0)={0x20, r0, 0x20, 0x70bd26, 0x25dfdbfb, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x81}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x4040044) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$nbd(&(0x7f00000005c0), r3) sendmsg$NBD_CMD_CONNECT(r7, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x2c, r8, 0x2, 0x70bd25, 0x25dfdbfe, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xf6a}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x868}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040040}, 0x4010) sendmsg$NBD_CMD_RECONFIGURE(r6, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000c40)={&(0x7f0000000bc0)={0x14}, 0x14}}, 0x0) r9 = syz_genetlink_get_family_id$nbd(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NBD_CMD_RECONFIGURE(r6, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="000129bd7000ffdbdf25030000000c0008005d000000000000000c00040000020000000000000c00080081000000000000000c0008000800000000000000080c010000000000578e1790b1e5c54b9c2cb9260f70fb0f8f317097e5c3980b165f1aa4fc255feebba308ce86b01f7a99c644ebd7c0fa75f487e7bc8c8498f6ea95b6755281a69e1417babc3e8ad8b3278b744edcd7074c34110400000000000000bd46e8af369cc7c5fa1110c523a8172f9936f61359a46e62eeb12e54f8f60e55af31953c6790961ac1"], 0x4c}, 0x1, 0x0, 0x0, 0x1}, 0x1) ioctl$sock_inet_SIOCGARP(r5, 0x541b, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, &(0x7f0000000000)=0x7, 0x8) r10 = openat$procfs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/slabinfo\x00', 0x0, 0x0) r11 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r11, &(0x7f00000009c0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x58, r4, 0x8, 0x70bd26, 0x25dfdbff, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x1}, @NBD_ATTR_BACKEND_IDENTIFIER={0x7, 0xa, '+-#'}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x103}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}]}, 0x58}}, 0x4) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r10, &(0x7f00000007c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x2c, 0x0, 0x0, 0x70bd2b, 0x25dfdbff, {{}, {}, {0x10, 0x18, {0x4, @bearer=@l2={'ib', 0x3a, 'wg2\x00'}}}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x2040}, 0x40840) 07:59:39 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSTI(r1, 0x5412, &(0x7f0000000040)=0x1) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:39 executing program 3: r0 = socket$inet(0x2, 0x3, 0x3) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) getsockopt$inet_mreqn(r2, 0x0, 0x24, &(0x7f0000000240)={@broadcast, @broadcast}, &(0x7f0000000280)=0xc) pipe2$watch_queue(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$KDGKBMODE(r3, 0x4b44, &(0x7f00000001c0)) bind$x25(r1, &(0x7f00000002c0)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x1}}, 0x12) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140), 0x200000, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x541b, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x0, {0x2, 0x0, @multicast1}, 'geneve0\x00'}) openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/mdstat\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000080)={{0x2, 0x4e1d, @multicast2}, {0x6, @local}, 0xc, {0x2, 0x4e24, @rand_addr=0x64010101}, 'veth0_virt_wifi\x00'}) r4 = syz_open_pts(r3, 0x280) ioctl$TCSBRK(r4, 0x5409, 0x1) ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f0000000100)={0x18, 0x0, {0x1, @random="8cfef563d8f9", 'pimreg0\x00'}}) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000300), 0x2000, 0x0) ioctl$PPPOEIOCDFWD(r5, 0xb101, 0x0) 07:59:39 executing program 0: r0 = socket$inet(0x2, 0x5, 0xffffffff) ioctl$sock_inet_SIOCGARP(r0, 0x541b, &(0x7f0000000000)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x25}}, {0x6, @multicast}, 0x6a, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, 'geneve0\x00'}) (async) ioctl$sock_inet_SIOCGARP(r0, 0x541b, &(0x7f0000000000)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x25}}, {0x6, @multicast}, 0x6a, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, 'geneve0\x00'}) r1 = gettid() process_vm_writev(r1, &(0x7f0000000380)=[{0x0}, {&(0x7f0000000080)=""/252, 0xfc}, {&(0x7f0000000180)=""/108, 0x6c}], 0x3, &(0x7f0000000600)=[{&(0x7f0000000400)=""/17, 0x11}, {&(0x7f0000000440)=""/246, 0xf6}], 0x2, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x11, 0x4, @tid=r1}) 07:59:39 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x2, 0xffffffffffffffff, 0x1c, 0x1, @in6={0xa, 0x4e21, 0x4, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x6}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:39 executing program 3: r0 = socket$inet(0x2, 0x3, 0x3) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) getsockopt$inet_mreqn(r2, 0x0, 0x24, &(0x7f0000000240)={@broadcast, @broadcast}, &(0x7f0000000280)=0xc) pipe2$watch_queue(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$KDGKBMODE(r3, 0x4b44, &(0x7f00000001c0)) bind$x25(r1, &(0x7f00000002c0)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x1}}, 0x12) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140), 0x200000, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x541b, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x0, {0x2, 0x0, @multicast1}, 'geneve0\x00'}) openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/mdstat\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000080)={{0x2, 0x4e1d, @multicast2}, {0x6, @local}, 0xc, {0x2, 0x4e24, @rand_addr=0x64010101}, 'veth0_virt_wifi\x00'}) r4 = syz_open_pts(r3, 0x280) ioctl$TCSBRK(r4, 0x5409, 0x1) ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f0000000100)={0x18, 0x0, {0x1, @random="8cfef563d8f9", 'pimreg0\x00'}}) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000300), 0x2000, 0x0) ioctl$PPPOEIOCDFWD(r5, 0xb101, 0x0) socket$inet(0x2, 0x3, 0x3) (async) pipe(&(0x7f0000000140)) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) (async) getsockopt$inet_mreqn(r2, 0x0, 0x24, &(0x7f0000000240)={@broadcast, @broadcast}, &(0x7f0000000280)=0xc) (async) pipe2$watch_queue(&(0x7f0000000180), 0x80) (async) ioctl$KDGKBMODE(r3, 0x4b44, &(0x7f00000001c0)) (async) bind$x25(r1, &(0x7f00000002c0)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x1}}, 0x12) (async) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140), 0x200000, 0x0) (async) ioctl$sock_inet_SIOCGARP(r0, 0x541b, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x0, {0x2, 0x0, @multicast1}, 'geneve0\x00'}) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/mdstat\x00', 0x0, 0x0) (async) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000080)={{0x2, 0x4e1d, @multicast2}, {0x6, @local}, 0xc, {0x2, 0x4e24, @rand_addr=0x64010101}, 'veth0_virt_wifi\x00'}) (async) syz_open_pts(r3, 0x280) (async) ioctl$TCSBRK(r4, 0x5409, 0x1) (async) ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f0000000100)={0x18, 0x0, {0x1, @random="8cfef563d8f9", 'pimreg0\x00'}}) (async) openat$bsg(0xffffffffffffff9c, &(0x7f0000000300), 0x2000, 0x0) (async) ioctl$PPPOEIOCDFWD(r5, 0xb101, 0x0) (async) 07:59:39 executing program 0: r0 = socket$inet(0x2, 0x5, 0xffffffff) ioctl$sock_inet_SIOCGARP(r0, 0x541b, &(0x7f0000000000)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x25}}, {0x6, @multicast}, 0x6a, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, 'geneve0\x00'}) (async) ioctl$sock_inet_SIOCGARP(r0, 0x541b, &(0x7f0000000000)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x25}}, {0x6, @multicast}, 0x6a, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, 'geneve0\x00'}) r1 = gettid() process_vm_writev(r1, &(0x7f0000000380)=[{0x0}, {&(0x7f0000000080)=""/252, 0xfc}, {&(0x7f0000000180)=""/108, 0x6c}], 0x3, &(0x7f0000000600)=[{&(0x7f0000000400)=""/17, 0x11}, {&(0x7f0000000440)=""/246, 0xf6}], 0x2, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x11, 0x4, @tid=r1}) 07:59:39 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSTI(r1, 0x5412, &(0x7f0000000040)=0x1) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) syz_open_dev$tty20(0xc, 0x4, 0x1) (async) ioctl$TIOCSTI(r1, 0x5412, &(0x7f0000000040)=0x1) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) 07:59:39 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x1c, 0x1, @in6={0xa, 0x4e21, 0x4, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x6}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:39 executing program 0: r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x541b, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @multicast}, 0x0, {0x2, 0x0, @empty}, 'geneve0\x00'}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) ioctl$SIOCX25CALLACCPTAPPRV(r1, 0x89e8) 07:59:39 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x10000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:39 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x595540, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:39 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1, @in6={0xa, 0x4e21, 0x4, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x6}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:39 executing program 3: r0 = socket$inet(0x2, 0x3, 0x3) pipe(&(0x7f0000000140)) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) getsockopt$inet_mreqn(r2, 0x0, 0x24, &(0x7f0000000240)={@broadcast, @broadcast}, &(0x7f0000000280)=0xc) pipe2$watch_queue(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$KDGKBMODE(r3, 0x4b44, &(0x7f00000001c0)) bind$x25(r1, &(0x7f00000002c0)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x1}}, 0x12) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140), 0x200000, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x541b, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x0, {0x2, 0x0, @multicast1}, 'geneve0\x00'}) openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/mdstat\x00', 0x0, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/mdstat\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000080)={{0x2, 0x4e1d, @multicast2}, {0x6, @local}, 0xc, {0x2, 0x4e24, @rand_addr=0x64010101}, 'veth0_virt_wifi\x00'}) r4 = syz_open_pts(r3, 0x280) ioctl$TCSBRK(r4, 0x5409, 0x1) (async) ioctl$TCSBRK(r4, 0x5409, 0x1) ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f0000000100)={0x18, 0x0, {0x1, @random="8cfef563d8f9", 'pimreg0\x00'}}) openat$bsg(0xffffffffffffff9c, &(0x7f0000000300), 0x2000, 0x0) (async) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000300), 0x2000, 0x0) ioctl$PPPOEIOCDFWD(r5, 0xb101, 0x0) 07:59:39 executing program 5: r0 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x58, r0, 0x2, 0x70bd26, 0x25dfdbfb, {}, [@NBD_ATTR_BACKEND_IDENTIFIER={0x5, 0xa, 'B'}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x2}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2232}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x6}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x8}]}, 0x58}, 0x1, 0x0, 0x0, 0x40000}, 0x24004004) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000c40)={&(0x7f0000000bc0)={0x14}, 0x14}}, 0x0) (async) r2 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_RECV_OWN_MSGS(r2, 0x65, 0x4, &(0x7f00000003c0)=0x1, 0x4) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000400)={&(0x7f0000000800)=ANY=[@ANYBLOB="38000000e4e0c70c150b51cc599bb61d1c443f96381b032b8c76f5a3837555860e56b306113b5b605d4fdfdf3c77455fe81c2db6dff8541260903e0594c3d9ca35c22ce49d9f5cd153ebc8e62a56c83388a9fc939bcecbb1d35f17c4919f2a4c536390771c9fd613", @ANYRES16=r4, @ANYBLOB="00012abd7000ffdbdf250300000004000a000c00050008010000000000000c000600020000000000000005000a0042000000"], 0x38}, 0x1, 0x0, 0x0, 0x81}, 0x4000) r5 = socket$inet(0x2, 0x5, 0x0) (async) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$NBD_CMD_CONNECT(r3, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x20, r0, 0x20, 0x70bd26, 0x25dfdbfb, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x81}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x4040044) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r8 = syz_genetlink_get_family_id$nbd(&(0x7f00000005c0), r3) sendmsg$NBD_CMD_CONNECT(r7, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x2c, r8, 0x2, 0x70bd25, 0x25dfdbfe, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xf6a}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x868}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040040}, 0x4010) sendmsg$NBD_CMD_RECONFIGURE(r6, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000c40)={&(0x7f0000000bc0)={0x14}, 0x14}}, 0x0) (async) r9 = syz_genetlink_get_family_id$nbd(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NBD_CMD_RECONFIGURE(r6, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="000129bd7000ffdbdf25030000000c0008005d000000000000000c00040000020000000000000c00080081000000000000000c0008000800000000000000080c010000000000578e1790b1e5c54b9c2cb9260f70fb0f8f317097e5c3980b165f1aa4fc255feebba308ce86b01f7a99c644ebd7c0fa75f487e7bc8c8498f6ea95b6755281a69e1417babc3e8ad8b3278b744edcd7074c34110400000000000000bd46e8af369cc7c5fa1110c523a8172f9936f61359a46e62eeb12e54f8f60e55af31953c6790961ac1"], 0x4c}, 0x1, 0x0, 0x0, 0x1}, 0x1) ioctl$sock_inet_SIOCGARP(r5, 0x541b, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, &(0x7f0000000000)=0x7, 0x8) (async) r10 = openat$procfs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/slabinfo\x00', 0x0, 0x0) r11 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r11, &(0x7f00000009c0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x58, r4, 0x8, 0x70bd26, 0x25dfdbff, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x1}, @NBD_ATTR_BACKEND_IDENTIFIER={0x7, 0xa, '+-#'}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x103}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}]}, 0x58}}, 0x4) (async) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r10, &(0x7f00000007c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x2c, 0x0, 0x0, 0x70bd2b, 0x25dfdbff, {{}, {}, {0x10, 0x18, {0x4, @bearer=@l2={'ib', 0x3a, 'wg2\x00'}}}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x2040}, 0x40840) 07:59:39 executing program 0: r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x541b, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @multicast}, 0x0, {0x2, 0x0, @empty}, 'geneve0\x00'}) pipe(&(0x7f0000000140)) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) ioctl$SIOCX25CALLACCPTAPPRV(r1, 0x89e8) 07:59:39 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x4e21, 0x4, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x6}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:39 executing program 0: r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x541b, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @multicast}, 0x0, {0x2, 0x0, @empty}, 'geneve0\x00'}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) ioctl$SIOCX25CALLACCPTAPPRV(r1, 0x89e8) socket$inet(0x2, 0x5, 0x0) (async) ioctl$sock_inet_SIOCGARP(r0, 0x541b, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @multicast}, 0x0, {0x2, 0x0, @empty}, 'geneve0\x00'}) (async) pipe(&(0x7f0000000140)) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) (async) ioctl$SIOCX25CALLACCPTAPPRV(r1, 0x89e8) (async) 07:59:39 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x595540, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x595540, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) 07:59:39 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x1, 0x70bd28, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x4}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x7}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x2404480c}, 0x0) r1 = socket$inet(0x2, 0x3, 0x3) ioctl$sock_inet_SIOCGARP(r1, 0x541b, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @remote}, 0x0, {0x2, 0x0, @dev}, 'geneve0\x00'}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) sendto$llc(r2, &(0x7f0000000080)="e899b90ce6d28483a19cf582c5794fe1727db18a5cd01c7ae9109f8f3db3a25c910a12510133f9c95ba8c20afb32959c038092a816988ba7c7d239d5b8771de80c78ce2e9375836fcef7a56c3513a58fcdd0f703b4e4df348f866256ba67e6a43bbbd2367fdaf3503353f1fc75ddb113e7a19da249ff7ae4e2d5b6ded2f75b7ae5a8ece65c67a6e13bc75673968a80e89a5739ec2888b1", 0x97, 0x400c041, &(0x7f0000000140)={0x1a, 0x10e, 0x5b, 0x2, 0x2, 0x0, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x2a}}, 0x10) 07:59:39 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x4, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x6}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:39 executing program 0: r0 = socket$inet(0x2, 0x5, 0x0) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000002580)={&(0x7f0000000000)=@nfc_llcp, 0x80, &(0x7f0000002480)=[{&(0x7f0000000080)=""/168, 0xa8}, {&(0x7f0000000140)=""/165, 0xa5}, {&(0x7f0000000200)=""/125, 0x7d}, {&(0x7f0000000280)=""/80, 0x50}, {&(0x7f0000000300)=""/120, 0x78}, {&(0x7f0000000380)=""/227, 0xe3}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/4096, 0x1000}], 0x8, &(0x7f0000002500)=""/100, 0x64}, 0x100) ioctl$PTP_EXTTS_REQUEST(r0, 0x40103d02, &(0x7f00000026c0)={0x401}) ioctl$sock_inet_SIOCGARP(r0, 0x541b, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000002640)={'sit0\x00', &(0x7f00000025c0)={'gretap0\x00', 0x0, 