.578842][ T6004] should_failslab+0x5/0x20 [ 143.583384][ T6004] kmem_cache_alloc+0x4f/0x320 [ 143.588134][ T6004] ? __down_write_common+0x42/0x860 [ 143.593323][ T6004] __kernfs_new_node+0x6a/0x340 [ 143.598357][ T6004] ? up_write+0x25/0xc0 [ 143.602583][ T6004] kernfs_new_node+0x5b/0xd0 [ 143.607165][ T6004] __kernfs_create_file+0x45/0x1a0 [ 143.612266][ T6004] ? dev_attr_show+0x90/0x90 [ 143.616890][ T6004] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 143.622273][ T6004] internal_create_group+0x2dd/0x840 [ 143.627613][ T6004] sysfs_create_groups+0x3d/0xf0 [ 143.632554][ T6004] device_add+0x66a/0xf40 [ 143.636984][ T6004] netdev_register_kobject+0xfd/0x230 [ 143.642343][ T6004] register_netdevice+0xba5/0x10b0 [ 143.647436][ T6004] hsr_dev_finalize+0x2da/0x460 [ 143.652267][ T6004] hsr_newlink+0x40d/0x450 [ 143.656685][ T6004] ? hsr_get_node_list+0x450/0x450 [ 143.661789][ T6004] rtnl_newlink+0xdae/0x13b0 [ 143.666575][ T6004] ? rb_insert_color+0x2fa/0x310 [ 143.671509][ T6004] ? rtnl_setlink+0x2a0/0x2a0 [ 143.676192][ T6004] rtnetlink_rcv_msg+0x745/0x7e0 [ 143.681195][ T6004] ? ___cache_free+0x46/0x300 [ 143.685935][ T6004] ? kmem_cache_free+0x65/0x110 [ 143.690793][ T6004] ? __kfree_skb+0xfe/0x150 [ 143.695284][ T6004] ? consume_skb+0x48/0x160 [ 143.699765][ T6004] ? nlmon_xmit+0x5f/0x70 [ 143.704072][ T6004] ? __this_cpu_preempt_check+0x18/0x20 [ 143.709690][ T6004] ? __local_bh_enable_ip+0x4d/0x70 [ 143.714883][ T6004] ? local_bh_enable+0x1b/0x20 [ 143.719626][ T6004] ? __dev_queue_xmit+0x597/0xf70 [ 143.724638][ T6004] ? __skb_clone+0x2db/0x300 [ 143.729222][ T6004] ? __rcu_read_unlock+0x5c/0x290 [ 143.734223][ T6004] netlink_rcv_skb+0x14e/0x250 [ 143.738989][ T6004] ? rtnetlink_bind+0x60/0x60 [ 143.743691][ T6004] rtnetlink_rcv+0x18/0x20 [ 143.748220][ T6004] netlink_unicast+0x5fc/0x6c0 [ 143.753062][ T6004] netlink_sendmsg+0x6e1/0x7d0 [ 143.757810][ T6004] ? netlink_getsockopt+0x720/0x720 [ 143.763003][ T6004] ____sys_sendmsg+0x39a/0x510 [ 143.767779][ T6004] __sys_sendmsg+0x195/0x230 [ 143.772428][ T6004] __x64_sys_sendmsg+0x42/0x50 [ 143.777269][ T6004] do_syscall_64+0x44/0xd0 [ 143.781666][ T6004] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 143.787539][ T6004] RIP: 0033:0x7ffb90e2cae9 [ 143.791929][ T6004] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 143.811514][ T6004] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 23:48:46 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x900, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:46 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 86) 23:48:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x900, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 143.820004][ T6004] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 143.827989][ T6004] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 143.835941][ T6004] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 143.843942][ T6004] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 143.851898][ T6004] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 143.859865][ T6004] [ 143.913085][ T6011] FAULT_INJECTION: forcing a failure. [ 143.913085][ T6011] name failslab, interval 1, probability 0, space 0, times 0 [ 143.925762][ T6011] CPU: 1 PID: 6011 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 143.934527][ T6011] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 143.944669][ T6011] Call Trace: [ 143.947927][ T6011] [ 143.950853][ T6011] dump_stack_lvl+0xd6/0x122 [ 143.955490][ T6011] dump_stack+0x11/0x1b [ 143.959624][ T6011] should_fail+0x23c/0x250 [ 143.964044][ T6011] ? __kernfs_new_node+0x6a/0x340 [ 143.969050][ T6011] __should_failslab+0x81/0x90 [ 143.973900][ T6011] should_failslab+0x5/0x20 [ 143.978468][ T6011] kmem_cache_alloc+0x4f/0x320 [ 143.983311][ T6011] ? __down_write_common+0x42/0x860 [ 143.988487][ T6011] __kernfs_new_node+0x6a/0x340 [ 143.993394][ T6011] ? up_write+0x25/0xc0 [ 143.997527][ T6011] kernfs_new_node+0x5b/0xd0 [ 144.002104][ T6011] __kernfs_create_file+0x45/0x1a0 [ 144.007217][ T6011] ? dev_attr_show+0x90/0x90 [ 144.011790][ T6011] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 144.017339][ T6011] internal_create_group+0x2dd/0x840 [ 144.022660][ T6011] sysfs_create_groups+0x3d/0xf0 [ 144.027656][ T6011] device_add+0x66a/0xf40 [ 144.031974][ T6011] netdev_register_kobject+0xfd/0x230 [ 144.037322][ T6011] register_netdevice+0xba5/0x10b0 [ 144.043027][ T6011] hsr_dev_finalize+0x2da/0x460 [ 144.047942][ T6011] hsr_newlink+0x40d/0x450 [ 144.052356][ T6011] ? hsr_get_node_list+0x450/0x450 [ 144.057469][ T6011] rtnl_newlink+0xdae/0x13b0 [ 144.062107][ T6011] ? __rcu_read_unlock+0x5c/0x290 [ 144.067177][ T6011] ? rtnl_setlink+0x2a0/0x2a0 [ 144.071926][ T6011] rtnetlink_rcv_msg+0x745/0x7e0 [ 144.076918][ T6011] ? ___cache_free+0x46/0x300 [ 144.081577][ T6011] ? kmem_cache_free+0x65/0x110 [ 144.086497][ T6011] ? __kfree_skb+0xfe/0x150 [ 144.090980][ T6011] ? consume_skb+0x48/0x160 [ 144.095479][ T6011] ? nlmon_xmit+0x5f/0x70 [ 144.099802][ T6011] ? __this_cpu_preempt_check+0x18/0x20 [ 144.105400][ T6011] ? __local_bh_enable_ip+0x4d/0x70 [ 144.110581][ T6011] ? local_bh_enable+0x1b/0x20 [ 144.115379][ T6011] ? __dev_queue_xmit+0x597/0xf70 [ 144.120452][ T6011] ? __skb_clone+0x2db/0x300 [ 144.125039][ T6011] ? __rcu_read_unlock+0x5c/0x290 [ 144.130049][ T6011] netlink_rcv_skb+0x14e/0x250 [ 144.134868][ T6011] ? rtnetlink_bind+0x60/0x60 [ 144.139536][ T6011] rtnetlink_rcv+0x18/0x20 [ 144.143954][ T6011] netlink_unicast+0x5fc/0x6c0 [ 144.148721][ T6011] netlink_sendmsg+0x6e1/0x7d0 [ 144.153531][ T6011] ? netlink_getsockopt+0x720/0x720 [ 144.158768][ T6011] ____sys_sendmsg+0x39a/0x510 [ 144.163572][ T6011] __sys_sendmsg+0x195/0x230 [ 144.168207][ T6011] ? amd_put_event_constraints+0x90/0x120 [ 144.173987][ T6011] __x64_sys_sendmsg+0x42/0x50 [ 144.178728][ T6011] do_syscall_64+0x44/0xd0 [ 144.183216][ T6011] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 144.189089][ T6011] RIP: 0033:0x7ffb90e2cae9 [ 144.193478][ T6011] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 144.213097][ T6011] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 144.221490][ T6011] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 144.229454][ T6011] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 144.237416][ T6011] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 144.245718][ T6011] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 144.253668][ T6011] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 144.261706][ T6011] 23:48:46 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 87) 23:48:46 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x3f00, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:46 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x233, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x600, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 144.300663][ T6019] FAULT_INJECTION: forcing a failure. [ 144.300663][ T6019] name failslab, interval 1, probability 0, space 0, times 0 [ 144.313324][ T6019] CPU: 1 PID: 6019 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 144.321997][ T6019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 144.332060][ T6019] Call Trace: [ 144.335332][ T6019] [ 144.338359][ T6019] dump_stack_lvl+0xd6/0x122 [ 144.342932][ T6019] dump_stack+0x11/0x1b [ 144.347073][ T6019] should_fail+0x23c/0x250 [ 144.351494][ T6019] ? __kernfs_new_node+0x6a/0x340 [ 144.356532][ T6019] __should_failslab+0x81/0x90 [ 144.361279][ T6019] should_failslab+0x5/0x20 [ 144.365804][ T6019] kmem_cache_alloc+0x4f/0x320 [ 144.370547][ T6019] ? __down_write_common+0x42/0x860 [ 144.375816][ T6019] __kernfs_new_node+0x6a/0x340 [ 144.380648][ T6019] ? up_write+0x25/0xc0 [ 144.384839][ T6019] kernfs_new_node+0x5b/0xd0 [ 144.389421][ T6019] __kernfs_create_file+0x45/0x1a0 [ 144.394512][ T6019] ? dev_attr_show+0x90/0x90 [ 144.399120][ T6019] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 144.404472][ T6019] internal_create_group+0x2dd/0x840 [ 144.409733][ T6019] sysfs_create_groups+0x3d/0xf0 [ 144.414718][ T6019] device_add+0x66a/0xf40 [ 144.419266][ T6019] netdev_register_kobject+0xfd/0x230 [ 144.424663][ T6019] register_netdevice+0xba5/0x10b0 [ 144.429759][ T6019] hsr_dev_finalize+0x2da/0x460 [ 144.434698][ T6019] hsr_newlink+0x40d/0x450 [ 144.439120][ T6019] ? hsr_get_node_list+0x450/0x450 [ 144.444716][ T6019] rtnl_newlink+0xdae/0x13b0 [ 144.449354][ T6019] ? __rcu_read_unlock+0x5c/0x290 [ 144.454399][ T6019] ? rtnl_setlink+0x2a0/0x2a0 [ 144.459097][ T6019] rtnetlink_rcv_msg+0x745/0x7e0 [ 144.464047][ T6019] ? ___cache_free+0x46/0x300 [ 144.468741][ T6019] ? kmem_cache_free+0x65/0x110 [ 144.473578][ T6019] ? __kfree_skb+0xfe/0x150 [ 144.478079][ T6019] ? consume_skb+0x48/0x160 [ 144.482665][ T6019] ? nlmon_xmit+0x5f/0x70 [ 144.487039][ T6019] ? __this_cpu_preempt_check+0x18/0x20 [ 144.492618][ T6019] ? __local_bh_enable_ip+0x4d/0x70 [ 144.497822][ T6019] ? local_bh_enable+0x1b/0x20 [ 144.502645][ T6019] ? __dev_queue_xmit+0x597/0xf70 [ 144.507653][ T6019] ? __skb_clone+0x2db/0x300 [ 144.512270][ T6019] ? __rcu_read_unlock+0x5c/0x290 [ 144.517272][ T6019] netlink_rcv_skb+0x14e/0x250 [ 144.522105][ T6019] ? rtnetlink_bind+0x60/0x60 [ 144.526885][ T6019] rtnetlink_rcv+0x18/0x20 [ 144.531344][ T6019] netlink_unicast+0x5fc/0x6c0 [ 144.536223][ T6019] netlink_sendmsg+0x6e1/0x7d0 [ 144.540978][ T6019] ? netlink_getsockopt+0x720/0x720 [ 144.546174][ T6019] ____sys_sendmsg+0x39a/0x510 [ 144.551064][ T6019] __sys_sendmsg+0x195/0x230 [ 144.555667][ T6019] __x64_sys_sendmsg+0x42/0x50 [ 144.560439][ T6019] do_syscall_64+0x44/0xd0 [ 144.564905][ T6019] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 144.570867][ T6019] RIP: 0033:0x7ffb90e2cae9 [ 144.575296][ T6019] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 144.594882][ T6019] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 144.603279][ T6019] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 144.611265][ T6019] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 144.619259][ T6019] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 144.627253][ T6019] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 144.635230][ T6019] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 144.643369][ T6019] 23:48:47 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xa00, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xa00, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:47 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 88) 23:48:47 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x700, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 144.721565][ T6032] FAULT_INJECTION: forcing a failure. [ 144.721565][ T6032] name failslab, interval 1, probability 0, space 0, times 0 [ 144.734245][ T6032] CPU: 1 PID: 6032 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 144.743203][ T6032] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 144.753260][ T6032] Call Trace: [ 144.756518][ T6032] [ 144.759439][ T6032] dump_stack_lvl+0xd6/0x122 [ 144.764022][ T6032] dump_stack+0x11/0x1b [ 144.768172][ T6032] should_fail+0x23c/0x250 [ 144.772587][ T6032] ? __kernfs_new_node+0x6a/0x340 [ 144.777684][ T6032] __should_failslab+0x81/0x90 [ 144.782491][ T6032] should_failslab+0x5/0x20 [ 144.786977][ T6032] kmem_cache_alloc+0x4f/0x320 [ 144.791784][ T6032] ? up_write+0x25/0xc0 [ 144.795952][ T6032] __kernfs_new_node+0x6a/0x340 [ 144.800987][ T6032] ? make_kgid+0x127/0x180 [ 144.805406][ T6032] ? net_ns_get_ownership+0xaa/0xc0 [ 144.810596][ T6032] ? net_namespace+0x20/0x20 [ 144.815180][ T6032] kernfs_create_dir_ns+0x5e/0x140 [ 144.820297][ T6032] internal_create_group+0x13e/0x840 [ 144.825601][ T6032] ? internal_create_group+0x7b9/0x840 [ 144.831147][ T6032] sysfs_create_group+0x1b/0x20 [ 144.836005][ T6032] dpm_sysfs_add+0x43/0x1d0 [ 144.840539][ T6032] device_add+0x9b6/0xf40 [ 144.844866][ T6032] netdev_register_kobject+0xfd/0x230 [ 144.850287][ T6032] register_netdevice+0xba5/0x10b0 [ 144.855392][ T6032] hsr_dev_finalize+0x2da/0x460 [ 144.860221][ T6032] hsr_newlink+0x40d/0x450 [ 144.864621][ T6032] ? hsr_get_node_list+0x450/0x450 [ 144.869790][ T6032] rtnl_newlink+0xdae/0x13b0 [ 144.874535][ T6032] ? __rcu_read_unlock+0x5c/0x290 [ 144.879553][ T6032] ? rtnl_setlink+0x2a0/0x2a0 [ 144.884277][ T6032] rtnetlink_rcv_msg+0x745/0x7e0 [ 144.889205][ T6032] ? ___cache_free+0x46/0x300 [ 144.893873][ T6032] ? kmem_cache_free+0x65/0x110 [ 144.898710][ T6032] ? __kfree_skb+0xfe/0x150 [ 144.903274][ T6032] ? consume_skb+0x48/0x160 [ 144.907757][ T6032] ? nlmon_xmit+0x5f/0x70 [ 144.912085][ T6032] ? __this_cpu_preempt_check+0x18/0x20 [ 144.917661][ T6032] ? __local_bh_enable_ip+0x4d/0x70 [ 144.922839][ T6032] ? local_bh_enable+0x1b/0x20 [ 144.927582][ T6032] ? __dev_queue_xmit+0x597/0xf70 [ 144.932584][ T6032] ? __skb_clone+0x2db/0x300 [ 144.937197][ T6032] ? __rcu_read_unlock+0x5c/0x290 [ 144.942256][ T6032] netlink_rcv_skb+0x14e/0x250 [ 144.947079][ T6032] ? rtnetlink_bind+0x60/0x60 [ 144.951782][ T6032] rtnetlink_rcv+0x18/0x20 [ 144.956188][ T6032] netlink_unicast+0x5fc/0x6c0 [ 144.961037][ T6032] netlink_sendmsg+0x6e1/0x7d0 [ 144.965836][ T6032] ? netlink_getsockopt+0x720/0x720 [ 144.971025][ T6032] ____sys_sendmsg+0x39a/0x510 [ 144.975842][ T6032] __sys_sendmsg+0x195/0x230 [ 144.980487][ T6032] __x64_sys_sendmsg+0x42/0x50 [ 144.985257][ T6032] do_syscall_64+0x44/0xd0 [ 144.989679][ T6032] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 144.995643][ T6032] RIP: 0033:0x7ffb90e2cae9 [ 145.000112][ T6032] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 23:48:47 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 89) [ 145.019844][ T6032] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 145.028270][ T6032] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 145.036313][ T6032] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 145.044333][ T6032] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 145.052386][ T6032] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 145.060341][ T6032] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 145.068299][ T6032] 23:48:47 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x4000, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xb00, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:47 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xb00, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 145.135666][ T6046] FAULT_INJECTION: forcing a failure. [ 145.135666][ T6046] name failslab, interval 1, probability 0, space 0, times 0 [ 145.148794][ T6046] CPU: 0 PID: 6046 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 145.157466][ T6046] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 145.167512][ T6046] Call Trace: [ 145.170786][ T6046] [ 145.173712][ T6046] dump_stack_lvl+0xd6/0x122 [ 145.178445][ T6046] dump_stack+0x11/0x1b [ 145.182583][ T6046] should_fail+0x23c/0x250 [ 145.186988][ T6046] ? __kernfs_new_node+0x6a/0x340 [ 145.192008][ T6046] __should_failslab+0x81/0x90 [ 145.196764][ T6046] should_failslab+0x5/0x20 [ 145.201248][ T6046] kmem_cache_alloc+0x4f/0x320 [ 145.205997][ T6046] ? __down_write_common+0x42/0x860 [ 145.211194][ T6046] __kernfs_new_node+0x6a/0x340 [ 145.216037][ T6046] ? up_write+0x25/0xc0 [ 145.220254][ T6046] kernfs_new_node+0x5b/0xd0 [ 145.224907][ T6046] __kernfs_create_file+0x45/0x1a0 [ 145.230024][ T6046] ? dev_attr_show+0x90/0x90 [ 145.234659][ T6046] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 145.240022][ T6046] sysfs_merge_group+0xc3/0x1a0 [ 145.244861][ T6046] dpm_sysfs_add+0x9d/0x1d0 [ 145.249409][ T6046] device_add+0x9b6/0xf40 [ 145.253749][ T6046] netdev_register_kobject+0xfd/0x230 [ 145.259113][ T6046] register_netdevice+0xba5/0x10b0 [ 145.264218][ T6046] hsr_dev_finalize+0x2da/0x460 [ 145.269064][ T6046] hsr_newlink+0x40d/0x450 [ 145.273461][ T6046] ? hsr_get_node_list+0x450/0x450 [ 145.278551][ T6046] rtnl_newlink+0xdae/0x13b0 [ 145.283127][ T6046] ? __rcu_read_unlock+0x5c/0x290 [ 145.288175][ T6046] ? rtnl_setlink+0x2a0/0x2a0 [ 145.292843][ T6046] rtnetlink_rcv_msg+0x745/0x7e0 [ 145.297786][ T6046] ? ___cache_free+0x46/0x300 [ 145.302448][ T6046] ? kmem_cache_free+0x65/0x110 [ 145.307291][ T6046] ? __kfree_skb+0xfe/0x150 [ 145.311921][ T6046] ? consume_skb+0x48/0x160 [ 145.316428][ T6046] ? nlmon_xmit+0x5f/0x70 [ 145.320752][ T6046] ? __this_cpu_preempt_check+0x18/0x20 [ 145.326302][ T6046] ? __local_bh_enable_ip+0x4d/0x70 [ 145.331560][ T6046] ? local_bh_enable+0x1b/0x20 [ 145.336304][ T6046] ? __dev_queue_xmit+0x597/0xf70 [ 145.341464][ T6046] ? __skb_clone+0x2db/0x300 [ 145.346103][ T6046] ? __rcu_read_unlock+0x5c/0x290 [ 145.351111][ T6046] netlink_rcv_skb+0x14e/0x250 [ 145.355922][ T6046] ? rtnetlink_bind+0x60/0x60 [ 145.360641][ T6046] rtnetlink_rcv+0x18/0x20 [ 145.365107][ T6046] netlink_unicast+0x5fc/0x6c0 [ 145.369880][ T6046] netlink_sendmsg+0x6e1/0x7d0 [ 145.374646][ T6046] ? netlink_getsockopt+0x720/0x720 [ 145.379909][ T6046] ____sys_sendmsg+0x39a/0x510 [ 145.384728][ T6046] __sys_sendmsg+0x195/0x230 [ 145.389422][ T6046] __x64_sys_sendmsg+0x42/0x50 [ 145.394280][ T6046] do_syscall_64+0x44/0xd0 [ 145.398674][ T6046] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 145.404612][ T6046] RIP: 0033:0x7ffb90e2cae9 [ 145.409028][ T6046] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 145.428619][ T6046] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 23:48:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 90) 23:48:48 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x300, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) [ 145.437118][ T6046] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 145.445082][ T6046] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 145.453030][ T6046] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 145.461048][ T6046] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 145.469030][ T6046] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 145.476989][ T6046] 23:48:48 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x900, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:48 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x4788, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) [ 145.536174][ T6054] FAULT_INJECTION: forcing a failure. [ 145.536174][ T6054] name failslab, interval 1, probability 0, space 0, times 0 [ 145.548819][ T6054] CPU: 0 PID: 6054 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 145.557531][ T6054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 145.567576][ T6054] Call Trace: [ 145.570835][ T6054] [ 145.573745][ T6054] dump_stack_lvl+0xd6/0x122 [ 145.578326][ T6054] dump_stack+0x11/0x1b [ 145.582460][ T6054] should_fail+0x23c/0x250 [ 145.587030][ T6054] ? __kernfs_new_node+0x6a/0x340 [ 145.592034][ T6054] __should_failslab+0x81/0x90 [ 145.596783][ T6054] should_failslab+0x5/0x20 [ 145.601321][ T6054] kmem_cache_alloc+0x4f/0x320 [ 145.606078][ T6054] ? __down_write_common+0x42/0x860 [ 145.611358][ T6054] __kernfs_new_node+0x6a/0x340 [ 145.616189][ T6054] ? up_write+0x25/0xc0 [ 145.620327][ T6054] kernfs_new_node+0x5b/0xd0 [ 145.624945][ T6054] __kernfs_create_file+0x45/0x1a0 [ 145.630130][ T6054] ? dev_attr_show+0x90/0x90 [ 145.634782][ T6054] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 145.640184][ T6054] sysfs_merge_group+0xc3/0x1a0 [ 145.645180][ T6054] dpm_sysfs_add+0x9d/0x1d0 [ 145.649707][ T6054] device_add+0x9b6/0xf40 [ 145.654039][ T6054] netdev_register_kobject+0xfd/0x230 [ 145.659459][ T6054] register_netdevice+0xba5/0x10b0 [ 145.664581][ T6054] hsr_dev_finalize+0x2da/0x460 [ 145.669416][ T6054] hsr_newlink+0x40d/0x450 [ 145.673821][ T6054] ? hsr_get_node_list+0x450/0x450 [ 145.678911][ T6054] rtnl_newlink+0xdae/0x13b0 [ 145.683519][ T6054] ? rtnl_setlink+0x2a0/0x2a0 [ 145.688186][ T6054] rtnetlink_rcv_msg+0x745/0x7e0 [ 145.693106][ T6054] ? ___cache_free+0x46/0x300 [ 145.697806][ T6054] ? __rcu_read_unlock+0x5c/0x290 [ 145.702874][ T6054] ? kmem_cache_free+0x65/0x110 [ 145.707700][ T6054] ? __kfree_skb+0xfe/0x150 [ 145.712181][ T6054] ? consume_skb+0x48/0x160 [ 145.716699][ T6054] ? nlmon_xmit+0x5f/0x70 [ 145.721070][ T6054] ? __this_cpu_preempt_check+0x18/0x20 [ 145.726612][ T6054] ? __local_bh_enable_ip+0x4d/0x70 [ 145.731848][ T6054] ? local_bh_enable+0x1b/0x20 [ 145.736644][ T6054] ? __dev_queue_xmit+0x597/0xf70 [ 145.741651][ T6054] ? __skb_clone+0x2db/0x300 [ 145.746281][ T6054] ? __rcu_read_unlock+0x5c/0x290 [ 145.751289][ T6054] netlink_rcv_skb+0x14e/0x250 [ 145.756032][ T6054] ? rtnetlink_bind+0x60/0x60 [ 145.760711][ T6054] rtnetlink_rcv+0x18/0x20 [ 145.765134][ T6054] netlink_unicast+0x5fc/0x6c0 [ 145.769961][ T6054] netlink_sendmsg+0x6e1/0x7d0 [ 145.774865][ T6054] ? netlink_getsockopt+0x720/0x720 [ 145.780048][ T6054] ____sys_sendmsg+0x39a/0x510 [ 145.784806][ T6054] __sys_sendmsg+0x195/0x230 [ 145.789536][ T6054] __x64_sys_sendmsg+0x42/0x50 [ 145.794287][ T6054] do_syscall_64+0x44/0xd0 [ 145.798701][ T6054] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 145.804611][ T6054] RIP: 0033:0x7ffb90e2cae9 [ 145.809062][ T6054] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 145.828647][ T6054] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 145.837036][ T6054] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 145.845082][ T6054] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 145.853052][ T6054] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 145.861114][ T6054] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 145.869084][ T6054] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 145.877039][ T6054] 23:48:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xc00, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 91) 23:48:48 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xc00, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 145.948262][ T6067] FAULT_INJECTION: forcing a failure. [ 145.948262][ T6067] name failslab, interval 1, probability 0, space 0, times 0 [ 145.960928][ T6067] CPU: 0 PID: 6067 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 145.969628][ T6067] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 145.979662][ T6067] Call Trace: [ 145.982920][ T6067] [ 145.985829][ T6067] dump_stack_lvl+0xd6/0x122 [ 145.990473][ T6067] dump_stack+0x11/0x1b [ 145.994659][ T6067] should_fail+0x23c/0x250 [ 145.999114][ T6067] ? __kernfs_new_node+0x6a/0x340 [ 146.004122][ T6067] __should_failslab+0x81/0x90 [ 146.009041][ T6067] should_failslab+0x5/0x20 [ 146.013545][ T6067] kmem_cache_alloc+0x4f/0x320 [ 