0x700, 0x8, 0x7fff, 0x6, {{0x5, 0x4, 0x3, 0x0, 0x14, 0x67, 0x0, 0xff, 0x4, 0x0, @empty, @remote}}}}) accept$inet(r0, &(0x7f0000002600)={0x2, 0x0, @multicast2}, &(0x7f0000002680)=0x10) 07:59:39 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x64000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:39 executing program 0: r0 = socket$inet(0x2, 0x5, 0x0) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000002580)={&(0x7f0000000000)=@nfc_llcp, 0x80, &(0x7f0000002480)=[{&(0x7f0000000080)=""/168, 0xa8}, {&(0x7f0000000140)=""/165, 0xa5}, {&(0x7f0000000200)=""/125, 0x7d}, {&(0x7f0000000280)=""/80, 0x50}, {&(0x7f0000000300)=""/120, 0x78}, {&(0x7f0000000380)=""/227, 0xe3}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/4096, 0x1000}], 0x8, &(0x7f0000002500)=""/100, 0x64}, 0x100) ioctl$PTP_EXTTS_REQUEST(r0, 0x40103d02, &(0x7f00000026c0)={0x401}) ioctl$sock_inet_SIOCGARP(r0, 0x541b, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000002640)={'sit0\x00', &(0x7f00000025c0)={'gretap0\x00', 0x0, 0x700, 0x8, 0x7fff, 0x6, {{0x5, 0x4, 0x3, 0x0, 0x14, 0x67, 0x0, 0xff, 0x4, 0x0, @empty, @remote}}}}) accept$inet(r0, &(0x7f0000002600)={0x2, 0x0, @multicast2}, &(0x7f0000002680)=0x10) 07:59:39 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x595540, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:39 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x6}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:39 executing program 5: r0 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x58, r0, 0x2, 0x70bd26, 0x25dfdbfb, {}, [@NBD_ATTR_BACKEND_IDENTIFIER={0x5, 0xa, 'B'}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x2}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2232}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x6}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x8}]}, 0x58}, 0x1, 0x0, 0x0, 0x40000}, 0x24004004) (async) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000c40)={&(0x7f0000000bc0)={0x14}, 0x14}}, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_RECV_OWN_MSGS(r2, 0x65, 0x4, &(0x7f00000003c0)=0x1, 0x4) (async) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000400)={&(0x7f0000000800)=ANY=[@ANYBLOB="38000000e4e0c70c150b51cc599bb61d1c443f96381b032b8c76f5a3837555860e56b306113b5b605d4fdfdf3c77455fe81c2db6dff8541260903e0594c3d9ca35c22ce49d9f5cd153ebc8e62a56c83388a9fc939bcecbb1d35f17c4919f2a4c536390771c9fd613", @ANYRES16=r4, @ANYBLOB="00012abd7000ffdbdf250300000004000a000c00050008010000000000000c000600020000000000000005000a0042000000"], 0x38}, 0x1, 0x0, 0x0, 0x81}, 0x4000) (async) r5 = socket$inet(0x2, 0x5, 0x0) (async) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$NBD_CMD_CONNECT(r3, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x20, r0, 0x20, 0x70bd26, 0x25dfdbfb, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x81}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x4040044) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r8 = syz_genetlink_get_family_id$nbd(&(0x7f00000005c0), r3) sendmsg$NBD_CMD_CONNECT(r7, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x2c, r8, 0x2, 0x70bd25, 0x25dfdbfe, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xf6a}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x868}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040040}, 0x4010) sendmsg$NBD_CMD_RECONFIGURE(r6, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000c40)={&(0x7f0000000bc0)={0x14}, 0x14}}, 0x0) (async) r9 = syz_genetlink_get_family_id$nbd(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NBD_CMD_RECONFIGURE(r6, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="000129bd7000ffdbdf25030000000c0008005d000000000000000c00040000020000000000000c00080081000000000000000c0008000800000000000000080c010000000000578e1790b1e5c54b9c2cb9260f70fb0f8f317097e5c3980b165f1aa4fc255feebba308ce86b01f7a99c644ebd7c0fa75f487e7bc8c8498f6ea95b6755281a69e1417babc3e8ad8b3278b744edcd7074c34110400000000000000bd46e8af369cc7c5fa1110c523a8172f9936f61359a46e62eeb12e54f8f60e55af31953c6790961ac1"], 0x4c}, 0x1, 0x0, 0x0, 0x1}, 0x1) (async) ioctl$sock_inet_SIOCGARP(r5, 0x541b, 0x0) (async) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, &(0x7f0000000000)=0x7, 0x8) r10 = openat$procfs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/slabinfo\x00', 0x0, 0x0) r11 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r11, &(0x7f00000009c0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x58, r4, 0x8, 0x70bd26, 0x25dfdbff, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x1}, @NBD_ATTR_BACKEND_IDENTIFIER={0x7, 0xa, '+-#'}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x103}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}]}, 0x58}}, 0x4) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r10, &(0x7f00000007c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x2c, 0x0, 0x0, 0x70bd2b, 0x25dfdbff, {{}, {}, {0x10, 0x18, {0x4, @bearer=@l2={'ib', 0x3a, 'wg2\x00'}}}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x2040}, 0x40840) 07:59:39 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x1, 0x70bd28, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x4}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x7}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x2404480c}, 0x0) (async) r1 = socket$inet(0x2, 0x3, 0x3) ioctl$sock_inet_SIOCGARP(r1, 0x541b, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @remote}, 0x0, {0x2, 0x0, @dev}, 'geneve0\x00'}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) (async) sendto$llc(r2, &(0x7f0000000080)="e899b90ce6d28483a19cf582c5794fe1727db18a5cd01c7ae9109f8f3db3a25c910a12510133f9c95ba8c20afb32959c038092a816988ba7c7d239d5b8771de80c78ce2e9375836fcef7a56c3513a58fcdd0f703b4e4df348f866256ba67e6a43bbbd2367fdaf3503353f1fc75ddb113e7a19da249ff7ae4e2d5b6ded2f75b7ae5a8ece65c67a6e13bc75673968a80e89a5739ec2888b1", 0x97, 0x400c041, &(0x7f0000000140)={0x1a, 0x10e, 0x5b, 0x2, 0x2, 0x0, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x2a}}, 0x10) 07:59:39 executing program 0: r0 = socket$inet(0x2, 0x5, 0x0) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000002580)={&(0x7f0000000000)=@nfc_llcp, 0x80, &(0x7f0000002480)=[{&(0x7f0000000080)=""/168, 0xa8}, {&(0x7f0000000140)=""/165, 0xa5}, {&(0x7f0000000200)=""/125, 0x7d}, {&(0x7f0000000280)=""/80, 0x50}, {&(0x7f0000000300)=""/120, 0x78}, {&(0x7f0000000380)=""/227, 0xe3}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/4096, 0x1000}], 0x8, &(0x7f0000002500)=""/100, 0x64}, 0x100) ioctl$PTP_EXTTS_REQUEST(r0, 0x40103d02, &(0x7f00000026c0)={0x401}) ioctl$sock_inet_SIOCGARP(r0, 0x541b, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000002640)={'sit0\x00', &(0x7f00000025c0)={'gretap0\x00', 0x0, 0x700, 0x8, 0x7fff, 0x6, {{0x5, 0x4, 0x3, 0x0, 0x14, 0x67, 0x0, 0xff, 0x4, 0x0, @empty, @remote}}}}) accept$inet(r0, &(0x7f0000002600)={0x2, 0x0, @multicast2}, &(0x7f0000002680)=0x10) 07:59:39 executing program 4: pipe2$watch_queue(&(0x7f0000000080), 0x80) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r3) sendmsg$DEVLINK_CMD_RATE_DEL(r3, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x5c, r2, 0x200, 0x70bd2d, 0x25dfdbfd, {}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_PORT_INDEX={0x8, 0x3, 0x2}]}, 0x5c}, 0x1, 0x0, 0x0, 0x80}, 0x4000815) syz_open_dev$tty20(0xc, 0x4, 0x1) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000040)={0xfffffff9}, 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:39 executing program 0: r0 = socket$inet(0x2, 0x5, 0x0) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000002580)={&(0x7f0000000000)=@nfc_llcp, 0x80, &(0x7f0000002480)=[{&(0x7f0000000080)=""/168, 0xa8}, {&(0x7f0000000140)=""/165, 0xa5}, {&(0x7f0000000200)=""/125, 0x7d}, {&(0x7f0000000280)=""/80, 0x50}, {&(0x7f0000000300)=""/120, 0x78}, {&(0x7f0000000380)=""/227, 0xe3}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/4096, 0x1000}], 0x8, &(0x7f0000002500)=""/100, 0x64}, 0x100) ioctl$PTP_EXTTS_REQUEST(r0, 0x40103d02, &(0x7f00000026c0)={0x401}) ioctl$sock_inet_SIOCGARP(r0, 0x541b, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000002640)={'sit0\x00', &(0x7f00000025c0)={'gretap0\x00', 0x0, 0x700, 0x8, 0x7fff, 0x6, {{0x5, 0x4, 0x3, 0x0, 0x14, 0x67, 0x0, 0xff, 0x4, 0x0, @empty, @remote}}}}) 07:59:39 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0x0, 0x1, 0x70bd28, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x4}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x7}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x2404480c}, 0x0) r1 = socket$inet(0x2, 0x3, 0x3) ioctl$sock_inet_SIOCGARP(r1, 0x541b, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @remote}, 0x0, {0x2, 0x0, @dev}, 'geneve0\x00'}) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) (async) sendto$llc(r2, &(0x7f0000000080)="e899b90ce6d28483a19cf582c5794fe1727db18a5cd01c7ae9109f8f3db3a25c910a12510133f9c95ba8c20afb32959c038092a816988ba7c7d239d5b8771de80c78ce2e9375836fcef7a56c3513a58fcdd0f703b4e4df348f866256ba67e6a43bbbd2367fdaf3503353f1fc75ddb113e7a19da249ff7ae4e2d5b6ded2f75b7ae5a8ece65c67a6e13bc75673968a80e89a5739ec2888b1", 0x97, 0x400c041, &(0x7f0000000140)={0x1a, 0x10e, 0x5b, 0x2, 0x2, 0x0, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x2a}}, 0x10) 07:59:39 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x6}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:39 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0xdb060000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:39 executing program 3: r0 = socket$inet(0x2, 0x3, 0x3) ioctl$sock_inet_SIOCGARP(r0, 0x541b, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @remote}, 0x0, {0x2, 0x0, @dev}, 'geneve0\x00'}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) sendmsg$SMC_PNETID_FLUSH(r1, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x58, 0x0, 0x400, 0x70bd2c, 0x3, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'pim6reg0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'xfrm0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'vlan0\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0xc000}, 0x40001) bind$x25(r1, &(0x7f0000000180), 0x12) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f0000000100)={{0x2, 0x4e20, @remote}, {0x1, @broadcast}, 0x2, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x27}}, 'vxcan1\x00'}) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @remote}, &(0x7f00000000c0)=0xc) 07:59:39 executing program 4: pipe2$watch_queue(&(0x7f0000000080), 0x80) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) pipe(&(0x7f0000000140)) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r3) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r3) sendmsg$DEVLINK_CMD_RATE_DEL(r3, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x5c, r2, 0x200, 0x70bd2d, 0x25dfdbfd, {}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_PORT_INDEX={0x8, 0x3, 0x2}]}, 0x5c}, 0x1, 0x0, 0x0, 0x80}, 0x4000815) syz_open_dev$tty20(0xc, 0x4, 0x1) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000040)={0xfffffff9}, 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:39 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:39 executing program 0: r0 = socket$inet(0x2, 0x5, 0x0) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000002580)={&(0x7f0000000000)=@nfc_llcp, 0x80, &(0x7f0000002480)=[{&(0x7f0000000080)=""/168, 0xa8}, {&(0x7f0000000140)=""/165, 0xa5}, {&(0x7f0000000200)=""/125, 0x7d}, {&(0x7f0000000280)=""/80, 0x50}, {&(0x7f0000000300)=""/120, 0x78}, {&(0x7f0000000380)=""/227, 0xe3}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/4096, 0x1000}], 0x8, &(0x7f0000002500)=""/100, 0x64}, 0x100) ioctl$PTP_EXTTS_REQUEST(r0, 0x40103d02, &(0x7f00000026c0)={0x401}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000002640)={'sit0\x00', &(0x7f00000025c0)={'gretap0\x00', 0x0, 0x700, 0x8, 0x7fff, 0x6, {{0x5, 0x4, 0x3, 0x0, 0x14, 0x67, 0x0, 0xff, 0x4, 0x0, @empty, @remote}}}}) 07:59:39 executing program 5: ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000000)={0x4, 0x5, 0x1, 0x6, 0x8000}) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x541b, 0x0) 07:59:39 executing program 4: pipe2$watch_queue(&(0x7f0000000080), 0x80) (async) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r3) (async) sendmsg$DEVLINK_CMD_RATE_DEL(r3, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x5c, r2, 0x200, 0x70bd2d, 0x25dfdbfd, {}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_PORT_INDEX={0x8, 0x3, 0x2}]}, 0x5c}, 0x1, 0x0, 0x0, 0x80}, 0x4000815) syz_open_dev$tty20(0xc, 0x4, 0x1) (async) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000040)={0xfffffff9}, 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:39 executing program 0: r0 = socket$inet(0x2, 0x5, 0x0) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000002580)={&(0x7f0000000000)=@nfc_llcp, 0x80, &(0x7f0000002480)=[{&(0x7f0000000080)=""/168, 0xa8}, {&(0x7f0000000140)=""/165, 0xa5}, {&(0x7f0000000200)=""/125, 0x7d}, {&(0x7f0000000280)=""/80, 0x50}, {&(0x7f0000000300)=""/120, 0x78}, {&(0x7f0000000380)=""/227, 0xe3}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/4096, 0x1000}], 0x8, &(0x7f0000002500)=""/100, 0x64}, 0x100) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000002640)={'sit0\x00', &(0x7f00000025c0)={'gretap0\x00', 0x0, 0x700, 0x8, 0x7fff, 0x6, {{0x5, 0x4, 0x3, 0x0, 0x14, 0x67, 0x0, 0xff, 0x4, 0x0, @empty, @remote}}}}) 07:59:39 executing program 3: r0 = socket$inet(0x2, 0x3, 0x3) ioctl$sock_inet_SIOCGARP(r0, 0x541b, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @remote}, 0x0, {0x2, 0x0, @dev}, 'geneve0\x00'}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) sendmsg$SMC_PNETID_FLUSH(r1, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x58, 0x0, 0x400, 0x70bd2c, 0x3, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'pim6reg0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'xfrm0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'vlan0\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0xc000}, 0x40001) bind$x25(r1, &(0x7f0000000180), 0x12) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f0000000100)={{0x2, 0x4e20, @remote}, {0x1, @broadcast}, 0x2, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x27}}, 'vxcan1\x00'}) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @remote}, &(0x7f00000000c0)=0xc) socket$inet(0x2, 0x3, 0x3) (async) ioctl$sock_inet_SIOCGARP(r0, 0x541b, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @remote}, 0x0, {0x2, 0x0, @dev}, 'geneve0\x00'}) (async) pipe(&(0x7f0000000140)) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) (async) sendmsg$SMC_PNETID_FLUSH(r1, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x58, 0x0, 0x400, 0x70bd2c, 0x3, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'pim6reg0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'xfrm0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'vlan0\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0xc000}, 0x40001) (async) bind$x25(r1, &(0x7f0000000180), 0x12) (async) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f0000000100)={{0x2, 0x4e20, @remote}, {0x1, @broadcast}, 0x2, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x27}}, 'vxcan1\x00'}) (async) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @remote}, &(0x7f00000000c0)=0xc) (async) 07:59:39 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:39 executing program 5: ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000000)={0x4, 0x5, 0x1, 0x6, 0x8000}) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x541b, 0x0) 07:59:39 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f0000000040)=""/23) 07:59:39 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0xfefdffff}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:39 executing program 5: ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000000)={0x4, 0x5, 0x1, 0x6, 0x8000}) (async) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x541b, 0x0) 07:59:39 executing program 0: r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000002640)={'sit0\x00', &(0x7f00000025c0)={'gretap0\x00', 0x0, 0x700, 0x8, 0x7fff, 0x6, {{0x5, 0x4, 0x3, 0x0, 0x14, 0x67, 0x0, 0xff, 0x4, 0x0, @empty, @remote}}}}) 07:59:39 executing program 3: r0 = socket$inet(0x2, 0x3, 0x3) ioctl$sock_inet_SIOCGARP(r0, 0x541b, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @remote}, 0x0, {0x2, 0x0, @dev}, 'geneve0\x00'}) (async) ioctl$sock_inet_SIOCGARP(r0, 0x541b, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @remote}, 0x0, {0x2, 0x0, @dev}, 'geneve0\x00'}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) sendmsg$SMC_PNETID_FLUSH(r1, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x58, 0x0, 0x400, 0x70bd2c, 0x3, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'pim6reg0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'xfrm0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'vlan0\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0xc000}, 0x40001) bind$x25(r1, &(0x7f0000000180), 0x12) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f0000000100)={{0x2, 0x4e20, @remote}, {0x1, @broadcast}, 0x2, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x27}}, 'vxcan1\x00'}) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @remote}, &(0x7f00000000c0)=0xc) 07:59:39 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:39 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f0000000040)=""/23) 07:59:39 executing program 0: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000002640)={'sit0\x00', &(0x7f00000025c0)={'gretap0\x00', 0x0, 0x700, 0x8, 0x7fff, 0x6, {{0x5, 0x4, 0x3, 0x0, 0x14, 0x67, 0x0, 0xff, 0x4, 0x0, @empty, @remote}}}}) 07:59:39 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f0000000080)={0x7, 0x3f}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:39 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x7ff, 0x0, 0x4}}}, 0xa0) sendmsg$DEVLINK_CMD_RATE_DEL(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x5c, 0x0, 0x4, 0x70bd2b, 0x25dfdbfc, {}, [@DEVLINK_ATTR_RATE_NODE_NAME={0xf, 0xa8, @name2}, @handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_PORT_INDEX={0x8, 0x3, 0x2}, @DEVLINK_ATTR_RATE_NODE_NAME={0xf, 0xa8, @name2}]}, 0x5c}, 0x1, 0x0, 0x0, 0x1c010}, 0x8800) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) ioctl$TIOCMIWAIT(r0, 0x545c, 0x0) syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip6_mr_cache\x00') 07:59:39 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:39 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f0000000040)=""/23) 07:59:39 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0xfffffdfe}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:39 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 1) 07:59:39 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x7ff, 0x0, 0x4}}}, 0xa0) sendmsg$DEVLINK_CMD_RATE_DEL(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x5c, 0x0, 0x4, 0x70bd2b, 0x25dfdbfc, {}, [@DEVLINK_ATTR_RATE_NODE_NAME={0xf, 0xa8, @name2}, @handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_PORT_INDEX={0x8, 0x3, 0x2}, @DEVLINK_ATTR_RATE_NODE_NAME={0xf, 0xa8, @name2}]}, 0x5c}, 0x1, 0x0, 0x0, 0x1c010}, 0x8800) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) ioctl$TIOCMIWAIT(r0, 0x545c, 0x0) syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip6_mr_cache\x00') 07:59:39 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, 0x0, 0x0) 07:59:39 executing program 0: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000002640)={'sit0\x00', &(0x7f00000025c0)={'gretap0\x00', 0x0, 0x700, 0x8, 0x7fff, 0x6, {{0x5, 0x4, 0x3, 0x0, 0x14, 0x67, 0x0, 0xff, 0x4, 0x0, @empty, @remote}}}}) [ 1761.785754][T31788] FAULT_INJECTION: forcing a failure. [ 1761.785754][T31788] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1761.799159][T31788] CPU: 0 PID: 31788 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1761.809590][T31788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1761.819678][T31788] Call Trace: [ 1761.822968][T31788] [ 1761.825916][T31788] dump_stack_lvl+0xda/0x130 [ 1761.830721][T31788] dump_stack+0x15/0x20 07:59:39 executing program 0: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000002640)={'sit0\x00', &(0x7f00000025c0)={'gretap0\x00', 0x0, 0x700, 0x8, 0x7fff, 0x6, {{0x5, 0x4, 0x3, 0x0, 0x14, 0x67, 0x0, 0xff, 0x4, 0x0, @empty, @remote}}}}) 07:59:39 executing program 4: ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000001c0)) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:39 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000002640)={'sit0\x00', &(0x7f00000025c0)={'gretap0\x00', 0x0, 0x700, 0x8, 0x7fff, 0x6, {{0x5, 0x4, 0x3, 0x0, 0x14, 0x67, 0x0, 0xff, 0x4, 0x0, @empty, @remote}}}}) 07:59:39 executing program 4: ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) (async) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000001c0)) (async, rerun: 64) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async, rerun: 64) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:39 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x7ff, 0x0, 0x4}}}, 0xa0) sendmsg$DEVLINK_CMD_RATE_DEL(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x5c, 0x0, 0x4, 0x70bd2b, 0x25dfdbfc, {}, [@DEVLINK_ATTR_RATE_NODE_NAME={0xf, 0xa8, @name2}, @handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_PORT_INDEX={0x8, 0x3, 0x2}, @DEVLINK_ATTR_RATE_NODE_NAME={0xf, 0xa8, @name2}]}, 0x5c}, 0x1, 0x0, 0x0, 0x1c010}, 0x8800) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) ioctl$TIOCMIWAIT(r0, 0x545c, 0x0) syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip6_mr_cache\x00') 07:59:39 executing program 4: ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0xc) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000001c0)) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) [ 1761.834900][T31788] should_fail_ex+0x21f/0x230 [ 1761.839673][T31788] __should_fail_alloc_page+0xfd/0x110 [ 1761.845173][T31788] __alloc_pages+0x108/0x340 [ 1761.849863][T31788] vma_alloc_folio+0x6a3/0x8c0 [ 1761.854664][T31788] shmem_get_folio_gfp+0x801/0x1200 [ 1761.859908][T31788] shmem_write_begin+0xa6/0x1d0 [ 1761.864837][T31788] generic_perform_write+0x1cf/0x410 [ 1761.870167][T31788] ? file_update_time+0x1cd/0x200 [ 1761.875381][T31788] __generic_file_write_iter+0xa1/0x120 [ 1761.880973][T31788] generic_file_write_iter+0x7d/0x1c0 07:59:39 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x7ff, 0x0, 0x4}}}, 0xa0) sendmsg$DEVLINK_CMD_RATE_DEL(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x5c, 0x0, 0x4, 0x70bd2b, 0x25dfdbfc, {}, [@DEVLINK_ATTR_RATE_NODE_NAME={0xf, 0xa8, @name2}, @handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_PORT_INDEX={0x8, 0x3, 0x2}, @DEVLINK_ATTR_RATE_NODE_NAME={0xf, 0xa8, @name2}]}, 0x5c}, 0x1, 0x0, 0x0, 0x1c010}, 0x8800) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) ioctl$TIOCMIWAIT(r0, 0x545c, 0x0) [ 1761.886374][T31788] vfs_write+0x4ab/0x7d0 [ 1761.890686][T31788] ksys_write+0xeb/0x1a0 [ 1761.894975][T31788] __x64_sys_write+0x42/0x50 [ 1761.899607][T31788] do_syscall_64+0x41/0xc0 [ 1761.904108][T31788] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1761.910033][T31788] RIP: 0033:0x7f3d42967b29 [ 1761.914545][T31788] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 07:59:39 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x1000000000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:39 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 2) 07:59:39 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/slabinfo\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x3, 0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e21, 0x6, @loopback, 0x8009}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) getsockopt$CAN_RAW_FD_FRAMES(r0, 0x65, 0x5, &(0x7f0000000000), &(0x7f0000000080)=0x4) 07:59:39 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x7ff, 0x0, 0x4}}}, 0xa0) sendmsg$DEVLINK_CMD_RATE_DEL(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x5c, 0x0, 0x4, 0x70bd2b, 0x25dfdbfc, {}, [@DEVLINK_ATTR_RATE_NODE_NAME={0xf, 0xa8, @name2}, @handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_PORT_INDEX={0x8, 0x3, 0x2}, @DEVLINK_ATTR_RATE_NODE_NAME={0xf, 0xa8, @name2}]}, 0x5c}, 0x1, 0x0, 0x0, 0x1c010}, 0x8800) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:39 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, 0x0, 0x0) 07:59:39 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000002640)={'sit0\x00', &(0x7f00000025c0)={'gretap0\x00', 0x0, 0x700, 0x8, 0x7fff, 0x6, {{0x5, 0x4, 0x3, 0x0, 0x14, 0x67, 0x0, 0xff, 0x4, 0x0, @empty, @remote}}}}) 07:59:40 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/slabinfo\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x3, 0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e21, 0x6, @loopback, 0x8009}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) getsockopt$CAN_RAW_FD_FRAMES(r0, 0x65, 0x5, &(0x7f0000000000), &(0x7f0000000080)=0x4) [ 1761.934172][T31788] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1761.942668][T31788] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1761.950717][T31788] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1761.958713][T31788] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1761.966703][T31788] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1761.974692][T31788] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1761.982742][T31788] [ 1762.019522][T31828] FAULT_INJECTION: forcing a failure. [ 1762.019522][T31828] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1762.032675][T31828] CPU: 0 PID: 31828 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1762.043118][T31828] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1762.053229][T31828] Call Trace: [ 1762.056520][T31828] [ 1762.059464][T31828] dump_stack_lvl+0xda/0x130 [ 1762.064189][T31828] dump_stack+0x15/0x20 07:59:40 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, 0x0, 0x0) 07:59:40 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x7ff, 0x0, 0x4}}}, 0xa0) sendmsg$DEVLINK_CMD_RATE_DEL(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x5c, 0x0, 0x4, 0x70bd2b, 0x25dfdbfc, {}, [@DEVLINK_ATTR_RATE_NODE_NAME={0xf, 0xa8, @name2}, @handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_PORT_INDEX={0x8, 0x3, 0x2}, @DEVLINK_ATTR_RATE_NODE_NAME={0xf, 0xa8, @name2}]}, 0x5c}, 0x1, 0x0, 0x0, 0x1c010}, 0x8800) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') 07:59:40 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/slabinfo\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x3, 0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e21, 0x6, @loopback, 0x8009}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) getsockopt$CAN_RAW_FD_FRAMES(r0, 0x65, 0x5, &(0x7f0000000000), &(0x7f0000000080)=0x4) 07:59:40 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x40030000000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:40 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000002640)={'sit0\x00', &(0x7f00000025c0)={'gretap0\x00', 0x0, 0x700, 0x8, 0x7fff, 0x6, {{0x5, 0x4, 0x3, 0x0, 0x14, 0x67, 0x0, 0xff, 0x4, 0x0, @empty, @remote}}}}) 07:59:40 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) [ 1762.068377][T31828] should_fail_ex+0x21f/0x230 [ 1762.073196][T31828] should_fail+0xb/0x10 [ 1762.077407][T31828] should_fail_usercopy+0x1a/0x20 [ 1762.082523][T31828] copy_page_from_iter_atomic+0x22d/0xcf0 [ 1762.088348][T31828] ? folio_test_hugetlb+0x3a/0x70 [ 1762.093432][T31828] ? shmem_write_begin+0x12a/0x1d0 [ 1762.098663][T31828] generic_perform_write+0x212/0x410 [ 1762.104026][T31828] ? file_update_time+0x1cd/0x200 [ 1762.109084][T31828] __generic_file_write_iter+0xa1/0x120 [ 1762.114708][T31828] generic_file_write_iter+0x7d/0x1c0 [ 1762.120196][T31828] vfs_write+0x4ab/0x7d0 [ 1762.124635][T31828] ksys_write+0xeb/0x1a0 [ 1762.128915][T31828] __x64_sys_write+0x42/0x50 [ 1762.133595][T31828] do_syscall_64+0x41/0xc0 [ 1762.138042][T31828] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1762.144022][T31828] RIP: 0033:0x7f3d42967b29 [ 1762.148479][T31828] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1762.168130][T31828] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1762.176578][T31828] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1762.184600][T31828] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1762.192669][T31828] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1762.200744][T31828] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1762.208753][T31828] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1762.216851][T31828] 07:59:40 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 3) 07:59:40 executing program 0: socket$inet(0x2, 0x5, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000002640)={'sit0\x00', &(0x7f00000025c0)={'gretap0\x00', 0x0, 0x700, 0x8, 0x7fff, 0x6, {{0x5, 0x4, 0x3, 0x0, 0x14, 0x67, 0x0, 0xff, 0x4, 0x0, @empty, @remote}}}}) 07:59:40 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (fail_nth: 1) 07:59:40 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x200000000000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:40 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x7ff, 0x0, 0x4}}}, 0xa0) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') 07:59:40 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:40 executing program 0: socket$inet(0x2, 0x5, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000002640)={'sit0\x00', &(0x7f00000025c0)={'gretap0\x00', 0x0, 0x700, 0x8, 0x7fff, 0x6, {{0x5, 0x4, 0x3, 0x0, 0x14, 0x67, 0x0, 0xff, 0x4, 0x0, @empty, @remote}}}}) [ 1762.348822][T31852] FAULT_INJECTION: forcing a failure. [ 1762.348822][T31852] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1762.362005][T31852] CPU: 0 PID: 31852 Comm: syz-executor.1 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1762.372445][T31852] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1762.382528][T31852] Call Trace: [ 1762.382790][T31859] FAULT_INJECTION: forcing a failure. [ 1762.382790][T31859] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1762.385811][T31852] [ 1762.385820][T31852] dump_stack_lvl+0xda/0x130 [ 1762.406569][T31852] dump_stack+0x15/0x20 [ 1762.410742][T31852] should_fail_ex+0x21f/0x230 [ 1762.415494][T31852] should_fail+0xb/0x10 [ 1762.419656][T31852] should_fail_usercopy+0x1a/0x20 [ 1762.424721][T31852] copy_page_from_iter_atomic+0x22d/0xcf0 [ 1762.430455][T31852] ? folio_test_hugetlb+0x3a/0x70 [ 1762.435497][T31852] ? shmem_write_begin+0x12a/0x1d0 [ 1762.440649][T31852] generic_perform_write+0x212/0x410 [ 1762.445948][T31852] ? file_update_time+0x1cd/0x200 [ 1762.450999][T31852] __generic_file_write_iter+0xa1/0x120 [ 1762.456576][T31852] generic_file_write_iter+0x7d/0x1c0 [ 1762.462040][T31852] vfs_write+0x4ab/0x7d0 [ 1762.466354][T31852] ksys_write+0xeb/0x1a0 [ 1762.470615][T31852] __x64_sys_write+0x42/0x50 [ 1762.475311][T31852] do_syscall_64+0x41/0xc0 [ 1762.479751][T31852] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1762.485677][T31852] RIP: 0033:0x7fad3c58db29 [ 1762.490132][T31852] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1762.509842][T31852] RSP: 002b:00007fad3b9100c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1762.518314][T31852] RAX: ffffffffffffffda RBX: 00007fad3c6acf80 RCX: 00007fad3c58db29 [ 1762.526291][T31852] RDX: 0000000000000018 RSI: 0000000020000180 RDI: 0000000000000003 [ 1762.534266][T31852] RBP: 00007fad3b910120 R08: 0000000000000000 R09: 0000000000000000 [ 1762.542255][T31852] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1762.550226][T31852] R13: 000000000000000b R14: 00007fad3c6acf80 R15: 00007fffecbb8c58 [ 1762.558202][T31852] [ 1762.561225][T31859] CPU: 1 PID: 31859 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1762.571684][T31859] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1762.581767][T31859] Call Trace: [ 1762.585080][T31859] [ 1762.588073][T31859] dump_stack_lvl+0xda/0x130 [ 1762.592693][T31859] dump_stack+0x15/0x20 [ 1762.596877][T31859] should_fail_ex+0x21f/0x230 [ 1762.601585][T31859] __should_fail_alloc_page+0xfd/0x110 [ 1762.607112][T31859] __alloc_pages+0x108/0x340 [ 1762.611796][T31859] vma_alloc_folio+0x6a3/0x8c0 [ 1762.616606][T31859] shmem_get_folio_gfp+0x801/0x1200 [ 1762.621916][T31859] shmem_write_begin+0xa6/0x1d0 [ 1762.626860][T31859] generic_perform_write+0x1cf/0x410 [ 1762.632209][T31859] ? shmem_write_begin+0x1d0/0x1d0 [ 1762.637360][T31859] __generic_file_write_iter+0xa1/0x120 [ 1762.643002][T31859] generic_file_write_iter+0x7d/0x1c0 07:59:40 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (fail_nth: 2) 07:59:40 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x300000000000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:40 executing program 0: socket$inet(0x2, 0x5, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000002640)={'sit0\x00', &(0x7f00000025c0)={'gretap0\x00', 0x0, 0x700, 0x8, 0x7fff, 0x6, {{0x5, 0x4, 0x3, 0x0, 0x14, 0x67, 0x0, 0xff, 0x4, 0x0, @empty, @remote}}}}) 07:59:40 executing program 5: openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') 07:59:40 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') [ 1762.648510][T31859] vfs_write+0x4ab/0x7d0 [ 1762.652811][T31859] ksys_write+0xeb/0x1a0 [ 1762.657134][T31859] __x64_sys_write+0x42/0x50 [ 1762.661792][T31859] do_syscall_64+0x41/0xc0 [ 1762.666286][T31859] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1762.672237][T31859] RIP: 0033:0x7f3d42967b29 [ 1762.676674][T31859] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1762.687733][T31873] FAULT_INJECTION: forcing a failure. [ 1762.687733][T31873] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1762.696335][T31859] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1762.717840][T31859] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1762.725890][T31859] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1762.733872][T31859] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1762.741852][T31859] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1762.749857][T31859] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1762.757947][T31859] [ 1762.760968][T31873] CPU: 0 PID: 31873 Comm: syz-executor.1 