146.018287][ T6067] ? __down_write_common+0x42/0x860 [ 146.023527][ T6067] __kernfs_new_node+0x6a/0x340 [ 146.028419][ T6067] ? up_write+0x25/0xc0 [ 146.032554][ T6067] kernfs_new_node+0x5b/0xd0 [ 146.037141][ T6067] __kernfs_create_file+0x45/0x1a0 [ 146.042277][ T6067] ? dev_attr_show+0x90/0x90 [ 146.046965][ T6067] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 146.052342][ T6067] sysfs_merge_group+0xc3/0x1a0 [ 146.057296][ T6067] dpm_sysfs_add+0x9d/0x1d0 [ 146.061783][ T6067] device_add+0x9b6/0xf40 [ 146.066162][ T6067] netdev_register_kobject+0xfd/0x230 [ 146.071593][ T6067] register_netdevice+0xba5/0x10b0 [ 146.076721][ T6067] hsr_dev_finalize+0x2da/0x460 [ 146.081552][ T6067] hsr_newlink+0x40d/0x450 [ 146.085994][ T6067] ? hsr_get_node_list+0x450/0x450 [ 146.091118][ T6067] rtnl_newlink+0xdae/0x13b0 [ 146.095830][ T6067] ? __rcu_read_unlock+0x5c/0x290 [ 146.100833][ T6067] ? rtnl_setlink+0x2a0/0x2a0 [ 146.105496][ T6067] rtnetlink_rcv_msg+0x745/0x7e0 [ 146.110444][ T6067] ? ___cache_free+0x46/0x300 [ 146.115127][ T6067] ? kmem_cache_free+0x65/0x110 [ 146.119978][ T6067] ? __kfree_skb+0xfe/0x150 [ 146.124531][ T6067] ? consume_skb+0x48/0x160 [ 146.129036][ T6067] ? nlmon_xmit+0x5f/0x70 [ 146.133364][ T6067] ? __this_cpu_preempt_check+0x18/0x20 [ 146.138908][ T6067] ? __local_bh_enable_ip+0x4d/0x70 [ 146.144083][ T6067] ? local_bh_enable+0x1b/0x20 [ 146.148825][ T6067] ? __dev_queue_xmit+0x597/0xf70 [ 146.153864][ T6067] ? __skb_clone+0x2db/0x300 [ 146.158475][ T6067] ? __rcu_read_unlock+0x5c/0x290 [ 146.163498][ T6067] netlink_rcv_skb+0x14e/0x250 [ 146.168244][ T6067] ? rtnetlink_bind+0x60/0x60 [ 146.172899][ T6067] rtnetlink_rcv+0x18/0x20 [ 146.177308][ T6067] netlink_unicast+0x5fc/0x6c0 [ 146.182058][ T6067] netlink_sendmsg+0x6e1/0x7d0 [ 146.186889][ T6067] ? netlink_getsockopt+0x720/0x720 [ 146.192072][ T6067] ____sys_sendmsg+0x39a/0x510 [ 146.196847][ T6067] __sys_sendmsg+0x195/0x230 [ 146.201458][ T6067] __x64_sys_sendmsg+0x42/0x50 [ 146.206262][ T6067] do_syscall_64+0x44/0xd0 [ 146.210656][ T6067] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 146.216541][ T6067] RIP: 0033:0x7ffb90e2cae9 [ 146.220994][ T6067] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 146.240666][ T6067] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 23:48:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 92) 23:48:48 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xa00, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 146.249127][ T6067] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 146.257114][ T6067] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 146.265071][ T6067] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 146.273029][ T6067] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 146.280991][ T6067] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 146.289018][ T6067] 23:48:48 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x38d, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:48 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x4800, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) [ 146.343363][ T6075] FAULT_INJECTION: forcing a failure. [ 146.343363][ T6075] name failslab, interval 1, probability 0, space 0, times 0 [ 146.356022][ T6075] CPU: 0 PID: 6075 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 146.364692][ T6075] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 146.374775][ T6075] Call Trace: [ 146.378031][ T6075] [ 146.380940][ T6075] dump_stack_lvl+0xd6/0x122 [ 146.385550][ T6075] dump_stack+0x11/0x1b [ 146.389683][ T6075] should_fail+0x23c/0x250 [ 146.394084][ T6075] ? __kernfs_new_node+0x6a/0x340 [ 146.399189][ T6075] __should_failslab+0x81/0x90 [ 146.404036][ T6075] should_failslab+0x5/0x20 [ 146.408518][ T6075] kmem_cache_alloc+0x4f/0x320 [ 146.413277][ T6075] ? __down_write_common+0x42/0x860 [ 146.418557][ T6075] __kernfs_new_node+0x6a/0x340 [ 146.423988][ T6075] ? up_write+0x25/0xc0 [ 146.428179][ T6075] kernfs_new_node+0x5b/0xd0 [ 146.432750][ T6075] __kernfs_create_file+0x45/0x1a0 [ 146.437877][ T6075] ? dev_attr_show+0x90/0x90 [ 146.442461][ T6075] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 146.447841][ T6075] sysfs_merge_group+0xc3/0x1a0 [ 146.452772][ T6075] dpm_sysfs_add+0x9d/0x1d0 [ 146.457386][ T6075] device_add+0x9b6/0xf40 [ 146.461710][ T6075] netdev_register_kobject+0xfd/0x230 [ 146.467103][ T6075] register_netdevice+0xba5/0x10b0 [ 146.472220][ T6075] hsr_dev_finalize+0x2da/0x460 [ 146.477212][ T6075] hsr_newlink+0x40d/0x450 [ 146.481650][ T6075] ? hsr_get_node_list+0x450/0x450 [ 146.486747][ T6075] rtnl_newlink+0xdae/0x13b0 [ 146.491329][ T6075] ? __rcu_read_unlock+0x5c/0x290 [ 146.496330][ T6075] ? rtnl_setlink+0x2a0/0x2a0 [ 146.501034][ T6075] rtnetlink_rcv_msg+0x745/0x7e0 [ 146.506010][ T6075] ? ___cache_free+0x46/0x300 [ 146.510669][ T6075] ? kmem_cache_free+0x65/0x110 [ 146.515498][ T6075] ? __kfree_skb+0xfe/0x150 [ 146.520048][ T6075] ? consume_skb+0x48/0x160 [ 146.524563][ T6075] ? nlmon_xmit+0x5f/0x70 [ 146.528896][ T6075] ? __this_cpu_preempt_check+0x18/0x20 [ 146.534446][ T6075] ? __local_bh_enable_ip+0x4d/0x70 [ 146.539776][ T6075] ? local_bh_enable+0x1b/0x20 [ 146.544625][ T6075] ? __dev_queue_xmit+0x597/0xf70 [ 146.549628][ T6075] ? __skb_clone+0x2db/0x300 [ 146.554295][ T6075] ? __rcu_read_unlock+0x5c/0x290 [ 146.559308][ T6075] netlink_rcv_skb+0x14e/0x250 [ 146.564142][ T6075] ? rtnetlink_bind+0x60/0x60 [ 146.568824][ T6075] rtnetlink_rcv+0x18/0x20 [ 146.573234][ T6075] netlink_unicast+0x5fc/0x6c0 [ 146.578009][ T6075] netlink_sendmsg+0x6e1/0x7d0 [ 146.582760][ T6075] ? netlink_getsockopt+0x720/0x720 [ 146.588031][ T6075] ____sys_sendmsg+0x39a/0x510 [ 146.592789][ T6075] __sys_sendmsg+0x195/0x230 [ 146.597414][ T6075] __x64_sys_sendmsg+0x42/0x50 [ 146.602163][ T6075] do_syscall_64+0x44/0xd0 [ 146.606675][ T6075] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 146.612646][ T6075] RIP: 0033:0x7ffb90e2cae9 [ 146.617078][ T6075] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 23:48:49 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 93) [ 146.636674][ T6075] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 146.645105][ T6075] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 146.653067][ T6075] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 146.661062][ T6075] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 146.669039][ T6075] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 146.676998][ T6075] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 146.684965][ T6075] 23:48:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xd00, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:49 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xd00, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 146.739473][ T6086] FAULT_INJECTION: forcing a failure. [ 146.739473][ T6086] name failslab, interval 1, probability 0, space 0, times 0 [ 146.752111][ T6086] CPU: 1 PID: 6086 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 146.760781][ T6086] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 146.770835][ T6086] Call Trace: [ 146.774104][ T6086] [ 146.777017][ T6086] dump_stack_lvl+0xd6/0x122 [ 146.781643][ T6086] dump_stack+0x11/0x1b [ 146.785796][ T6086] should_fail+0x23c/0x250 [ 146.790303][ T6086] ? __kernfs_new_node+0x6a/0x340 [ 146.795309][ T6086] __should_failslab+0x81/0x90 [ 146.800221][ T6086] should_failslab+0x5/0x20 [ 146.804844][ T6086] kmem_cache_alloc+0x4f/0x320 [ 146.809632][ T6086] ? __down_write_common+0x42/0x860 [ 146.814827][ T6086] __kernfs_new_node+0x6a/0x340 [ 146.819714][ T6086] ? up_write+0x25/0xc0 [ 146.823861][ T6086] kernfs_new_node+0x5b/0xd0 [ 146.828523][ T6086] __kernfs_create_file+0x45/0x1a0 [ 146.833695][ T6086] ? dev_attr_show+0x90/0x90 [ 146.838265][ T6086] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 146.843678][ T6086] sysfs_merge_group+0xc3/0x1a0 [ 146.848524][ T6086] dpm_sysfs_add+0x9d/0x1d0 [ 146.853047][ T6086] device_add+0x9b6/0xf40 [ 146.857407][ T6086] netdev_register_kobject+0xfd/0x230 [ 146.862754][ T6086] register_netdevice+0xba5/0x10b0 [ 146.867895][ T6086] hsr_dev_finalize+0x2da/0x460 [ 146.872729][ T6086] hsr_newlink+0x40d/0x450 [ 146.877221][ T6086] ? hsr_get_node_list+0x450/0x450 [ 146.882382][ T6086] rtnl_newlink+0xdae/0x13b0 [ 146.887121][ T6086] ? __rcu_read_unlock+0x5c/0x290 [ 146.892219][ T6086] ? rtnl_setlink+0x2a0/0x2a0 [ 146.896955][ T6086] rtnetlink_rcv_msg+0x745/0x7e0 [ 146.901955][ T6086] ? ___cache_free+0x46/0x300 [ 146.906702][ T6086] ? kmem_cache_free+0x65/0x110 [ 146.911549][ T6086] ? __kfree_skb+0xfe/0x150 [ 146.916052][ T6086] ? consume_skb+0x48/0x160 [ 146.920658][ T6086] ? nlmon_xmit+0x5f/0x70 [ 146.924983][ T6086] ? __this_cpu_preempt_check+0x18/0x20 [ 146.930511][ T6086] ? __local_bh_enable_ip+0x4d/0x70 [ 146.935779][ T6086] ? local_bh_enable+0x1b/0x20 [ 146.940613][ T6086] ? __dev_queue_xmit+0x597/0xf70 [ 146.945637][ T6086] ? __skb_clone+0x2db/0x300 [ 146.950227][ T6086] ? __rcu_read_unlock+0x5c/0x290 [ 146.955355][ T6086] netlink_rcv_skb+0x14e/0x250 [ 146.960305][ T6086] ? rtnetlink_bind+0x60/0x60 [ 146.965065][ T6086] rtnetlink_rcv+0x18/0x20 [ 146.969461][ T6086] netlink_unicast+0x5fc/0x6c0 [ 146.974212][ T6086] netlink_sendmsg+0x6e1/0x7d0 [ 146.979000][ T6086] ? netlink_getsockopt+0x720/0x720 [ 146.984196][ T6086] ____sys_sendmsg+0x39a/0x510 [ 146.989003][ T6086] __sys_sendmsg+0x195/0x230 [ 146.993719][ T6086] __x64_sys_sendmsg+0x42/0x50 [ 146.998476][ T6086] do_syscall_64+0x44/0xd0 [ 147.002902][ T6086] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 147.008786][ T6086] RIP: 0033:0x7ffb90e2cae9 [ 147.013183][ T6086] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 147.032792][ T6086] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 23:48:49 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xb00, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:49 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 94) [ 147.041193][ T6086] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 147.049143][ T6086] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 147.057161][ T6086] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 147.065115][ T6086] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 147.073062][ T6086] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 147.081072][ T6086] 23:48:49 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x396, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:49 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x4888, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) [ 147.146372][ T6097] FAULT_INJECTION: forcing a failure. [ 147.146372][ T6097] name failslab, interval 1, probability 0, space 0, times 0 [ 147.159175][ T6097] CPU: 1 PID: 6097 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 147.167881][ T6097] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 147.177958][ T6097] Call Trace: [ 147.181259][ T6097] [ 147.184170][ T6097] dump_stack_lvl+0xd6/0x122 [ 147.188809][ T6097] dump_stack+0x11/0x1b [ 147.193055][ T6097] should_fail+0x23c/0x250 [ 147.197475][ T6097] ? kobject_uevent_env+0x1a7/0xc40 [ 147.202747][ T6097] __should_failslab+0x81/0x90 [ 147.207548][ T6097] should_failslab+0x5/0x20 [ 147.212046][ T6097] kmem_cache_alloc_trace+0x52/0x350 [ 147.217307][ T6097] ? __kernfs_create_file+0x189/0x1a0 [ 147.222753][ T6097] ? dev_uevent_filter+0x70/0x70 [ 147.227828][ T6097] kobject_uevent_env+0x1a7/0xc40 [ 147.232838][ T6097] ? kernfs_put+0x39/0x300 [ 147.237258][ T6097] ? _raw_spin_unlock_irq+0x2f/0x50 [ 147.242816][ T6097] ? device_pm_check_callbacks+0x626/0x640 [ 147.248844][ T6097] ? __list_add_valid+0x28/0x90 [ 147.253679][ T6097] kobject_uevent+0x18/0x20 [ 147.258182][ T6097] device_add+0xa9e/0xf40 [ 147.262499][ T6097] netdev_register_kobject+0xfd/0x230 [ 147.267904][ T6097] register_netdevice+0xba5/0x10b0 [ 147.273032][ T6097] hsr_dev_finalize+0x2da/0x460 [ 147.277870][ T6097] hsr_newlink+0x40d/0x450 [ 147.282322][ T6097] ? hsr_get_node_list+0x450/0x450 [ 147.287441][ T6097] rtnl_newlink+0xdae/0x13b0 [ 147.292180][ T6097] ? rb_insert_color+0x2fa/0x310 [ 147.297183][ T6097] ? rtnl_setlink+0x2a0/0x2a0 [ 147.301973][ T6097] rtnetlink_rcv_msg+0x745/0x7e0 [ 147.306894][ T6097] ? ___cache_free+0x46/0x300 [ 147.311564][ T6097] ? kmem_cache_free+0x65/0x110 [ 147.316438][ T6097] ? __kfree_skb+0xfe/0x150 [ 147.320930][ T6097] ? consume_skb+0x48/0x160 [ 147.325423][ T6097] ? nlmon_xmit+0x5f/0x70 [ 147.329737][ T6097] ? __this_cpu_preempt_check+0x18/0x20 [ 147.335266][ T6097] ? __local_bh_enable_ip+0x4d/0x70 [ 147.340632][ T6097] ? local_bh_enable+0x1b/0x20 [ 147.345491][ T6097] ? __dev_queue_xmit+0x597/0xf70 [ 147.350549][ T6097] ? __skb_clone+0x2db/0x300 [ 147.355196][ T6097] ? __rcu_read_unlock+0x5c/0x290 [ 147.360232][ T6097] netlink_rcv_skb+0x14e/0x250 [ 147.364999][ T6097] ? rtnetlink_bind+0x60/0x60 [ 147.369744][ T6097] rtnetlink_rcv+0x18/0x20 [ 147.374165][ T6097] netlink_unicast+0x5fc/0x6c0 [ 147.379041][ T6097] netlink_sendmsg+0x6e1/0x7d0 [ 147.383793][ T6097] ? netlink_getsockopt+0x720/0x720 [ 147.389023][ T6097] ____sys_sendmsg+0x39a/0x510 [ 147.393812][ T6097] __sys_sendmsg+0x195/0x230 [ 147.398522][ T6097] __x64_sys_sendmsg+0x42/0x50 [ 147.403279][ T6097] do_syscall_64+0x44/0xd0 [ 147.407750][ T6097] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 147.413636][ T6097] RIP: 0033:0x7ffb90e2cae9 [ 147.418106][ T6097] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 147.437747][ T6097] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 23:48:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xe00, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 147.446591][ T6097] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 147.454555][ T6097] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 147.462508][ T6097] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 147.470462][ T6097] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 147.478437][ T6097] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 147.486700][ T6097] 23:48:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xe00, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:50 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xc00, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:50 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x4a00, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:50 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 95) [ 147.623730][ T6119] FAULT_INJECTION: forcing a failure. [ 147.623730][ T6119] name failslab, interval 1, probability 0, space 0, times 0 [ 147.636411][ T6119] CPU: 0 PID: 6119 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 147.645177][ T6119] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 147.655269][ T6119] Call Trace: [ 147.658561][ T6119] [ 147.661484][ T6119] dump_stack_lvl+0xd6/0x122 [ 147.666080][ T6119] dump_stack+0x11/0x1b [ 147.670308][ T6119] should_fail+0x23c/0x250 [ 147.674722][ T6119] ? kzalloc+0x1d/0x30 [ 147.678952][ T6119] __should_failslab+0x81/0x90 [ 147.683752][ T6119] should_failslab+0x5/0x20 [ 147.688321][ T6119] __kmalloc+0x6f/0x370 [ 147.692471][ T6119] kzalloc+0x1d/0x30 [ 147.696371][ T6119] kobject_get_path+0x7c/0x110 [ 147.701179][ T6119] kobject_uevent_env+0x1be/0xc40 [ 147.706214][ T6119] ? kernfs_put+0x39/0x300 [ 147.710657][ T6119] ? _raw_spin_unlock_irq+0x2f/0x50 [ 147.715852][ T6119] ? device_pm_check_callbacks+0x626/0x640 [ 147.721663][ T6119] ? __list_add_valid+0x28/0x90 [ 147.726561][ T6119] kobject_uevent+0x18/0x20 [ 147.731051][ T6119] device_add+0xa9e/0xf40 [ 147.735451][ T6119] netdev_register_kobject+0xfd/0x230 [ 147.740805][ T6119] register_netdevice+0xba5/0x10b0 [ 147.745960][ T6119] hsr_dev_finalize+0x2da/0x460 [ 147.750815][ T6119] hsr_newlink+0x40d/0x450 [ 147.755212][ T6119] ? hsr_get_node_list+0x450/0x450 [ 147.760316][ T6119] rtnl_newlink+0xdae/0x13b0 [ 147.764913][ T6119] ? __rcu_read_unlock+0x5c/0x290 [ 147.769927][ T6119] ? rtnl_setlink+0x2a0/0x2a0 [ 147.774586][ T6119] rtnetlink_rcv_msg+0x745/0x7e0 [ 147.779521][ T6119] ? ___cache_free+0x46/0x300 [ 147.784219][ T6119] ? save_fpregs_to_fpstate+0xf5/0x140 [ 147.789669][ T6119] ? kmem_cache_free+0x65/0x110 [ 147.794639][ T6119] ? __kfree_skb+0xfe/0x150 [ 147.799152][ T6119] ? consume_skb+0x48/0x160 [ 147.803660][ T6119] ? nlmon_xmit+0x5f/0x70 [ 147.808018][ T6119] ? __this_cpu_preempt_check+0x18/0x20 [ 147.813565][ T6119] ? __local_bh_enable_ip+0x4d/0x70 [ 147.818749][ T6119] ? local_bh_enable+0x1b/0x20 [ 147.823508][ T6119] ? __dev_queue_xmit+0x597/0xf70 [ 147.828563][ T6119] ? __skb_clone+0x2db/0x300 [ 147.833314][ T6119] ? __rcu_read_unlock+0x5c/0x290 [ 147.838321][ T6119] netlink_rcv_skb+0x14e/0x250 [ 147.843508][ T6119] ? rtnetlink_bind+0x60/0x60 [ 147.848171][ T6119] rtnetlink_rcv+0x18/0x20 [ 147.852676][ T6119] netlink_unicast+0x5fc/0x6c0 [ 147.857445][ T6119] netlink_sendmsg+0x6e1/0x7d0 [ 147.862207][ T6119] ? netlink_getsockopt+0x720/0x720 [ 147.867456][ T6119] ____sys_sendmsg+0x39a/0x510 [ 147.872246][ T6119] __sys_sendmsg+0x195/0x230 [ 147.876828][ T6119] __x64_sys_sendmsg+0x42/0x50 [ 147.881592][ T6119] do_syscall_64+0x44/0xd0 [ 147.885991][ T6119] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 147.891945][ T6119] RIP: 0033:0x7ffb90e2cae9 [ 147.896338][ T6119] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 147.916135][ T6119] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 23:48:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf00, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:50 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xd00, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xe01, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 147.924540][ T6119] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 147.932506][ T6119] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 147.940466][ T6119] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 147.948493][ T6119] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 147.956452][ T6119] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 147.964414][ T6119] 23:48:50 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x3a8, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:50 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x4c00, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:50 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 96) [ 148.044854][ T6133] FAULT_INJECTION: forcing a failure. [ 148.044854][ T6133] name failslab, interval 1, probability 0, space 0, times 0 [ 148.057625][ T6133] CPU: 0 PID: 6133 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 148.066299][ T6133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 148.076335][ T6133] Call Trace: [ 148.079657][ T6133] [ 148.082635][ T6133] dump_stack_lvl+0xd6/0x122 [ 148.087207][ T6133] dump_stack+0x11/0x1b [ 148.091338][ T6133] should_fail+0x23c/0x250 [ 148.095849][ T6133] __should_failslab+0x81/0x90 [ 148.100597][ T6133] should_failslab+0x5/0x20 [ 148.105111][ T6133] kmem_cache_alloc_node+0x61/0x2d0 [ 148.110323][ T6133] ? __alloc_skb+0xf0/0x450 [ 148.114892][ T6133] __alloc_skb+0xf0/0x450 [ 148.119282][ T6133] alloc_uevent_skb+0x5b/0x120 [ 148.124050][ T6133] kobject_uevent_env+0x726/0xc40 [ 148.129072][ T6133] ? _raw_spin_unlock_irq+0x2f/0x50 [ 148.134257][ T6133] ? device_pm_check_callbacks+0x626/0x640 [ 148.140040][ T6133] ? __list_add_valid+0x28/0x90 [ 148.144935][ T6133] kobject_uevent+0x18/0x20 [ 148.149577][ T6133] device_add+0xa9e/0xf40 [ 148.153913][ T6133] netdev_register_kobject+0xfd/0x230 [ 148.159343][ T6133] register_netdevice+0xba5/0x10b0 [ 148.164550][ T6133] hsr_dev_finalize+0x2da/0x460 [ 148.169422][ T6133] hsr_newlink+0x40d/0x450 [ 148.173832][ T6133] ? hsr_get_node_list+0x450/0x450 [ 148.178990][ T6133] rtnl_newlink+0xdae/0x13b0 [ 148.183584][ T6133] ? __rcu_read_unlock+0x5c/0x290 [ 148.188618][ T6133] ? rtnl_setlink+0x2a0/0x2a0 [ 148.193285][ T6133] rtnetlink_rcv_msg+0x745/0x7e0 [ 148.198857][ T6133] ? ___cache_free+0x46/0x300 [ 148.203516][ T6133] ? kmem_cache_free+0x65/0x110 [ 148.208363][ T6133] ? __kfree_skb+0xfe/0x150 [ 148.213113][ T6133] ? consume_skb+0x48/0x160 [ 148.217717][ T6133] ? nlmon_xmit+0x5f/0x70 [ 148.222039][ T6133] ? __this_cpu_preempt_check+0x18/0x20 [ 148.227603][ T6133] ? __local_bh_enable_ip+0x4d/0x70 [ 148.232802][ T6133] ? local_bh_enable+0x1b/0x20 [ 148.237543][ T6133] ? __dev_queue_xmit+0x597/0xf70 [ 148.242911][ T6133] ? __skb_clone+0x2db/0x300 [ 148.247481][ T6133] ? __rcu_read_unlock+0x5c/0x290 [ 148.252487][ T6133] netlink_rcv_skb+0x14e/0x250 [ 148.257245][ T6133] ? rtnetlink_bind+0x60/0x60 [ 148.261909][ T6133] rtnetlink_rcv+0x18/0x20 [ 148.266343][ T6133] netlink_unicast+0x5fc/0x6c0 [ 148.271155][ T6133] netlink_sendmsg+0x6e1/0x7d0 [ 148.275903][ T6133] ? netlink_getsockopt+0x720/0x720 [ 148.281118][ T6133] ____sys_sendmsg+0x39a/0x510 [ 148.285978][ T6133] __sys_sendmsg+0x195/0x230 [ 148.290564][ T6133] __x64_sys_sendmsg+0x42/0x50 [ 148.295322][ T6133] do_syscall_64+0x44/0xd0 [ 148.299766][ T6133] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 148.305641][ T6133] RIP: 0033:0x7ffb90e2cae9 [ 148.310035][ T6133] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 148.329889][ T6133] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 148.338299][ T6133] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 23:48:50 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xe00, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf00, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 148.346252][ T6133] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 148.354302][ T6133] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 148.362323][ T6133] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 148.370282][ T6133] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 148.378247][ T6133] 23:48:50 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x5600, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x1100, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:51 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 97) 23:48:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf00, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 148.494184][ T6149] FAULT_INJECTION: forcing a failure. [ 148.494184][ T6149] name failslab, interval 1, probability 0, space 0, times 0 [ 148.506830][ T6149] CPU: 1 PID: 6149 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 148.515548][ T6149] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 148.525675][ T6149] Call Trace: [ 148.528949][ T6149] [ 