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1762.771441][T31873] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1762.781520][T31873] Call Trace: [ 1762.784814][T31873] [ 1762.787936][T31873] dump_stack_lvl+0xda/0x130 [ 1762.792561][T31873] dump_stack+0x15/0x20 07:59:40 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 4) 07:59:40 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:40 executing program 5: prctl$PR_SET_NAME(0xf, 0x0) 07:59:40 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x700000000000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:40 executing program 0: r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) [ 1762.796900][T31873] should_fail_ex+0x21f/0x230 [ 1762.801601][T31873] should_fail+0xb/0x10 [ 1762.805787][T31873] should_fail_usercopy+0x1a/0x20 [ 1762.811013][T31873] _copy_to_user+0x1e/0x90 [ 1762.815457][T31873] simple_read_from_buffer+0xa0/0x110 [ 1762.820891][T31873] proc_fail_nth_read+0xfc/0x140 [ 1762.825922][T31873] ? proc_fault_inject_write+0x210/0x210 [ 1762.831640][T31873] vfs_read+0x19f/0x5c0 [ 1762.835822][T31873] ? __fget_files+0x1c4/0x200 [ 1762.840523][T31873] ? mutex_lock+0xd/0x30 [ 1762.844907][T31873] ksys_read+0xeb/0x1a0 [ 1762.849169][T31873] __x64_sys_read+0x42/0x50 [ 1762.853708][T31873] do_syscall_64+0x41/0xc0 [ 1762.858145][T31873] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1762.864146][T31873] RIP: 0033:0x7fad3c58c7cc [ 1762.868577][T31873] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 59 81 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 af 81 02 00 48 [ 1762.888216][T31873] RSP: 002b:00007fad3b9100c0 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 07:59:40 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:40 executing program 5: prctl$PR_SET_NAME(0xf, 0x0) 07:59:40 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x800000000000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:40 executing program 4: ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000040)={0x1ff, 0x8000, 0xffff, 0x2, 0x8, "0ff800688003b8ec10c3f7c65bcbebeb57068e"}) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:40 executing program 0: r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) [ 1762.896683][T31873] RAX: ffffffffffffffda RBX: 00007fad3c6acf80 RCX: 00007fad3c58c7cc [ 1762.904679][T31873] RDX: 000000000000000f RSI: 00007fad3b910130 RDI: 0000000000000004 [ 1762.912659][T31873] RBP: 00007fad3b910120 R08: 0000000000000000 R09: 0000000000000000 [ 1762.920703][T31873] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1762.928736][T31873] R13: 000000000000000b R14: 00007fad3c6acf80 R15: 00007fffecbb8c58 [ 1762.936757][T31873] 07:59:41 executing program 0: r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) 07:59:41 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa02, {0x0}}, 0x18) 07:59:41 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 5) 07:59:41 executing program 5: prctl$PR_SET_NAME(0xf, 0x0) 07:59:41 executing program 4: ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000040)={0x1ff, 0x8000, 0xffff, 0x2, 0x8, "0ff800688003b8ec10c3f7c65bcbebeb57068e"}) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:41 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa05, {0x0}}, 0x18) 07:59:41 executing program 0: r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000002640)={'sit0\x00', 0x0}) 07:59:41 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') (fail_nth: 1) 07:59:41 executing program 4: ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000040)={0x1ff, 0x8000, 0xffff, 0x2, 0x8, "0ff800688003b8ec10c3f7c65bcbebeb57068e"}) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000040)={0x1ff, 0x8000, 0xffff, 0x2, 0x8, "0ff800688003b8ec10c3f7c65bcbebeb57068e"}) (async) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) 07:59:41 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x1000000000000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:41 executing program 0: r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000002640)={'sit0\x00', 0x0}) 07:59:41 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa06, {0x0}}, 0x18) [ 1763.080893][T31909] FAULT_INJECTION: forcing a failure. [ 1763.080893][T31909] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1763.083569][T31911] FAULT_INJECTION: forcing a failure. [ 1763.083569][T31911] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1763.094060][T31909] CPU: 0 PID: 31909 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1763.117590][T31909] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1763.127668][T31909] Call Trace: [ 1763.130960][T31909] [ 1763.133893][T31909] dump_stack_lvl+0xda/0x130 [ 1763.138528][T31909] dump_stack+0x15/0x20 [ 1763.142695][T31909] should_fail_ex+0x21f/0x230 [ 1763.147381][T31909] should_fail+0xb/0x10 [ 1763.151539][T31909] should_fail_usercopy+0x1a/0x20 [ 1763.156653][T31909] copy_page_from_iter_atomic+0x22d/0xcf0 [ 1763.162564][T31909] ? folio_test_hugetlb+0x3a/0x70 [ 1763.167650][T31909] ? shmem_write_begin+0x12a/0x1d0 [ 1763.172770][T31909] generic_perform_write+0x212/0x410 [ 1763.178072][T31909] ? shmem_write_begin+0x1d0/0x1d0 [ 1763.183208][T31909] __generic_file_write_iter+0xa1/0x120 [ 1763.188771][T31909] generic_file_write_iter+0x7d/0x1c0 [ 1763.194162][T31909] vfs_write+0x4ab/0x7d0 [ 1763.198497][T31909] ksys_write+0xeb/0x1a0 [ 1763.202851][T31909] __x64_sys_write+0x42/0x50 [ 1763.207527][T31909] do_syscall_64+0x41/0xc0 [ 1763.211953][T31909] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1763.217905][T31909] RIP: 0033:0x7f3d42967b29 [ 1763.222349][T31909] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1763.242124][T31909] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1763.250573][T31909] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1763.258593][T31909] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1763.266569][T31909] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1763.274546][T31909] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1763.282549][T31909] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1763.290531][T31909] [ 1763.293550][T31911] CPU: 1 PID: 31911 Comm: syz-executor.5 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1763.304069][T31911] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1763.314213][T31911] Call Trace: [ 1763.317505][T31911] [ 1763.320449][T31911] dump_stack_lvl+0xda/0x130 [ 1763.325105][T31911] dump_stack+0x15/0x20 [ 1763.329286][T31911] should_fail_ex+0x21f/0x230 [ 1763.334036][T31911] should_fail+0xb/0x10 [ 1763.338214][T31911] should_fail_usercopy+0x1a/0x20 [ 1763.343295][T31911] strncpy_from_user+0x25/0x270 [ 1763.348272][T31911] ? security_task_prctl+0xb1/0xe0 [ 1763.353496][T31911] __se_sys_prctl+0x9ba/0x1db0 [ 1763.358296][T31911] ? _parse_integer_limit+0x163/0x180 [ 1763.363725][T31911] ? _parse_integer+0x27/0x30 [ 1763.368438][T31911] ? kstrtoull+0x110/0x140 [ 1763.372876][T31911] ? kstrtouint_from_user+0xb0/0xe0 [ 1763.378129][T31911] ? 0xffffffff81000000 [ 1763.382299][T31911] ? __rcu_read_unlock+0x4d/0x70 [ 1763.387270][T31911] ? get_pid_task+0x8e/0xc0 [ 1763.391835][T31911] ? proc_fail_nth_write+0x129/0x150 [ 1763.397327][T31911] ? proc_fail_nth_read+0x140/0x140 [ 1763.402568][T31911] ? vfs_write+0x676/0x7d0 [ 1763.407147][T31911] ? __fget_files+0x1c4/0x200 [ 1763.411868][T31911] ? mutex_lock+0xd/0x30 [ 1763.416148][T31911] ? fput+0x112/0x140 [ 1763.420239][T31911] ? fpregs_assert_state_consistent+0x80/0x90 [ 1763.426387][T31911] __x64_sys_prctl+0x67/0x80 07:59:41 executing program 0: r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000002640)={'sit0\x00', 0x0}) 07:59:41 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x6400000000000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) [ 1763.431064][T31911] do_syscall_64+0x41/0xc0 [ 1763.435564][T31911] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1763.441517][T31911] RIP: 0033:0x7f3f62523b29 [ 1763.445949][T31911] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1763.465585][T31911] RSP: 002b:00007f3f618a60c8 EFLAGS: 00000246 ORIG_RAX: 000000000000009d [ 1763.474050][T31911] RAX: ffffffffffffffda RBX: 00007f3f62642f80 RCX: 00007f3f62523b29 07:59:41 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 6) 07:59:41 executing program 0: r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000002640)={'sit0\x00', &(0x7f00000025c0)={'gretap0\x00', 0x0, 0x0, 0x8, 0x7fff, 0x6, {{0x5, 0x4, 0x3, 0x0, 0x14, 0x67, 0x0, 0xff, 0x4, 0x0, @empty, @remote}}}}) 07:59:41 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa08, {0x0}}, 0x18) 07:59:41 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x129a41, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) write$cgroup_netprio_ifpriomap(r1, &(0x7f0000000000)=ANY=[@ANYBLOB='pimreg2X '], 0x9) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x4622, @rand_addr=0x64010101}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:41 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') (fail_nth: 2) 07:59:41 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0xdb06000000000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) [ 1763.482045][T31911] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 000000000000000f [ 1763.490033][T31911] RBP: 00007f3f618a6120 R08: 0000000000000000 R09: 0000000000000000 [ 1763.498027][T31911] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1763.506013][T31911] R13: 000000000000000b R14: 00007f3f62642f80 R15: 00007ffcf4ea6938 [ 1763.514003][T31911] 07:59:41 executing program 0: r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000002640)={'sit0\x00', &(0x7f00000025c0)={'gretap0\x00', 0x0, 0x0, 0x8, 0x7fff, 0x6, {{0x5, 0x4, 0x3, 0x0, 0x14, 0x67, 0x0, 0xff, 0x4, 0x0, @empty, @remote}}}}) 07:59:41 executing program 0: r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000002640)={'sit0\x00', &(0x7f00000025c0)={'gretap0\x00', 0x0, 0x0, 0x8, 0x7fff, 0x6, {{0x5, 0x4, 0x3, 0x0, 0x14, 0x67, 0x0, 0xff, 0x4, 0x0, @empty, @remote}}}}) [ 1763.561811][T31933] FAULT_INJECTION: forcing a failure. [ 1763.561811][T31933] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1763.574955][T31933] CPU: 1 PID: 31933 Comm: /dev/bsg Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1763.584945][T31933] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1763.595035][T31933] Call Trace: [ 1763.598336][T31933] [ 1763.601276][T31933] dump_stack_lvl+0xda/0x130 [ 1763.605955][T31933] dump_stack+0x15/0x20 07:59:41 executing program 0: r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000002640)={'sit0\x00', &(0x7f00000025c0)={'gretap0\x00', 0x0, 0x700, 0x0, 0x7fff, 0x6, {{0x5, 0x4, 0x3, 0x0, 0x14, 0x67, 0x0, 0xff, 0x4, 0x0, @empty, @remote}}}}) 07:59:41 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0xfefdffff00000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:41 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa18, {0x0}}, 0x18) 07:59:41 executing program 0: r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000002640)={'sit0\x00', &(0x7f00000025c0)={'gretap0\x00', 0x0, 0x700, 0x0, 0x0, 0x6, {{0x5, 0x4, 0x3, 0x0, 0x14, 0x67, 0x0, 0xff, 0x4, 0x0, @empty, @remote}}}}) [ 1763.610142][T31933] should_fail_ex+0x21f/0x230 [ 1763.614836][T31933] should_fail+0xb/0x10 [ 1763.619110][T31933] should_fail_usercopy+0x1a/0x20 [ 1763.624168][T31933] _copy_to_user+0x1e/0x90 [ 1763.628661][T31933] simple_read_from_buffer+0xa0/0x110 [ 1763.634086][T31933] proc_fail_nth_read+0xfc/0x140 [ 1763.639083][T31933] ? proc_fault_inject_write+0x210/0x210 [ 1763.644799][T31933] vfs_read+0x19f/0x5c0 [ 1763.649052][T31933] ? __fget_files+0x1c4/0x200 [ 1763.653773][T31933] ? mutex_lock+0xd/0x30 [ 1763.658089][T31933] ksys_read+0xeb/0x1a0 [ 1763.662334][T31933] __x64_sys_read+0x42/0x50 [ 1763.666885][T31933] do_syscall_64+0x41/0xc0 [ 1763.671336][T31933] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1763.677504][T31933] RIP: 0033:0x7f3f625227cc [ 1763.681943][T31933] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 59 81 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 af 81 02 00 48 [ 1763.701574][T31933] RSP: 002b:00007f3f618a60c0 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1763.703524][T31951] FAULT_INJECTION: forcing a failure. [ 1763.703524][T31951] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1763.710018][T31933] RAX: ffffffffffffffda RBX: 00007f3f62642f80 RCX: 00007f3f625227cc [ 1763.710037][T31933] RDX: 000000000000000f RSI: 00007f3f618a6130 RDI: 0000000000000003 [ 1763.739231][T31933] RBP: 00007f3f618a6120 R08: 0000000000000000 R09: 0000000000000000 [ 1763.747291][T31933] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1763.755271][T31933] R13: 000000000000000b R14: 00007f3f62642f80 R15: 00007ffcf4ea6938 [ 1763.763250][T31933] [ 1763.766292][T31951] CPU: 0 PID: 31951 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1763.776736][T31951] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1763.786908][T31951] Call Trace: [ 1763.790202][T31951] [ 1763.793141][T31951] dump_stack_lvl+0xda/0x130 [ 1763.797771][T31951] dump_stack+0x15/0x20 [ 1763.801987][T31951] should_fail_ex+0x21f/0x230 [ 1763.806692][T31951] __should_fail_alloc_page+0xfd/0x110 [ 1763.812342][T31951] __alloc_pages+0x108/0x340 [ 1763.816935][T31951] vma_alloc_folio+0x6a3/0x8c0 [ 1763.821759][T31951] shmem_get_folio_gfp+0x801/0x1200 [ 1763.826974][T31951] shmem_write_begin+0xa6/0x1d0 [ 1763.831848][T31951] generic_perform_write+0x1cf/0x410 [ 1763.837182][T31951] ? shmem_write_begin+0x1d0/0x1d0 [ 1763.842372][T31951] __generic_file_write_iter+0xa1/0x120 [ 1763.848035][T31951] generic_file_write_iter+0x7d/0x1c0 [ 1763.853418][T31951] vfs_write+0x4ab/0x7d0 [ 1763.857710][T31951] ksys_write+0xeb/0x1a0 [ 1763.862037][T31951] __x64_sys_write+0x42/0x50 [ 1763.866680][T31951] do_syscall_64+0x41/0xc0 [ 1763.871130][T31951] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1763.877054][T31951] RIP: 0033:0x7f3d42967b29 [ 1763.881534][T31951] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1763.901311][T31951] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 07:59:41 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 7) 07:59:41 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x129a41, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) (async) write$cgroup_netprio_ifpriomap(r1, &(0x7f0000000000)=ANY=[@ANYBLOB='pimreg2X '], 0x9) (async) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x4622, @rand_addr=0x64010101}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:41 executing program 0: r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000002640)={'sit0\x00', &(0x7f00000025c0)={'gretap0\x00', 0x0, 0x700, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x3, 0x0, 0x14, 0x67, 0x0, 0xff, 0x4, 0x0, @empty, @remote}}}}) 07:59:41 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:41 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x2}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:41 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') 07:59:41 executing program 5: prctl$PR_SET_NAME(0x2, &(0x7f0000000040)='/dev/bsg\x00') 07:59:41 executing program 0: r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000002640)={'sit0\x00', &(0x7f00000025c0)={'gretap0\x00', 0x0, 0x700, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x67, 0x0, 0xff, 0x4, 0x0, @empty, @remote}}}}) 07:59:41 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x2}}, 0x18) [ 1763.909765][T31951] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1763.917831][T31951] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1763.925861][T31951] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1763.933832][T31951] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1763.941854][T31951] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1763.949827][T31951] 07:59:41 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x129a41, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) pipe(&(0x7f0000000140)) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) write$cgroup_netprio_ifpriomap(r1, &(0x7f0000000000)=ANY=[@ANYBLOB='pimreg2X '], 0x9) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x4622, @rand_addr=0x64010101}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:42 executing program 4: r0 = gettid() process_vm_writev(r0, &(0x7f0000000380)=[{0x0}, {&(0x7f0000000080)=""/252, 0xfc}, {&(0x7f0000000180)=""/108, 0x6c}], 0x3, &(0x7f0000000600)=[{&(0x7f0000000400)=""/17, 0x11}, {&(0x7f0000000440)=""/246, 0xf6}], 0x2, 0x0) r1 = getpgrp(r0) process_vm_writev(r1, &(0x7f0000001280)=[{&(0x7f0000000f00)=""/223, 0xdf}, {&(0x7f0000001000)=""/190, 0xbe}, {&(0x7f00000010c0)=""/179, 0xb3}, {&(0x7f0000001180)=""/206, 0xce}], 0x4, &(0x7f00000013c0)=[{&(0x7f00000012c0)=""/63, 0x3f}, {&(0x7f0000001300)=""/135, 0x87}], 0x2, 0x0) ptrace$ARCH_GET_FS(0x1e, r0, &(0x7f0000000080), 0x1003) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1, @ib={0x1b, 0x0, 0x4, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) r3 = gettid() process_vm_writev(r3, &(0x7f0000000380)=[{0x0}, {&(0x7f0000000080)=""/252, 0xfc}, {&(0x7f0000000180)=""/108, 0x6c}], 0x3, &(0x7f0000000600)=[{&(0x7f0000000400)=""/17, 0x11}, {&(0x7f0000000440)=""/246, 0xf6}], 0x2, 0x0) syz_open_procfs(r3, &(0x7f0000000240)='net/ip_vs_stats_percpu\x00') write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r6) getsockopt$EBT_SO_GET_INIT_INFO(r5, 0x0, 0x82, &(0x7f0000001400)={'nat\x00', 0x0, 0x0, 0x0, [0x9, 0x2, 0x368b8bcb, 0x101, 0x2, 0x8000]}, &(0x7f0000001480)=0x78) recvmsg$can_raw(r6, &(0x7f00000008c0)={&(0x7f0000000540)=@x25={0x9, @remote}, 0x80, &(0x7f0000000ec0)=[{&(0x7f0000000d00)=""/159, 0x9f}, {&(0x7f00000005c0)=""/3, 0x3}, {&(0x7f0000000dc0)=""/50, 0x32}, {&(0x7f0000000e00)=""/142, 0x8e}], 0x4, &(0x7f00000007c0)=""/223, 0xdf}, 0x2) getpgrp(r0) getpgrp(r0) process_vm_writev(r3, &(0x7f0000000900)=[{&(0x7f0000000280)=""/234, 0xea}, {&(0x7f0000000640)=""/244, 0xf4}, {&(0x7f0000000b40)=""/168, 0xa8}, {&(0x7f00000003c0)=""/44, 0x2c}, {&(0x7f0000000740)=""/110, 0x6e}, {&(0x7f0000000540)}, {&(0x7f0000000c00)=""/231, 0xe7}], 0x7, &(0x7f0000000b00)=[{&(0x7f0000000980)=""/104, 0x68}, {&(0x7f0000000a00)=""/254, 0xfe}], 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x1e, 0x8001, 0x9, 0xe5, 0x1080, r4, 0x8001, '\x00', 0x0, r2, 0x0, 0x2}, 0x48) 07:59:42 executing program 5: prctl$PR_SET_NAME(0x3, &(0x7f0000000040)='/dev/bsg\x00') [ 1764.000243][T31967] FAULT_INJECTION: forcing a failure. [ 1764.000243][T31967] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1764.013407][T31967] CPU: 1 PID: 31967 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1764.023931][T31967] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1764.034019][T31967] Call Trace: [ 1764.037311][T31967] [ 1764.040266][T31967] dump_stack_lvl+0xda/0x130 [ 1764.044980][T31967] dump_stack+0x15/0x20 [ 1764.049162][T31967] should_fail_ex+0x21f/0x230 [ 1764.053862][T31967] should_fail+0xb/0x10 [ 1764.058125][T31967] should_fail_usercopy+0x1a/0x20 [ 1764.063239][T31967] copy_page_from_iter_atomic+0x22d/0xcf0 [ 1764.069280][T31967] ? folio_test_hugetlb+0x3a/0x70 [ 1764.074386][T31967] ? shmem_write_begin+0x12a/0x1d0 [ 1764.079532][T31967] generic_perform_write+0x212/0x410 [ 1764.084863][T31967] ? shmem_write_begin+0x1d0/0x1d0 [ 1764.090001][T31967] __generic_file_write_iter+0xa1/0x120 [ 1764.095579][T31967] generic_file_write_iter+0x7d/0x1c0 [ 1764.100984][T31967] vfs_write+0x4ab/0x7d0 [ 1764.105240][T31967] ksys_write+0xeb/0x1a0 [ 1764.109519][T31967] __x64_sys_write+0x42/0x50 [ 1764.114134][T31967] do_syscall_64+0x41/0xc0 [ 1764.118627][T31967] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1764.124545][T31967] RIP: 0033:0x7f3d42967b29 [ 1764.128984][T31967] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1764.148592][T31967] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1764.157098][T31967] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1764.165097][T31967] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1764.173065][T31967] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1764.181037][T31967] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1764.189096][T31967] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1764.197077][T31967] 07:59:42 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 8) 07:59:42 executing program 0: r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000002640)={'sit0\x00', &(0x7f00000025c0)={'gretap0\x00', 0x0, 0x700, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0xff, 0x4, 0x0, @empty, @remote}}}}) 07:59:42 executing program 4: r0 = gettid() process_vm_writev(r0, &(0x7f0000000380)=[{0x0}, {&(0x7f0000000080)=""/252, 0xfc}, {&(0x7f0000000180)=""/108, 0x6c}], 0x3, &(0x7f0000000600)=[{&(0x7f0000000400)=""/17, 0x11}, {&(0x7f0000000440)=""/246, 0xf6}], 0x2, 0x0) (async) r1 = getpgrp(r0) process_vm_writev(r1, &(0x7f0000001280)=[{&(0x7f0000000f00)=""/223, 0xdf}, {&(0x7f0000001000)=""/190, 0xbe}, {&(0x7f00000010c0)=""/179, 0xb3}, {&(0x7f0000001180)=""/206, 0xce}], 0x4, &(0x7f00000013c0)=[{&(0x7f00000012c0)=""/63, 0x3f}, {&(0x7f0000001300)=""/135, 0x87}], 0x2, 0x0) ptrace$ARCH_GET_FS(0x1e, r0, &(0x7f0000000080), 0x1003) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1, @ib={0x1b, 0x0, 0x4, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) r3 = gettid() process_vm_writev(r3, &(0x7f0000000380)=[{0x0}, {&(0x7f0000000080)=""/252, 0xfc}, {&(0x7f0000000180)=""/108, 0x6c}], 0x3, &(0x7f0000000600)=[{&(0x7f0000000400)=""/17, 0x11}, {&(0x7f0000000440)=""/246, 0xf6}], 0x2, 0x0) (async) syz_open_procfs(r3, &(0x7f0000000240)='net/ip_vs_stats_percpu\x00') (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r6) (async) getsockopt$EBT_SO_GET_INIT_INFO(r5, 0x0, 0x82, &(0x7f0000001400)={'nat\x00', 0x0, 0x0, 0x0, [0x9, 0x2, 0x368b8bcb, 0x101, 0x2, 0x8000]}, &(0x7f0000001480)=0x78) (async) recvmsg$can_raw(r6, &(0x7f00000008c0)={&(0x7f0000000540)=@x25={0x9, @remote}, 0x80, &(0x7f0000000ec0)=[{&(0x7f0000000d00)=""/159, 0x9f}, {&(0x7f00000005c0)=""/3, 0x3}, {&(0x7f0000000dc0)=""/50, 0x32}, {&(0x7f0000000e00)=""/142, 0x8e}], 0x4, &(0x7f00000007c0)=""/223, 0xdf}, 0x2) getpgrp(r0) (async) getpgrp(r0) (async) process_vm_writev(r3, &(0x7f0000000900)=[{&(0x7f0000000280)=""/234, 0xea}, {&(0x7f0000000640)=""/244, 0xf4}, {&(0x7f0000000b40)=""/168, 0xa8}, {&(0x7f00000003c0)=""/44, 0x2c}, {&(0x7f0000000740)=""/110, 0x6e}, {&(0x7f0000000540)}, {&(0x7f0000000c00)=""/231, 0xe7}], 0x7, &(0x7f0000000b00)=[{&(0x7f0000000980)=""/104, 0x68}, {&(0x7f0000000a00)=""/254, 0xfe}], 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x1e, 0x8001, 0x9, 0xe5, 0x1080, r4, 0x8001, '\x00', 0x0, r2, 0x0, 0x2}, 0x48) 07:59:42 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x5}}, 0x18) 07:59:42 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x3}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:42 executing program 5: prctl$PR_SET_NAME(0x4, &(0x7f0000000040)='/dev/bsg\x00') 07:59:42 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x6}}, 0x18) 07:59:42 executing program 5: prctl$PR_SET_NAME(0x7, &(0x7f0000000040)='/dev/bsg\x00') 07:59:42 executing program 4: r0 = gettid() process_vm_writev(r0, &(0x7f0000000380)=[{0x0}, {&(0x7f0000000080)=""/252, 0xfc}, {&(0x7f0000000180)=""/108, 0x6c}], 0x3, &(0x7f0000000600)=[{&(0x7f0000000400)=""/17, 0x11}, {&(0x7f0000000440)=""/246, 0xf6}], 0x2, 0x0) (async) r1 = getpgrp(r0) process_vm_writev(r1, &(0x7f0000001280)=[{&(0x7f0000000f00)=""/223, 0xdf}, {&(0x7f0000001000)=""/190, 0xbe}, {&(0x7f00000010c0)=""/179, 0xb3}, {&(0x7f0000001180)=""/206, 0xce}], 0x4, &(0x7f00000013c0)=[{&(0x7f00000012c0)=""/63, 0x3f}, {&(0x7f0000001300)=""/135, 0x87}], 0x2, 0x0) (async) ptrace$ARCH_GET_FS(0x1e, r0, &(0x7f0000000080), 0x1003) (async) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1, @ib={0x1b, 0x0, 0x4, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) r3 = gettid() process_vm_writev(r3, &(0x7f0000000380)=[{0x0}, {&(0x7f0000000080)=""/252, 0xfc}, {&(0x7f0000000180)=""/108, 0x6c}], 0x3, &(0x7f0000000600)=[{&(0x7f0000000400)=""/17, 0x11}, {&(0x7f0000000440)=""/246, 0xf6}], 0x2, 0x0) syz_open_procfs(r3, &(0x7f0000000240)='net/ip_vs_stats_percpu\x00') (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r6) (async, rerun: 32) getsockopt$EBT_SO_GET_INIT_INFO(r5, 0x0, 0x82, &(0x7f0000001400)={'nat\x00', 0x0, 0x0, 0x0, [0x9, 0x2, 0x368b8bcb, 0x101, 0x2, 0x8000]}, &(0x7f0000001480)=0x78) (async, rerun: 32) recvmsg$can_raw(r6, &(0x7f00000008c0)={&(0x7f0000000540)=@x25={0x9, @remote}, 0x80, &(0x7f0000000ec0)=[{&(0x7f0000000d00)=""/159, 0x9f}, {&(0x7f00000005c0)=""/3, 0x3}, {&(0x7f0000000dc0)=""/50, 0x32}, {&(0x7f0000000e00)=""/142, 0x8e}], 0x4, &(0x7f00000007c0)=""/223, 0xdf}, 0x2) getpgrp(r0) (async) getpgrp(r0) process_vm_writev(r3, &(0x7f0000000900)=[{&(0x7f0000000280)=""/234, 0xea}, {&(0x7f0000000640)=""/244, 0xf4}, {&(0x7f0000000b40)=""/168, 0xa8}, {&(0x7f00000003c0)=""/44, 0x2c}, {&(0x7f0000000740)=""/110, 0x6e}, {&(0x7f0000000540)}, {&(0x7f0000000c00)=""/231, 0xe7}], 0x7, &(0x7f0000000b00)=[{&(0x7f0000000980)=""/104, 0x68}, {&(0x7f0000000a00)=""/254, 0xfe}], 0x2, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x1e, 0x8001, 0x9, 0xe5, 0x1080, r4, 0x8001, '\x00', 0x0, r2, 0x0, 0x2}, 0x48) 07:59:42 executing program 0: r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000002640)={'sit0\x00', &(0x7f00000025c0)={'gretap0\x00', 0x0, 0x700, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x4, 0x0, @empty, @remote}}}}) 07:59:42 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x8}}, 0x18) 07:59:42 executing program 0: r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000002640)={'sit0\x00', &(0x7f00000025c0)={'gretap0\x00', 0x0, 0x700, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x4, 0x0, @empty, @remote}}}}) [ 1764.354110][T31995] FAULT_INJECTION: forcing a failure. [ 1764.354110][T31995] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1764.367372][T31995] CPU: 1 PID: 31995 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1764.377838][T31995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1764.387925][T31995] Call Trace: [ 1764.391290][T31995] [ 1764.394245][T31995] dump_stack_lvl+0xda/0x130 [ 1764.398858][T31995] dump_stack+0x15/0x20 [ 1764.403128][T31995] should_fail_ex+0x21f/0x230 [ 1764.407835][T31995] __should_fail_alloc_page+0xfd/0x110 [ 1764.413340][T31995] __alloc_pages+0x108/0x340 [ 1764.417963][T31995] vma_alloc_folio+0x6a3/0x8c0 [ 1764.422768][T31995] shmem_get_folio_gfp+0x801/0x1200 [ 1764.428089][T31995] shmem_write_begin+0xa6/0x1d0 [ 1764.433107][T31995] generic_perform_write+0x1cf/0x410 [ 1764.438493][T31995] ? shmem_write_begin+0x1d0/0x1d0 [ 1764.443639][T31995] __generic_file_write_iter+0xa1/0x120 [ 1764.449261][T31995] generic_file_write_iter+0x7d/0x1c0 [ 1764.454709][T31995] vfs_write+0x4ab/0x7d0 [ 1764.459038][T31995] ksys_write+0xeb/0x1a0 [ 1764.463373][T31995] __x64_sys_write+0x42/0x50 [ 1764.468048][T31995] do_syscall_64+0x41/0xc0 [ 1764.472679][T31995] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1764.478648][T31995] RIP: 0033:0x7f3d42967b29 [ 1764.483084][T31995] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 07:59:42 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 9) 07:59:42 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x18}}, 0x18) 07:59:42 executing program 0: r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000002640)={'sit0\x00', &(0x7f00000025c0)={'gretap0\x00', 0x0, 0x700, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x4, 0x0, @empty, @remote}}}}) 07:59:42 executing program 5: prctl$PR_SET_NAME(0x8, &(0x7f0000000040)='/dev/bsg\x00') 07:59:42 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$DEVLINK_CMD_PORT_GET(r1, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="884000206fff78cad871103fd66afeabe45d9a0830774e341c0ff936171cb97d92c3778b8c3229a58f182666a5d3e2a0daed518214260ae5c0e55dfd65f8daf17d2686b1027c33d26f59e2c4a54a9df20112338e8090706b0f9551cd2a25378af2afd1828d64b2fe3560a6a802baef4ca2db839b46570604709ad3e9d50c63085567777ff472e7ab52eb99b0c8e21b5ec9fafdbeed235a1c765833682931f8b5280089fc996ab96a", @ANYRES16=0x0, @ANYBLOB="00042cbd7000fbdbdf25050000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000800030003000000080001007063690011000200303030303a30303a31302e300000000008000300060000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000800030000000000"], 0x88}, 0x1, 0x0, 0x0, 0x800}, 0x20000050) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000340), r2) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:42 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x7}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) [ 1764.502751][T31995] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1764.511218][T31995] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1764.519185][T31995] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1764.527152][T31995] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1764.535125][T31995] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1764.543193][T31995] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1764.551180][T31995] 07:59:42 executing program 0: r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000002640)={'sit0\x00', &(0x7f00000025c0)={'gretap0\x00', 0x0, 0x700, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0xff, 0x0, 0x0, @empty, @remote}}}}) 07:59:42 executing program 5: prctl$PR_SET_NAME(0xd, &(0x7f0000000040)='/dev/bsg\x00') 07:59:42 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x500}}, 0x18) 07:59:42 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$DEVLINK_CMD_PORT_GET(r1, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="884000206fff78cad871103fd66afeabe45d9a0830774e341c0ff936171cb97d92c3778b8c3229a58f182666a5d3e2a0daed518214260ae5c0e55dfd65f8daf17d2686b1027c33d26f59e2c4a54a9df20112338e8090706b0f9551cd2a25378af2afd1828d64b2fe3560a6a802baef4ca2db839b46570604709ad3e9d50c63085567777ff472e7ab52eb99b0c8e21b5ec9fafdbeed235a1c765833682931f8b5280089fc996ab96a", @ANYRES16=0x0, @ANYBLOB="00042cbd7000fbdbdf25050000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000800030003000000080001007063690011000200303030303a30303a31302e300000000008000300060000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000800030000000000"], 0x88}, 0x1, 0x0, 0x0, 0x800}, 0x20000050) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000340), r2) (async) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:42 executing program 0: r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000002640)={'sit0\x00', &(0x7f00000025c0)={'gretap0\x00', 0x0, 0x700, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0xff, 0x0, 0x0, @empty, @remote}}}}) 07:59:42 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$DEVLINK_CMD_PORT_GET(r1, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="884000206fff78cad871103fd66afeabe45d9a0830774e341c0ff936171cb97d92c3778b8c3229a58f182666a5d3e2a0daed518214260ae5c0e55dfd65f8daf17d2686b1027c33d26f59e2c4a54a9df20112338e8090706b0f9551cd2a25378af2afd1828d64b2fe3560a6a802baef4ca2db839b46570604709ad3e9d50c63085567777ff472e7ab52eb99b0c8e21b5ec9fafdbeed235a1c765833682931f8b5280089fc996ab96a", @ANYRES16=0x0, @ANYBLOB="00042cbd7000fbdbdf25050000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000800030003000000080001007063690011000200303030303a30303a31302e300000000008000300060000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000800030000000000"], 0x88}, 0x1, 0x0, 0x0, 0x800}, 0x20000050) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000340), r2) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x2) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async, rerun: 32) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (rerun: 32) [ 1764.610310][T32024] FAULT_INJECTION: forcing a failure. [ 1764.610310][T32024] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1764.623521][T32024] CPU: 1 PID: 32024 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1764.633998][T32024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1764.644133][T32024] Call Trace: [ 1764.647435][T32024] [ 1764.650454][T32024] dump_stack_lvl+0xda/0x130 [ 1764.655086][T32024] dump_stack+0x15/0x20 [ 1764.659265][T32024] should_fail_ex+0x21f/0x230 [ 1764.664020][T32024] should_fail+0xb/0x10 [ 1764.668210][T32024] should_fail_usercopy+0x1a/0x20 [ 1764.673268][T32024] copy_page_from_iter_atomic+0x22d/0xcf0 [ 1764.679082][T32024] ? folio_test_hugetlb+0x3a/0x70 [ 1764.684127][T32024] ? shmem_write_begin+0x12a/0x1d0 [ 1764.689326][T32024] generic_perform_write+0x212/0x410 [ 1764.694688][T32024] ? shmem_write_begin+0x1d0/0x1d0 [ 1764.699804][T32024] __generic_file_write_iter+0xa1/0x120 [ 1764.705363][T32024] generic_file_write_iter+0x7d/0x1c0 [ 1764.710791][T32024] vfs_write+0x4ab/0x7d0 [ 1764.715091][T32024] ksys_write+0xeb/0x1a0 [ 1764.719408][T32024] __x64_sys_write+0x42/0x50 [ 1764.724013][T32024] do_syscall_64+0x41/0xc0 [ 1764.728515][T32024] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1764.734532][T32024] RIP: 0033:0x7f3d42967b29 [ 1764.738967][T32024] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1764.758840][T32024] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1764.767263][T32024] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1764.775244][T32024] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1764.783224][T32024] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1764.791230][T32024] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1764.799209][T32024] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1764.807221][T32024] 07:59:42 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 10) 07:59:42 executing program 4: write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:42 executing program 5: prctl$PR_SET_NAME(0xe, &(0x7f0000000040)='/dev/bsg\x00') 07:59:42 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x600}}, 0x18) 07:59:42 executing program 0: r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000002640)={'sit0\x00', &(0x7f00000025c0)={'gretap0\x00', 0x0, 0x700, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0xff, 0x0, 0x0, @empty, @remote}}}}) 07:59:42 