148.531861][ T6149] dump_stack_lvl+0xd6/0x122 [ 148.536506][ T6149] dump_stack+0x11/0x1b [ 148.540675][ T6149] should_fail+0x23c/0x250 [ 148.545128][ T6149] __should_failslab+0x81/0x90 [ 148.549911][ T6149] should_failslab+0x5/0x20 [ 148.554392][ T6149] kmem_cache_alloc_node_trace+0x61/0x310 [ 148.560107][ T6149] ? __kmalloc_node_track_caller+0x30/0x40 [ 148.565960][ T6149] __kmalloc_node_track_caller+0x30/0x40 [ 148.571571][ T6149] ? alloc_uevent_skb+0x5b/0x120 [ 148.576581][ T6149] __alloc_skb+0x19d/0x450 [ 148.581004][ T6149] alloc_uevent_skb+0x5b/0x120 [ 148.585763][ T6149] kobject_uevent_env+0x726/0xc40 [ 148.590813][ T6149] ? _raw_spin_unlock_irq+0x2f/0x50 [ 148.596193][ T6149] ? device_pm_check_callbacks+0x626/0x640 [ 148.601985][ T6149] ? __list_add_valid+0x28/0x90 [ 148.606894][ T6149] kobject_uevent+0x18/0x20 [ 148.611432][ T6149] device_add+0xa9e/0xf40 [ 148.616020][ T6149] netdev_register_kobject+0xfd/0x230 [ 148.621373][ T6149] register_netdevice+0xba5/0x10b0 [ 148.626469][ T6149] hsr_dev_finalize+0x2da/0x460 [ 148.631425][ T6149] hsr_newlink+0x40d/0x450 [ 148.636018][ T6149] ? hsr_get_node_list+0x450/0x450 [ 148.641592][ T6149] rtnl_newlink+0xdae/0x13b0 [ 148.646163][ T6149] ? rb_insert_color+0x2fa/0x310 [ 148.651132][ T6149] ? rtnl_setlink+0x2a0/0x2a0 [ 148.655803][ T6149] rtnetlink_rcv_msg+0x745/0x7e0 [ 148.660723][ T6149] ? ___cache_free+0x46/0x300 [ 148.665490][ T6149] ? kmem_cache_free+0x65/0x110 [ 148.670322][ T6149] ? __kfree_skb+0xfe/0x150 [ 148.674906][ T6149] ? consume_skb+0x48/0x160 [ 148.679464][ T6149] ? nlmon_xmit+0x5f/0x70 [ 148.683773][ T6149] ? __this_cpu_preempt_check+0x18/0x20 [ 148.689420][ T6149] ? __local_bh_enable_ip+0x4d/0x70 [ 148.694635][ T6149] ? local_bh_enable+0x1b/0x20 [ 148.699377][ T6149] ? __dev_queue_xmit+0x597/0xf70 [ 148.704420][ T6149] ? __skb_clone+0x2db/0x300 [ 148.708994][ T6149] ? __rcu_read_unlock+0x5c/0x290 [ 148.714006][ T6149] netlink_rcv_skb+0x14e/0x250 [ 148.718961][ T6149] ? rtnetlink_bind+0x60/0x60 [ 148.723874][ T6149] rtnetlink_rcv+0x18/0x20 [ 148.728312][ T6149] netlink_unicast+0x5fc/0x6c0 [ 148.733193][ T6149] netlink_sendmsg+0x6e1/0x7d0 [ 148.737942][ T6149] ? netlink_getsockopt+0x720/0x720 [ 148.743136][ T6149] ____sys_sendmsg+0x39a/0x510 [ 148.747962][ T6149] __sys_sendmsg+0x195/0x230 [ 148.752537][ T6149] __x64_sys_sendmsg+0x42/0x50 [ 148.757283][ T6149] do_syscall_64+0x44/0xd0 [ 148.761684][ T6149] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 148.767580][ T6149] RIP: 0033:0x7ffb90e2cae9 [ 148.771977][ T6149] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 23:48:51 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x500, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) [ 148.791822][ T6149] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 148.800339][ T6149] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 148.808292][ T6149] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 148.816239][ T6149] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 148.824244][ T6149] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 148.832261][ T6149] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 148.840222][ T6149] 23:48:51 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x1100, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x1102, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:51 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x5865, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:51 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 98) 23:48:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x1100, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 148.959055][ T6168] FAULT_INJECTION: forcing a failure. [ 148.959055][ T6168] name failslab, interval 1, probability 0, space 0, times 0 [ 148.971757][ T6168] CPU: 0 PID: 6168 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 148.980460][ T6168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 148.990515][ T6168] Call Trace: [ 148.993777][ T6168] [ 148.996684][ T6168] dump_stack_lvl+0xd6/0x122 [ 149.001255][ T6168] dump_stack+0x11/0x1b [ 149.005387][ T6168] should_fail+0x23c/0x250 [ 149.009797][ T6168] ? kset_create_and_add+0x3a/0x180 [ 149.014992][ T6168] __should_failslab+0x81/0x90 [ 149.019743][ T6168] should_failslab+0x5/0x20 [ 149.024319][ T6168] kmem_cache_alloc_trace+0x52/0x350 [ 149.029671][ T6168] ? device_add+0x95f/0xf40 [ 149.034198][ T6168] kset_create_and_add+0x3a/0x180 [ 149.039242][ T6168] netdev_register_kobject+0x127/0x230 [ 149.044692][ T6168] register_netdevice+0xba5/0x10b0 [ 149.050005][ T6168] hsr_dev_finalize+0x2da/0x460 [ 149.054852][ T6168] hsr_newlink+0x40d/0x450 [ 149.059273][ T6168] ? hsr_get_node_list+0x450/0x450 [ 149.064513][ T6168] rtnl_newlink+0xdae/0x13b0 [ 149.069184][ T6168] ? __rcu_read_unlock+0x5c/0x290 [ 149.074196][ T6168] ? rtnl_setlink+0x2a0/0x2a0 [ 149.078908][ T6168] rtnetlink_rcv_msg+0x745/0x7e0 [ 149.083895][ T6168] ? ___cache_free+0x46/0x300 [ 149.088558][ T6168] ? kmem_cache_free+0x65/0x110 [ 149.093384][ T6168] ? __kfree_skb+0xfe/0x150 [ 149.097887][ T6168] ? consume_skb+0x48/0x160 [ 149.102403][ T6168] ? nlmon_xmit+0x5f/0x70 [ 149.106778][ T6168] ? __this_cpu_preempt_check+0x18/0x20 [ 149.112355][ T6168] ? __local_bh_enable_ip+0x4d/0x70 [ 149.117537][ T6168] ? local_bh_enable+0x1b/0x20 [ 149.122280][ T6168] ? __dev_queue_xmit+0x597/0xf70 [ 149.127285][ T6168] ? __skb_clone+0x2db/0x300 [ 149.131870][ T6168] ? __rcu_read_unlock+0x5c/0x290 [ 149.136869][ T6168] netlink_rcv_skb+0x14e/0x250 [ 149.141624][ T6168] ? rtnetlink_bind+0x60/0x60 [ 149.146346][ T6168] rtnetlink_rcv+0x18/0x20 [ 149.150758][ T6168] netlink_unicast+0x5fc/0x6c0 [ 149.155549][ T6168] netlink_sendmsg+0x6e1/0x7d0 [ 149.160294][ T6168] ? netlink_getsockopt+0x720/0x720 [ 149.165471][ T6168] ____sys_sendmsg+0x39a/0x510 [ 149.170238][ T6168] __sys_sendmsg+0x195/0x230 [ 149.174822][ T6168] __x64_sys_sendmsg+0x42/0x50 [ 149.179653][ T6168] do_syscall_64+0x44/0xd0 [ 149.184055][ T6168] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 149.190012][ T6168] RIP: 0033:0x7ffb90e2cae9 [ 149.194414][ T6168] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 149.214095][ T6168] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 149.222519][ T6168] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 149.230485][ T6168] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 149.238446][ T6168] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 149.246400][ T6168] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 23:48:51 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 99) 23:48:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x1200, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 149.254461][ T6168] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 149.262561][ T6168] [ 149.304267][ T6173] FAULT_INJECTION: forcing a failure. [ 149.304267][ T6173] name failslab, interval 1, probability 0, space 0, times 0 [ 149.317022][ T6173] CPU: 0 PID: 6173 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 149.325829][ T6173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 149.335915][ T6173] Call Trace: [ 149.339180][ T6173] [ 149.342095][ T6173] dump_stack_lvl+0xd6/0x122 [ 149.346679][ T6173] dump_stack+0x11/0x1b [ 149.350845][ T6173] should_fail+0x23c/0x250 [ 149.355273][ T6173] ? __kernfs_new_node+0x6a/0x340 [ 149.360380][ T6173] __should_failslab+0x81/0x90 [ 149.365143][ T6173] should_failslab+0x5/0x20 [ 149.369632][ T6173] kmem_cache_alloc+0x4f/0x320 [ 149.374404][ T6173] __kernfs_new_node+0x6a/0x340 [ 149.379240][ T6173] ? net_ns_get_ownership+0xaa/0xc0 [ 149.384471][ T6173] ? net_namespace+0x20/0x20 [ 149.389084][ T6173] ? net_get_ownership+0x2b/0x40 [ 149.394007][ T6173] kernfs_create_dir_ns+0x5e/0x140 [ 149.399105][ T6173] sysfs_create_dir_ns+0xa3/0x1a0 [ 149.404120][ T6173] kobject_add_internal+0x456/0x840 [ 149.409305][ T6173] kset_create_and_add+0x13d/0x180 [ 149.414404][ T6173] netdev_register_kobject+0x127/0x230 [ 149.419878][ T6173] register_netdevice+0xba5/0x10b0 [ 149.424979][ T6173] hsr_dev_finalize+0x2da/0x460 [ 149.429949][ T6173] hsr_newlink+0x40d/0x450 [ 149.434377][ T6173] ? hsr_get_node_list+0x450/0x450 [ 149.439564][ T6173] rtnl_newlink+0xdae/0x13b0 [ 149.444180][ T6173] ? __rcu_read_unlock+0x5c/0x290 [ 149.449208][ T6173] ? rtnl_setlink+0x2a0/0x2a0 [ 149.453956][ T6173] rtnetlink_rcv_msg+0x745/0x7e0 [ 149.458917][ T6173] ? ___cache_free+0x46/0x300 [ 149.463580][ T6173] ? kmem_cache_free+0x65/0x110 [ 149.468489][ T6173] ? __kfree_skb+0xfe/0x150 [ 149.472978][ T6173] ? consume_skb+0x48/0x160 [ 149.477537][ T6173] ? nlmon_xmit+0x5f/0x70 [ 149.481902][ T6173] ? __this_cpu_preempt_check+0x18/0x20 [ 149.487510][ T6173] ? __local_bh_enable_ip+0x4d/0x70 [ 149.492790][ T6173] ? local_bh_enable+0x1b/0x20 [ 149.497540][ T6173] ? __dev_queue_xmit+0x597/0xf70 [ 149.502570][ T6173] ? __skb_clone+0x2db/0x300 [ 149.507212][ T6173] ? __rcu_read_unlock+0x5c/0x290 [ 149.512241][ T6173] netlink_rcv_skb+0x14e/0x250 [ 149.516993][ T6173] ? rtnetlink_bind+0x60/0x60 [ 149.521659][ T6173] rtnetlink_rcv+0x18/0x20 [ 149.526133][ T6173] netlink_unicast+0x5fc/0x6c0 [ 149.530954][ T6173] netlink_sendmsg+0x6e1/0x7d0 [ 149.535936][ T6173] ? netlink_getsockopt+0x720/0x720 [ 149.541123][ T6173] ____sys_sendmsg+0x39a/0x510 [ 149.545888][ T6173] __sys_sendmsg+0x195/0x230 [ 149.550659][ T6173] __x64_sys_sendmsg+0x42/0x50 [ 149.555417][ T6173] do_syscall_64+0x44/0xd0 [ 149.559827][ T6173] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 149.565707][ T6173] RIP: 0033:0x7ffb90e2cae9 [ 149.570104][ T6173] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 149.589760][ T6173] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 23:48:52 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x591, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:52 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) (fail_nth: 100) [ 149.598152][ T6173] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 149.606193][ T6173] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 149.614146][ T6173] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 149.622193][ T6173] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 149.630294][ T6173] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 149.638368][ T6173] [ 149.641472][ T6173] kobject_add_internal failed for queues (error: -12 parent: hsr1) 23:48:52 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x1102, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x1102, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x1500, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 149.729810][ T6185] FAULT_INJECTION: forcing a failure. [ 149.729810][ T6185] name failslab, interval 1, probability 0, space 0, times 0 [ 149.742520][ T6185] CPU: 0 PID: 6185 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 149.751199][ T6185] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 149.761440][ T6185] Call Trace: [ 149.764770][ T6185] [ 149.767698][ T6185] dump_stack_lvl+0xd6/0x122 [ 149.772291][ T6185] dump_stack+0x11/0x1b [ 149.776428][ T6185] should_fail+0x23c/0x250 [ 149.780873][ T6185] ? kvasprintf_const+0x59/0x100 [ 149.785812][ T6185] __should_failslab+0x81/0x90 [ 149.790568][ T6185] should_failslab+0x5/0x20 [ 149.795064][ T6185] __kmalloc_track_caller+0x6d/0x370 [ 149.800390][ T6185] kvasprintf+0x83/0x100 [ 149.804690][ T6185] kvasprintf_const+0x59/0x100 [ 149.809433][ T6185] kobject_set_name_vargs+0x43/0xe0 [ 149.814644][ T6185] kobject_init_and_add+0x121/0x1f0 [ 149.819834][ T6185] ? dev_uevent_filter+0x24/0x70 [ 149.824819][ T6185] ? kobject_uevent_env+0x205/0xc40 [ 149.830051][ T6185] net_rx_queue_update_kobjects+0x151/0x3a0 [ 149.835928][ T6185] netdev_register_kobject+0x17e/0x230 [ 149.841381][ T6185] register_netdevice+0xba5/0x10b0 [ 149.846486][ T6185] hsr_dev_finalize+0x2da/0x460 [ 149.851429][ T6185] hsr_newlink+0x40d/0x450 [ 149.855860][ T6185] ? hsr_get_node_list+0x450/0x450 [ 149.860961][ T6185] rtnl_newlink+0xdae/0x13b0 [ 149.865569][ T6185] ? rtnl_setlink+0x2a0/0x2a0 [ 149.870385][ T6185] rtnetlink_rcv_msg+0x745/0x7e0 [ 149.875328][ T6185] ? ___cache_free+0x46/0x300 [ 149.879983][ T6185] ? kmem_cache_free+0x65/0x110 [ 149.884811][ T6185] ? __kfree_skb+0xfe/0x150 [ 149.889372][ T6185] ? consume_skb+0x48/0x160 [ 149.893941][ T6185] ? nlmon_xmit+0x5f/0x70 [ 149.898322][ T6185] ? __this_cpu_preempt_check+0x18/0x20 [ 149.903874][ T6185] ? __local_bh_enable_ip+0x4d/0x70 [ 149.909072][ T6185] ? local_bh_enable+0x1b/0x20 [ 149.913862][ T6185] ? __dev_queue_xmit+0x597/0xf70 [ 149.918864][ T6185] ? __skb_clone+0x2db/0x300 [ 149.923491][ T6185] ? __rcu_read_unlock+0x5c/0x290 [ 149.928502][ T6185] netlink_rcv_skb+0x14e/0x250 [ 149.933241][ T6185] ? rtnetlink_bind+0x60/0x60 [ 149.937984][ T6185] rtnetlink_rcv+0x18/0x20 [ 149.942388][ T6185] netlink_unicast+0x5fc/0x6c0 [ 149.947176][ T6185] netlink_sendmsg+0x6e1/0x7d0 [ 149.951935][ T6185] ? netlink_getsockopt+0x720/0x720 [ 149.957110][ T6185] ____sys_sendmsg+0x39a/0x510 [ 149.961924][ T6185] __sys_sendmsg+0x195/0x230 [ 149.966629][ T6185] __x64_sys_sendmsg+0x42/0x50 [ 149.971450][ T6185] do_syscall_64+0x44/0xd0 [ 149.975924][ T6185] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 149.981797][ T6185] RIP: 0033:0x7ffb90e2cae9 [ 149.986225][ T6185] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 150.005827][ T6185] RSP: 002b:00007ffb8eba3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 150.014424][ T6185] RAX: ffffffffffffffda RBX: 00007ffb90f3ff60 RCX: 00007ffb90e2cae9 [ 150.022391][ T6185] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 23:48:52 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x6000, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:52 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 150.030405][ T6185] RBP: 00007ffb8eba31d0 R08: 0000000000000000 R09: 0000000000000000 [ 150.038375][ T6185] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 150.046446][ T6185] R13: 00007ffcc10b96ff R14: 00007ffb8eba3300 R15: 0000000000022000 [ 150.054407][ T6185] [ 150.057596][ T6185] kobject: can not set name properly! 23:48:52 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x1200, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x1c02, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:52 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:52 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x59f, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x1200, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:52 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x6300, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r8}]}}}]}, 0x40}}, 0x0) 23:48:52 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x1500, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x1500, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:52 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2500, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 23:48:52 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, 0x0) getdent