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x8}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:42 executing program 4: write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:42 executing program 0: prctl$PR_SET_NAME(0xd, &(0x7f0000000040)='/dev/bsg\x00') 07:59:42 executing program 5: prctl$PR_SET_NAME(0x10, &(0x7f0000000040)='/dev/bsg\x00') 07:59:42 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x1800}}, 0x18) 07:59:42 executing program 4: write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) 07:59:43 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x1000000}}, 0x18) [ 1764.983372][T32057] FAULT_INJECTION: forcing a failure. [ 1764.983372][T32057] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1764.996665][T32057] CPU: 1 PID: 32057 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1765.007115][T32057] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1765.017264][T32057] Call Trace: [ 1765.020561][T32057] [ 1765.023508][T32057] dump_stack_lvl+0xda/0x130 [ 1765.028138][T32057] dump_stack+0x15/0x20 [ 1765.032324][T32057] should_fail_ex+0x21f/0x230 [ 1765.037065][T32057] __should_fail_alloc_page+0xfd/0x110 [ 1765.042557][T32057] __alloc_pages+0x108/0x340 [ 1765.048746][T32057] vma_alloc_folio+0x6a3/0x8c0 [ 1765.053565][T32057] shmem_get_folio_gfp+0x801/0x1200 [ 1765.058860][T32057] shmem_write_begin+0xa6/0x1d0 [ 1765.063760][T32057] generic_perform_write+0x1cf/0x410 [ 1765.069065][T32057] ? shmem_write_begin+0x1d0/0x1d0 [ 1765.074205][T32057] __generic_file_write_iter+0xa1/0x120 [ 1765.079764][T32057] generic_file_write_iter+0x7d/0x1c0 [ 1765.085224][T32057] vfs_write+0x4ab/0x7d0 [ 1765.089514][T32057] ksys_write+0xeb/0x1a0 [ 1765.093845][T32057] __x64_sys_write+0x42/0x50 [ 1765.098487][T32057] do_syscall_64+0x41/0xc0 [ 1765.102945][T32057] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1765.108904][T32057] RIP: 0033:0x7f3d42967b29 [ 1765.113316][T32057] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1765.133018][T32057] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1765.141463][T32057] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1765.149500][T32057] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1765.157510][T32057] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1765.165478][T32057] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1765.173536][T32057] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 07:59:43 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 11) 07:59:43 executing program 5: prctl$PR_SET_NAME(0x15, &(0x7f0000000040)='/dev/bsg\x00') 07:59:43 executing program 0: prctl$PR_SET_NAME(0xd, &(0x7f0000000040)='/dev/bsg\x00') 07:59:43 executing program 4: sendto$x25(0xffffffffffffffff, &(0x7f00000001c0)="38cc1899162f075424668c1fa13a8556cf092cd8b42a33fc3ec1ee00d81d0963be4e82bc056fd03069d4a0d34ab801", 0x2f, 0x4088, 0x0, 0x0) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$CAN_RAW_ERR_FILTER(r1, 0x65, 0x2, &(0x7f0000000040)=0x3f76, 0x4) ioctl$TIOCGPKT(r1, 0x80045438, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x10000000000, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x3ff, 0x0, {"699aaa2212a08d0aef433801faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:43 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x10}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:43 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x2000000}}, 0x18) 07:59:43 executing program 5: prctl$PR_SET_NAME(0x16, &(0x7f0000000040)='/dev/bsg\x00') [ 1765.181565][T32057] [ 1765.204250][T32073] FAULT_INJECTION: forcing a failure. [ 1765.204250][T32073] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1765.217450][T32073] CPU: 1 PID: 32073 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 07:59:43 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x5000000}}, 0x18) 07:59:43 executing program 5: prctl$PR_SET_NAME(0x17, &(0x7f0000000040)='/dev/bsg\x00') 07:59:43 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x6000000}}, 0x18) 07:59:43 executing program 0: prctl$PR_SET_NAME(0xd, &(0x7f0000000040)='/dev/bsg\x00') [ 1765.227910][T32073] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1765.238210][T32073] Call Trace: [ 1765.241547][T32073] [ 1765.244534][T32073] dump_stack_lvl+0xda/0x130 [ 1765.249164][T32073] dump_stack+0x15/0x20 [ 1765.253345][T32073] should_fail_ex+0x21f/0x230 [ 1765.258046][T32073] should_fail+0xb/0x10 [ 1765.262269][T32073] should_fail_usercopy+0x1a/0x20 [ 1765.267323][T32073] copy_page_from_iter_atomic+0x22d/0xcf0 [ 1765.273213][T32073] ? folio_test_hugetlb+0x3a/0x70 [ 1765.278287][T32073] ? shmem_write_begin+0x12a/0x1d0 07:59:43 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x64}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) [ 1765.283430][T32073] generic_perform_write+0x212/0x410 [ 1765.288816][T32073] ? shmem_write_begin+0x1d0/0x1d0 [ 1765.294011][T32073] __generic_file_write_iter+0xa1/0x120 [ 1765.299607][T32073] generic_file_write_iter+0x7d/0x1c0 [ 1765.305042][T32073] vfs_write+0x4ab/0x7d0 [ 1765.309366][T32073] ksys_write+0xeb/0x1a0 [ 1765.313641][T32073] __x64_sys_write+0x42/0x50 [ 1765.318297][T32073] do_syscall_64+0x41/0xc0 [ 1765.322803][T32073] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1765.328758][T32073] RIP: 0033:0x7f3d42967b29 [ 1765.333183][T32073] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1765.352835][T32073] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1765.361335][T32073] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1765.369304][T32073] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1765.377274][T32073] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1765.385289][T32073] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1765.393859][T32073] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1765.401857][T32073] 07:59:43 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 12) 07:59:43 executing program 5: prctl$PR_SET_NAME(0x18, &(0x7f0000000040)='/dev/bsg\x00') 07:59:43 executing program 4: sendto$x25(0xffffffffffffffff, &(0x7f00000001c0)="38cc1899162f075424668c1fa13a8556cf092cd8b42a33fc3ec1ee00d81d0963be4e82bc056fd03069d4a0d34ab801", 0x2f, 0x4088, 0x0, 0x0) (async) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$CAN_RAW_ERR_FILTER(r1, 0x65, 0x2, &(0x7f0000000040)=0x3f76, 0x4) (async) ioctl$TIOCGPKT(r1, 0x80045438, &(0x7f0000000080)) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x10000000000, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x3ff, 0x0, {"699aaa2212a08d0aef433801faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:43 executing program 0: prctl$PR_SET_NAME(0xd, 0x0) 07:59:43 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x8000000}}, 0x18) 07:59:43 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x300}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:43 executing program 5: prctl$PR_SET_NAME(0x19, &(0x7f0000000040)='/dev/bsg\x00') 07:59:43 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x18000000}}, 0x18) 07:59:43 executing program 5: prctl$PR_SET_NAME(0x1a, &(0x7f0000000040)='/dev/bsg\x00') [ 1765.537998][T32103] FAULT_INJECTION: forcing a failure. [ 1765.537998][T32103] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1765.551467][T32103] CPU: 1 PID: 32103 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1765.561996][T32103] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1765.572079][T32103] Call Trace: [ 1765.575423][T32103] [ 1765.578392][T32103] dump_stack_lvl+0xda/0x130 [ 1765.583024][T32103] dump_stack+0x15/0x20 07:59:43 executing program 5: prctl$PR_SET_NAME(0x1b, &(0x7f0000000040)='/dev/bsg\x00') 07:59:43 executing program 5: prctl$PR_SET_NAME(0x1c, &(0x7f0000000040)='/dev/bsg\x00') 07:59:43 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x6db}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) [ 1765.587290][T32103] should_fail_ex+0x21f/0x230 [ 1765.592001][T32103] __should_fail_alloc_page+0xfd/0x110 [ 1765.597525][T32103] __alloc_pages+0x108/0x340 [ 1765.602196][T32103] vma_alloc_folio+0x6a3/0x8c0 [ 1765.607077][T32103] shmem_get_folio_gfp+0x801/0x1200 [ 1765.612321][T32103] shmem_write_begin+0xa6/0x1d0 [ 1765.617286][T32103] generic_perform_write+0x1cf/0x410 [ 1765.622657][T32103] ? shmem_write_begin+0x1d0/0x1d0 [ 1765.627813][T32103] __generic_file_write_iter+0xa1/0x120 [ 1765.633486][T32103] generic_file_write_iter+0x7d/0x1c0 [ 1765.638994][T32103] vfs_write+0x4ab/0x7d0 [ 1765.643429][T32103] ksys_write+0xeb/0x1a0 [ 1765.647826][T32103] __x64_sys_write+0x42/0x50 [ 1765.652582][T32103] do_syscall_64+0x41/0xc0 [ 1765.657063][T32103] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1765.663169][T32103] RIP: 0033:0x7f3d42967b29 [ 1765.667663][T32103] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1765.687569][T32103] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1765.696084][T32103] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1765.704262][T32103] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1765.712315][T32103] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1765.720378][T32103] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1765.728347][T32103] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 07:59:43 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 13) 07:59:43 executing program 5: prctl$PR_SET_NAME(0x1d, &(0x7f0000000040)='/dev/bsg\x00') 07:59:43 executing program 4: sendto$x25(0xffffffffffffffff, &(0x7f00000001c0)="38cc1899162f075424668c1fa13a8556cf092cd8b42a33fc3ec1ee00d81d0963be4e82bc056fd03069d4a0d34ab801", 0x2f, 0x4088, 0x0, 0x0) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$CAN_RAW_ERR_FILTER(r1, 0x65, 0x2, &(0x7f0000000040)=0x3f76, 0x4) (async, rerun: 32) ioctl$TIOCGPKT(r1, 0x80045438, &(0x7f0000000080)) (async, rerun: 32) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x10000000000, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x3ff, 0x0, {"699aaa2212a08d0aef433801faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:43 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x158) 07:59:43 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x700}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:43 executing program 0: prctl$PR_SET_NAME(0x1c, &(0x7f0000000040)='/dev/bsg\x00') 07:59:43 executing program 5: prctl$PR_SET_NAME(0x1e, &(0x7f0000000040)='/dev/bsg\x00') [ 1765.736346][T32103] 07:59:43 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfdef) 07:59:43 executing program 0: prctl$PR_SET_NAME(0x1c, &(0x7f0000000040)='/dev/bsg\x00') 07:59:43 executing program 5: prctl$PR_SET_NAME(0x21, &(0x7f0000000040)='/dev/bsg\x00') [ 1765.789760][T32130] FAULT_INJECTION: forcing a failure. [ 1765.789760][T32130] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1765.803038][T32130] CPU: 0 PID: 32130 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1765.813476][T32130] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1765.823606][T32130] Call Trace: [ 1765.826993][T32130] [ 1765.830060][T32130] dump_stack_lvl+0xda/0x130 [ 1765.834690][T32130] dump_stack+0x15/0x20 [ 1765.838881][T32130] should_fail_ex+0x21f/0x230 [ 1765.843603][T32130] should_fail+0xb/0x10 [ 1765.847868][T32130] should_fail_usercopy+0x1a/0x20 [ 1765.852919][T32130] copy_page_from_iter_atomic+0x22d/0xcf0 [ 1765.858683][T32130] ? folio_test_hugetlb+0x3a/0x70 [ 1765.863814][T32130] ? shmem_write_begin+0x12a/0x1d0 [ 1765.868990][T32130] generic_perform_write+0x212/0x410 [ 1765.874346][T32130] ? shmem_write_begin+0x1d0/0x1d0 [ 1765.879482][T32130] __generic_file_write_iter+0xa1/0x120 [ 1765.885104][T32130] generic_file_write_iter+0x7d/0x1c0 07:59:43 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) 07:59:43 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) [ 1765.890513][T32130] vfs_write+0x4ab/0x7d0 [ 1765.894837][T32130] ksys_write+0xeb/0x1a0 [ 1765.899127][T32130] __x64_sys_write+0x42/0x50 [ 1765.903906][T32130] do_syscall_64+0x41/0xc0 [ 1765.908349][T32130] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1765.914383][T32130] RIP: 0033:0x7f3d42967b29 [ 1765.918955][T32130] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1765.938626][T32130] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1765.947143][T32130] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1765.955148][T32130] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1765.963246][T32130] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1765.971240][T32130] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1765.979319][T32130] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1765.987321][T32130] 07:59:44 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 14) 07:59:44 executing program 5: prctl$PR_SET_NAME(0x22, &(0x7f0000000040)='/dev/bsg\x00') 07:59:44 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x6400}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:44 executing program 0: prctl$PR_SET_NAME(0x1c, &(0x7f0000000040)='/dev/bsg\x00') 07:59:44 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 07:59:44 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffffffffffdef) 07:59:44 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) 07:59:44 executing program 5: prctl$PR_SET_NAME(0x23, &(0x7f0000000040)='/dev/bsg\x00') 07:59:44 executing program 0: prctl$PR_SET_NAME(0x1c, 0x0) 07:59:44 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x1, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x0, 0x1}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) r3 = syz_genetlink_get_family_id$smc(&(0x7f0000000080), r0) sendmsg$SMC_PNETID_DEL(r2, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="00014c8e661dc733fde85f8d9df98b6a2429bd7000fedbb39e9251ca2af6758831df25030000000500040002000000"], 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x0) 07:59:44 executing program 0: prctl$PR_SET_NAME(0x1c, 0x0) 07:59:44 executing program 5: prctl$PR_SET_NAME(0x24, &(0x7f0000000040)='/dev/bsg\x00') [ 1766.154857][T32159] FAULT_INJECTION: forcing a failure. [ 1766.154857][T32159] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1766.168160][T32159] CPU: 0 PID: 32159 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1766.178691][T32159] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1766.188768][T32159] Call Trace: [ 1766.192069][T32159] [ 1766.195075][T32159] dump_stack_lvl+0xda/0x130 [ 1766.199708][T32159] dump_stack+0x15/0x20 [ 1766.204079][T32159] should_fail_ex+0x21f/0x230 [ 1766.208861][T32159] __should_fail_alloc_page+0xfd/0x110 [ 1766.214358][T32159] __alloc_pages+0x108/0x340 [ 1766.218975][T32159] vma_alloc_folio+0x6a3/0x8c0 [ 1766.223823][T32159] shmem_get_folio_gfp+0x801/0x1200 [ 1766.229104][T32159] shmem_write_begin+0xa6/0x1d0 [ 1766.234025][T32159] generic_perform_write+0x1cf/0x410 [ 1766.239441][T32159] ? shmem_write_begin+0x1d0/0x1d0 [ 1766.244580][T32159] __generic_file_write_iter+0xa1/0x120 [ 1766.250225][T32159] generic_file_write_iter+0x7d/0x1c0 [ 1766.255669][T32159] vfs_write+0x4ab/0x7d0 [ 1766.259988][T32159] ksys_write+0xeb/0x1a0 [ 1766.264322][T32159] __x64_sys_write+0x42/0x50 [ 1766.268953][T32159] do_syscall_64+0x41/0xc0 [ 1766.273446][T32159] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1766.279423][T32159] RIP: 0033:0x7f3d42967b29 [ 1766.283849][T32159] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 07:59:44 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 15) 07:59:44 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) read$ptp(r0, &(0x7f00000001c0)=""/4096, 0x1000) 07:59:44 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0xdb06}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:44 executing program 0: prctl$PR_SET_NAME(0x1c, 0x0) 07:59:44 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x1, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x0, 0x1}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) (async) r3 = syz_genetlink_get_family_id$smc(&(0x7f0000000080), r0) sendmsg$SMC_PNETID_DEL(r2, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="00014c8e661dc733fde85f8d9df98b6a2429bd7000fedbb39e9251ca2af6758831df25030000000500040002000000"], 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x0) 07:59:44 executing program 5: prctl$PR_SET_NAME(0x25, &(0x7f0000000040)='/dev/bsg\x00') [ 1766.303489][T32159] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1766.311979][T32159] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1766.319986][T32159] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1766.327956][T32159] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1766.335963][T32159] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1766.343996][T32159] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1766.352168][T32159] 07:59:44 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) read$ptp(r0, &(0x7f00000001c0)=""/4096, 0x1000) 07:59:44 executing program 0: prctl$PR_SET_NAME(0x24, &(0x7f0000000040)='/dev/bsg\x00') 07:59:44 executing program 5: prctl$PR_SET_NAME(0x26, &(0x7f0000000040)='/dev/bsg\x00') [ 1766.379797][T32184] FAULT_INJECTION: forcing a failure. [ 1766.379797][T32184] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1766.393055][T32184] CPU: 0 PID: 32184 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1766.403486][T32184] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1766.413561][T32184] Call Trace: [ 1766.416858][T32184] [ 1766.419811][T32184] dump_stack_lvl+0xda/0x130 [ 1766.424464][T32184] dump_stack+0x15/0x20 07:59:44 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) read$ptp(r0, &(0x7f00000001c0)=""/4096, 0x1000) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) read$ptp(r0, &(0x7f00000001c0)=""/4096, 0x1000) (async) 07:59:44 executing program 0: prctl$PR_SET_NAME(0x24, &(0x7f0000000040)='/dev/bsg\x00') 07:59:44 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x1, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x0, 0x1}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) (async) r3 = syz_genetlink_get_family_id$smc(&(0x7f0000000080), r0) sendmsg$SMC_PNETID_DEL(r2, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="00014c8e661dc733fde85f8d9df98b6a2429bd7000fedbb39e9251ca2af6758831df25030000000500040002000000"], 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x0) [ 1766.428647][T32184] should_fail_ex+0x21f/0x230 [ 1766.433495][T32184] should_fail+0xb/0x10 [ 1766.437677][T32184] should_fail_usercopy+0x1a/0x20 [ 1766.442828][T32184] copy_page_from_iter_atomic+0x22d/0xcf0 [ 1766.448651][T32184] ? folio_test_hugetlb+0x3a/0x70 [ 1766.453701][T32184] ? shmem_write_begin+0x12a/0x1d0 [ 1766.458906][T32184] generic_perform_write+0x212/0x410 [ 1766.464243][T32184] ? shmem_write_begin+0x1d0/0x1d0 [ 1766.469460][T32184] __generic_file_write_iter+0xa1/0x120 [ 1766.475111][T32184] generic_file_write_iter+0x7d/0x1c0 [ 1766.480587][T32184] vfs_write+0x4ab/0x7d0 [ 1766.484887][T32184] ksys_write+0xeb/0x1a0 [ 1766.489239][T32184] __x64_sys_write+0x42/0x50 [ 1766.493962][T32184] do_syscall_64+0x41/0xc0 [ 1766.498457][T32184] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1766.504442][T32184] RIP: 0033:0x7f3d42967b29 [ 1766.509027][T32184] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1766.528752][T32184] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1766.537204][T32184] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1766.545217][T32184] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1766.553210][T32184] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1766.561188][T32184] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1766.569250][T32184] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1766.577221][T32184] 07:59:44 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 16) 07:59:44 executing program 0: prctl$PR_SET_NAME(0x24, &(0x7f0000000040)='/dev/bsg\x00') 07:59:44 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r1, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r1, 0x0, 0x1, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x0, 0x4}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280), 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/ip_tables_targets\x00') pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r3) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT_OLD(r3, 0x28, 0x6, &(0x7f0000000340), 0x10) inotify_rm_watch(r2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:44 executing program 5: prctl$PR_SET_NAME(0x27, &(0x7f0000000040)='/dev/bsg\x00') 07:59:44 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_NODE_ADDR(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r4, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, r4, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) pipe(&(0x7f0000000080)={0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x50, 0x0, 0x300, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x20}, @NBD_ATTR_SOCKETS={0x14, 0x7, 0x0, 0x1, [{0x8, 0x1, r5}, {0x8, 0x1, r6}]}, @NBD_ATTR_BACKEND_IDENTIFIER={0xd, 0xa, '/dev/bsg\x00'}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x3}]}, 0x50}, 0x1, 0x0, 0x0, 0x40850}, 0x20000000) 07:59:44 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x34000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:44 executing program 5: prctl$PR_SET_NAME(0x29, &(0x7f0000000040)='/dev/bsg\x00') 07:59:44 executing program 0: prctl$PR_SET_NAME(0x24, 0x0) 07:59:44 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) (async) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_NODE_ADDR(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r4, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, r4, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) pipe(&(0x7f0000000080)={0xffffffffffffffff}) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x50, 0x0, 0x300, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x20}, @NBD_ATTR_SOCKETS={0x14, 0x7, 0x0, 0x1, [{0x8, 0x1, r5}, {0x8, 0x1, r6}]}, @NBD_ATTR_BACKEND_IDENTIFIER={0xd, 0xa, '/dev/bsg\x00'}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x3}]}, 0x50}, 0x1, 0x0, 0x0, 0x40850}, 0x20000000) 07:59:44 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r1, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) (async, rerun: 32) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r1, 0x0, 0x1, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x0, 0x4}}}, 0xa0) (async, rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280), 0x13f, 0x5}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/ip_tables_targets\x00') (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r3) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT_OLD(r3, 0x28, 0x6, &(0x7f0000000340), 0x10) inotify_rm_watch(r2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:44 executing program 5: prctl$PR_SET_NAME(0x2a, &(0x7f0000000040)='/dev/bsg\x00') 07:59:44 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x400300}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) [ 1766.733458][T32219] FAULT_INJECTION: forcing a failure. [ 1766.733458][T32219] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1766.746752][T32219] CPU: 0 PID: 32219 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1766.757370][T32219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1766.767457][T32219] Call Trace: [ 1766.770753][T32219] [ 1766.773713][T32219] dump_stack_lvl+0xda/0x130 [ 1766.778335][T32219] dump_stack+0x15/0x20 [ 1766.782510][T32219] should_fail_ex+0x21f/0x230 [ 1766.787382][T32219] __should_fail_alloc_page+0xfd/0x110 [ 1766.792883][T32219] __alloc_pages+0x108/0x340 [ 1766.797708][T32219] vma_alloc_folio+0x6a3/0x8c0 [ 1766.802605][T32219] shmem_get_folio_gfp+0x801/0x1200 [ 1766.807862][T32219] shmem_write_begin+0xa6/0x1d0 [ 1766.812798][T32219] generic_perform_write+0x1cf/0x410 [ 1766.818127][T32219] ? shmem_write_begin+0x1d0/0x1d0 [ 1766.823258][T32219] __generic_file_write_iter+0xa1/0x120 [ 1766.828896][T32219] generic_file_write_iter+0x7d/0x1c0 [ 1766.834375][T32219] vfs_write+0x4ab/0x7d0 [ 1766.838733][T32219] ksys_write+0xeb/0x1a0 [ 1766.843011][T32219] __x64_sys_write+0x42/0x50 [ 1766.847635][T32219] do_syscall_64+0x41/0xc0 [ 1766.852065][T32219] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1766.857986][T32219] RIP: 0033:0x7f3d42967b29 [ 1766.862397][T32219] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 07:59:44 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 17) 07:59:44 executing program 5: prctl$PR_SET_NAME(0x2b, &(0x7f0000000040)='/dev/bsg\x00') 07:59:44 executing program 0: prctl$PR_SET_NAME(0x24, 0x0) 07:59:44 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000080), 0xffffffffffffffff) (async) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_NODE_ADDR(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r4, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, r4, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) (async) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, r4, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) pipe(&(0x7f0000000080)={0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x50, 0x0, 0x300, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x20}, @NBD_ATTR_SOCKETS={0x14, 0x7, 0x0, 0x1, [{0x8, 0x1, r5}, {0x8, 0x1, r6}]}, @NBD_ATTR_BACKEND_IDENTIFIER={0xd, 0xa, '/dev/bsg\x00'}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x3}]}, 0x50}, 0x1, 0x0, 0x0, 0x40850}, 0x20000000) (async) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x50, 0x0, 0x300, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x20}, @NBD_ATTR_SOCKETS={0x14, 0x7, 0x0, 0x1, [{0x8, 0x1, r5}, {0x8, 0x1, r6}]}, @NBD_ATTR_BACKEND_IDENTIFIER={0xd, 0xa, '/dev/bsg\x00'}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x3}]}, 0x50}, 0x1, 0x0, 0x0, 0x40850}, 0x20000000) 07:59:44 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r1, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r1, 0x0, 0x1, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x0, 0x4}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280), 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/ip_tables_targets\x00') pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r3) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT_OLD(r3, 0x28, 0x6, &(0x7f0000000340), 0x10) inotify_rm_watch(r2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r1, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r1, 0x0, 0x1, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x0, 0x4}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280), 0x13f, 0x5}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) syz_open_procfs(0x0, &(0x7f0000000300)='net/ip_tables_targets\x00') (async) pipe(&(0x7f0000000140)) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r3) (async) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT_OLD(r3, 0x28, 0x6, &(0x7f0000000340), 0x10) (async) inotify_rm_watch(r2, 0x0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) 07:59:44 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x2000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:44 executing program 0: prctl$PR_SET_NAME(0x24, 0x0) [ 1766.882069][T32219] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1766.890482][T32219] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1766.898467][T32219] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1766.906446][T32219] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1766.914672][T32219] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1766.922717][T32219] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1766.930717][T32219] [ 1766.968373][T32257] FAULT_INJECTION: forcing a failure. [ 1766.968373][T32257] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1766.981771][T32257] CPU: 1 PID: 32257 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1766.992212][T32257] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1767.002291][T32257] Call Trace: [ 1767.005666][T32257] [ 1767.008617][T32257] dump_stack_lvl+0xda/0x130 [ 1767.013306][T32257] dump_stack+0x15/0x20 07:59:45 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x4e22, 0xf0000000, @mcast1, 0xe}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:45 executing program 5: prctl$PR_SET_NAME(0x2c, &(0x7f0000000040)='/dev/bsg\x00') 07:59:45 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x4e22, 0xf0000000, @mcast1, 0xe}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:45 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000080)) ioctl$PTP_EXTTS_REQUEST(r0, 0x40103d02, &(0x7f0000000040)={0x889, 0x1}) ioctl$VT_WAITACTIVE(r0, 0x5607) 07:59:45 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000080)) (async) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000080)) ioctl$PTP_EXTTS_REQUEST(r0, 0x40103d02, &(0x7f0000000040)={0x889, 0x1}) ioctl$VT_WAITACTIVE(r0, 0x5607) (async) ioctl$VT_WAITACTIVE(r0, 0x5607) [ 1767.017488][T32257] should_fail_ex+0x21f/0x230 [ 1767.022183][T32257] __should_fail_alloc_page+0xfd/0x110 [ 1767.027754][T32257] __alloc_pages+0x108/0x340 [ 1767.032413][T32257] vma_alloc_folio+0x6a3/0x8c0 [ 1767.037234][T32257] shmem_get_folio_gfp+0x801/0x1200 [ 1767.042475][T32257] shmem_write_begin+0xa6/0x1d0 [ 1767.047494][T32257] generic_perform_write+0x1cf/0x410 [ 1767.052823][T32257] ? shmem_write_begin+0x1d0/0x1d0 [ 1767.058034][T32257] __generic_file_write_iter+0xa1/0x120 [ 1767.063703][T32257] generic_file_write_iter+0x7d/0x1c0 [ 1767.069191][T32257] vfs_write+0x4ab/0x7d0 [ 1767.073543][T32257] ksys_write+0xeb/0x1a0 [ 1767.077835][T32257] __x64_sys_write+0x42/0x50 [ 1767.082461][T32257] do_syscall_64+0x41/0xc0 [ 1767.086954][T32257] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1767.092883][T32257] RIP: 0033:0x7f3d42967b29 [ 1767.097458][T32257] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 07:59:45 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 18) 07:59:45 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x4e22, 0xf0000000, @mcast1, 0xe}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x4e22, 0xf0000000, @mcast1, 0xe}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) 07:59:45 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x3000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:45 executing program 5: prctl$PR_SET_NAME(0x2f, &(0x7f0000000040)='/dev/bsg\x00') 07:59:45 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000080)) ioctl$PTP_EXTTS_REQUEST(r0, 0x40103d02, &(0x7f0000000040)={0x889, 0x1}) (async) ioctl$VT_WAITACTIVE(r0, 0x5607) 07:59:45 executing program 0: prctl$PR_SET_NAME(0x2c, &(0x7f0000000040)='/dev/bsg\x00') [ 1767.117091][T32257] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1767.125508][T32257] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1767.133496][T32257] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1767.141644][T32257] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1767.149664][T32257] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1767.157659][T32257] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1767.165748][T32257] 07:59:45 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x111, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000002c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x4, r1, 0x1c, 0x0, @ib={0x1b, 0x3, 0xe5, {"e37315b2073409f84c06562440d7edb4"}, 0xfffffffffffffffc, 0x3, 0x4ea599ee}}}, 0xa0) 07:59:45 executing program 0: prctl$PR_SET_NAME(0x2c, &(0x7f0000000040)='/dev/bsg\x00') 07:59:45 executing program 5: prctl$PR_SET_NAME(0x34, &(0x7f0000000040)='/dev/bsg\x00') 07:59:45 executing program 5: prctl$PR_SET_NAME(0x35, &(0x7f0000000040)='/dev/bsg\x00') 07:59:45 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), r0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f00000002c0)={0x11, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x18) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r1, 0x0, 0x70bd28, 0x25dfdc00, {{}, {}, {0x8, 0x11, 0x6}}, ["", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x80) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) [ 1767.205890][T32288] FAULT_INJECTION: forcing a failure. [ 1767.205890][T32288] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1767.219219][T32288] CPU: 1 PID: 32288 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1767.229674][T32288] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1767.239790][T32288] Call Trace: [ 1767.243082][T32288] [ 1767.246017][T32288] dump_stack_lvl+0xda/0x130 [ 1767.250625][T32288] dump_stack+0x15/0x20 07:59:45 executing program 5: prctl$PR_SET_NAME(0x36, &(0x7f0000000040)='/dev/bsg\x00') [ 1767.254805][T32288] should_fail_ex+0x21f/0x230 [ 1767.259503][T32288] __should_fail_alloc_page+0xfd/0x110 [ 1767.264989][T32288] __alloc_pages+0x108/0x340 [ 1767.269652][T32288] vma_alloc_folio+0x6a3/0x8c0 [ 1767.274468][T32288] shmem_get_folio_gfp+0x801/0x1200 [ 1767.279753][T32288] shmem_write_begin+0xa6/0x1d0 [ 1767.284629][T32288] generic_perform_write+0x1cf/0x410 [ 1767.289962][T32288] ? shmem_write_begin+0x1d0/0x1d0 [ 1767.295125][T32288] __generic_file_write_iter+0xa1/0x120 [ 1767.300733][T32288] generic_file_write_iter+0x7d/0x1c0 [ 1767.306144][T32288] vfs_write+0x4ab/0x7d0 [ 1767.310485][T32288] ksys_write+0xeb/0x1a0 [ 1767.314807][T32288] __x64_sys_write+0x42/0x50 [ 1767.319481][T32288] do_syscall_64+0x41/0xc0 [ 1767.323972][T32288] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1767.329926][T32288] RIP: 0033:0x7f3d42967b29 [ 1767.334381][T32288] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 07:59:45 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 19) 07:59:45 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), r0) (async, rerun: 32) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 32) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f00000002c0)={0x11, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x18) (async) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r1, 0x0, 0x70bd28, 0x25dfdc00, {{}, {}, {0x8, 0x11, 0x6}}, ["", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x80) (async, rerun: 32) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (rerun: 32) 07:59:45 executing program 5: prctl$PR_SET_NAME(0x37, &(0x7f0000000040)='/dev/bsg\x00') 07:59:45 executing program 0: prctl$PR_SET_NAME(0x2c, &(0x7f0000000040)='/dev/bsg\x00') 07:59:45 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async, rerun: 32) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async, rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x111, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000002c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x4, r1, 0x1c, 0x0, @ib={0x1b, 0x3, 0xe5, {"e37315b2073409f84c06562440d7edb4"}, 0xfffffffffffffffc, 0x3, 0x4ea599ee}}}, 0xa0) 07:59:45 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x7000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:45 executing program 5: prctl$PR_SET_NAME(0x38, &(0x7f0000000040)='/dev/bsg\x00') [ 1767.354012][T32288] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1767.362472][T32288] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1767.370495][T32288] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1767.378463][T32288] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1767.386466][T32288] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1767.394463][T32288] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1767.402433][T32288] 07:59:45 executing program 5: prctl$PR_SET_NAME(0x39, &(0x7f0000000040)='/dev/bsg\x00') 07:59:45 executing program 0: prctl$PR_SET_NAME(0x2c, 0x0) 07:59:45 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1000, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), r0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f00000002c0)={0x11, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x18) (async) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r1, 0x0, 0x70bd28, 0x25dfdc00, {{}, {}, {0x8, 0x11, 0x6}}, ["", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x80) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:45 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async, rerun: 64) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x111, 0xf}}, 0x20) (rerun: 64) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000002c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x4, r1, 0x1c, 0x0, @ib={0x1b, 0x3, 0xe5, {"e37315b2073409f84c06562440d7edb4"}, 0xfffffffffffffffc, 0x3, 0x4ea599ee}}}, 0xa0) [ 1767.443189][T32316] FAULT_INJECTION: forcing a failure. [ 1767.443189][T32316] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1767.456388][T32316] CPU: 1 PID: 32316 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1767.466818][T32316] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1767.476937][T32316] Call Trace: [ 1767.480232][T32316] [ 1767.483185][T32316] dump_stack_lvl+0xda/0x130 [ 1767.487857][T32316] dump_stack+0x15/0x20 07:59:45 executing program 5: prctl$PR_SET_NAME(0x3a, &(0x7f0000000040)='/dev/bsg\x00') [ 1767.492105][T32316] should_fail_ex+0x21f/0x230 [ 1767.496804][T32316] should_fail+0xb/0x10 [ 1767.501112][T32316] should_fail_usercopy+0x1a/0x20 [ 1767.506236][T32316] copy_page_from_iter_atomic+0x22d/0xcf0 [ 1767.512028][T32316] ? folio_test_hugetlb+0x3a/0x70 [ 1767.517147][T32316] ? shmem_write_begin+0x12a/0x1d0 [ 1767.522430][T32316] generic_perform_write+0x212/0x410 [ 1767.527750][T32316] ? shmem_write_begin+0x1d0/0x1d0 [ 1767.532964][T32316] __generic_file_write_iter+0xa1/0x120 [ 1767.538670][T32316] generic_file_write_iter+0x7d/0x1c0 [ 1767.544091][T32316] vfs_write+0x4ab/0x7d0 [ 1767.548387][T32316] ksys_write+0xeb/0x1a0 [ 1767.552687][T32316] __x64_sys_write+0x42/0x50 [ 1767.557305][T32316] do_syscall_64+0x41/0xc0 [ 1767.561809][T32316] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1767.567805][T32316] RIP: 0033:0x7f3d42967b29 [ 1767.572328][T32316] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1767.592031][T32316] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1767.600475][T32316] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1767.608559][T32316] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1767.616548][T32316] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1767.624664][T32316] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1767.632658][T32316] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1767.641145][T32316] 07:59:45 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 20) 07:59:45 executing program 5: prctl$PR_SET_NAME(0x3b, &(0x7f0000000040)='/dev/bsg\x00') 07:59:45 executing program 1: ioctl$PTP_EXTTS_REQUEST2(0xffffffffffffffff, 0x40103d0b, &(0x7f0000000080)={0xf10f}) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000580), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x0, 0xffffffffffffffff, 0x10, 0x0, @in6={0xa, 0x4e24, 0x0, @private0={0xfc, 0x0, '\x00', 0x8}, 0x7}}}, 0xa0) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='comm\x00') r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001680), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) getrusage(0xffffffffffffffff, &(0x7f00000006c0)) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000640), 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r3, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000005c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r4, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r5, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000004c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000480), 0x3, r5, 0x10, 0x1, @in6={0xa, 0x4e24, 0xdb14, @mcast2, 0x3}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000003c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000380), 0x4, r3, 0x30, 0x1, @in={0x2, 0x4e21, @remote}}}, 0xa0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x400000, 0x0) 07:59:45 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000040), 0xffffffffffffffff) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) accept$inet(r0, &(0x7f0000000080), &(0x7f00000001c0)=0x10) 07:59:45 executing program 0: prctl$PR_SET_NAME(0x3a, &(0x7f0000000040)='/dev/bsg\x00') 07:59:45 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x8000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:45 executing program 1: ioctl$PTP_EXTTS_REQUEST2(0xffffffffffffffff, 0x40103d0b, &(0x7f0000000080)={0xf10f}) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000580), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x0, 0xffffffffffffffff, 0x10, 0x0, @in6={0xa, 0x4e24, 0x0, @private0={0xfc, 0x0, '\x00', 0x8}, 0x7}}}, 0xa0) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='comm\x00') r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001680), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) getrusage(0xffffffffffffffff, &(0x7f00000006c0)) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000640), 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r3, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000005c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r4, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r5, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000004c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000480), 0x3, r5, 0x10, 0x1, @in6={0xa, 0x4e24, 0xdb14, @mcast2, 0x3}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000003c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000380), 0x4, r3, 0x30, 0x1, @in={0x2, 0x4e21, @remote}}}, 0xa0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x400000, 0x0) ioctl$PTP_EXTTS_REQUEST2(0xffffffffffffffff, 0x40103d0b, &(0x7f0000000080)={0xf10f}) (async) openat$bsg(0xffffffffffffff9c, &(0x7f0000000580), 0x551701, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x0, 0xffffffffffffffff, 0x10, 0x0, @in6={0xa, 0x4e24, 0x0, @private0={0xfc, 0x0, '\x00', 0x8}, 0x7}}}, 0xa0) (async) syz_open_procfs(0x0, &(0x7f0000000340)='comm\x00') (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001680), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20) (async) getrusage(0xffffffffffffffff, &(0x7f00000006c0)) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000640), 0x2, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r3, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000005c0), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r4, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r5, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000004c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000480), 0x3, r5, 0x10, 0x1, @in6={0xa, 0x4e24, 0xdb14, @mcast2, 0x3}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000003c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000380), 0x4, r3, 0x30, 0x1, @in={0x2, 0x4e21, @remote}}}, 0xa0) (async) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x400000, 0x0) (async) 07:59:45 executing program 0: prctl$PR_SET_NAME(0x3a, &(0x7f0000000040)='/dev/bsg\x00') 07:59:45 executing program 0: prctl$PR_SET_NAME(0x3a, &(0x7f0000000040)='/dev/bsg\x00') 07:59:45 executing program 1: ioctl$PTP_EXTTS_REQUEST2(0xffffffffffffffff, 0x40103d0b, &(0x7f0000000080)={0xf10f}) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000580), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x0, 0xffffffffffffffff, 0x10, 0x0, @in6={0xa, 0x4e24, 0x0, @private0={0xfc, 0x0, '\x00', 0x8}, 0x7}}}, 0xa0) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='comm\x00') openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001680), 0x2, 0x0) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001680), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) getrusage(0xffffffffffffffff, &(0x7f00000006c0)) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000640), 0x2, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000640), 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r3, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r3, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000005c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r4, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r5, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000004c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000480), 0x3, r5, 0x10, 0x1, @in6={0xa, 0x4e24, 0xdb14, @mcast2, 0x3}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000003c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000380), 0x4, r3, 0x30, 0x1, @in={0x2, 0x4e21, @remote}}}, 0xa0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x400000, 0x0) [ 1767.791765][T32347] FAULT_INJECTION: forcing a failure. [ 1767.791765][T32347] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1767.805067][T32347] CPU: 1 PID: 32347 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1767.815500][T32347] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1767.825648][T32347] Call Trace: [ 1767.828948][T32347] [ 1767.831917][T32347] dump_stack_lvl+0xda/0x130 [ 1767.836611][T32347] dump_stack+0x15/0x20 07:59:45 executing program 0: prctl$PR_SET_NAME(0x3a, 0x0) 07:59:45 executing program 5: prctl$PR_SET_NAME(0x3c, &(0x7f0000000040)='/dev/bsg\x00') [ 1767.840881][T32347] should_fail_ex+0x21f/0x230 [ 1767.845607][T32347] __should_fail_alloc_page+0xfd/0x110 [ 1767.851086][T32347] __alloc_pages+0x108/0x340 [ 1767.855774][T32347] vma_alloc_folio+0x6a3/0x8c0 [ 1767.860622][T32347] shmem_get_folio_gfp+0x801/0x1200 [ 1767.865933][T32347] shmem_write_begin+0xa6/0x1d0 [ 1767.870854][T32347] generic_perform_write+0x1cf/0x410 [ 1767.876178][T32347] ? shmem_write_begin+0x1d0/0x1d0 [ 1767.881316][T32347] __generic_file_write_iter+0xa1/0x120 [ 1767.886902][T32347] generic_file_write_iter+0x7d/0x1c0 [ 1767.892318][T32347] vfs_write+0x4ab/0x7d0 [ 1767.896678][T32347] ksys_write+0xeb/0x1a0 [ 1767.900990][T32347] __x64_sys_write+0x42/0x50 [ 1767.905629][T32347] do_syscall_64+0x41/0xc0 [ 1767.910107][T32347] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1767.916052][T32347] RIP: 0033:0x7f3d42967b29 [ 1767.920491][T32347] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 07:59:46 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 21) 07:59:46 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x5}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:46 executing program 0: prctl$PR_SET_NAME(0x3a, 0x0) 07:59:46 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x10000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:46 executing program 5: prctl$PR_SET_NAME(0x3d, &(0x7f0000000040)='/dev/bsg\x00') 07:59:46 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) syz_genetlink_get_family_id$nbd(&(0x7f0000000040), 0xffffffffffffffff) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) accept$inet(r0, &(0x7f0000000080), &(0x7f00000001c0)=0x10) [ 1767.940197][T32347] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1767.948681][T32347] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1767.956652][T32347] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1767.964631][T32347] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1767.972608][T32347] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1767.980652][T32347] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1767.988625][T32347] 07:59:46 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x5}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async, rerun: 32) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (rerun: 32) 07:59:46 executing program 0: prctl$PR_SET_NAME(0x3a, 0x0) 07:59:46 executing program 5: prctl$PR_SET_NAME(0x41, &(0x7f0000000040)='/dev/bsg\x00') 07:59:46 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x5}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) [ 1768.029332][T32390] FAULT_INJECTION: forcing a failure. [ 1768.029332][T32390] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1768.042481][T32390] CPU: 1 PID: 32390 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1768.052935][T32390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1768.063014][T32390] Call Trace: [ 1768.066388][T32390] [ 1768.069399][T32390] dump_stack_lvl+0xda/0x130 [ 1768.074049][T32390] dump_stack+0x15/0x20 07:59:46 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001680), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) ioctl$VT_WAITACTIVE(r0, 0x5607) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @in6={0xa, 0x0, 0x7fffffff, @local}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:46 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x64000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) [ 1768.078236][T32390] should_fail_ex+0x21f/0x230 [ 1768.083084][T32390] should_fail+0xb/0x10 [ 1768.087280][T32390] should_fail_usercopy+0x1a/0x20 [ 1768.092334][T32390] copy_page_from_iter_atomic+0x22d/0xcf0 [ 1768.098112][T32390] ? folio_test_hugetlb+0x3a/0x70 [ 1768.103198][T32390] ? shmem_write_begin+0x12a/0x1d0 [ 1768.108411][T32390] generic_perform_write+0x212/0x410 [ 1768.113745][T32390] ? shmem_write_begin+0x1d0/0x1d0 [ 1768.118904][T32390] __generic_file_write_iter+0xa1/0x120 [ 1768.124662][T32390] generic_file_write_iter+0x7d/0x1c0 [ 1768.130082][T32390] vfs_write+0x4ab/0x7d0 [ 1768.134480][T32390] ksys_write+0xeb/0x1a0 [ 1768.138763][T32390] __x64_sys_write+0x42/0x50 [ 1768.143419][T32390] do_syscall_64+0x41/0xc0 [ 1768.147885][T32390] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1768.154013][T32390] RIP: 0033:0x7f3d42967b29 [ 1768.158455][T32390] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1768.178187][T32390] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1768.186687][T32390] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1768.194718][T32390] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1768.202709][T32390] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1768.210702][T32390] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1768.218854][T32390] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1768.226888][T32390] 07:59:46 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 22) 07:59:46 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001680), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) ioctl$VT_WAITACTIVE(r0, 0x5607) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @in6={0xa, 0x0, 0x7fffffff, @local}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:46 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000040), 0xffffffffffffffff) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) accept$inet(r0, &(0x7f0000000080), &(0x7f00000001c0)=0x10) 07:59:46 executing program 5: prctl$PR_SET_NAME(0x42, &(0x7f0000000040)='/dev/bsg\x00') 07:59:46 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0xdb060000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:46 executing program 0: prctl$PR_SET_NAME(0x41, &(0x7f0000000040)='/dev/bsg\x00') 07:59:46 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') 07:59:46 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001680), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) ioctl$VT_WAITACTIVE(r0, 0x5607) (async) ioctl$VT_WAITACTIVE(r0, 0x5607) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @in6={0xa, 0x0, 0x7fffffff, @local}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:46 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') 07:59:46 executing program 0: prctl$PR_SET_NAME(0x41, &(0x7f0000000040)='/dev/bsg\x00') [ 1768.364271][T32423] FAULT_INJECTION: forcing a failure. [ 1768.364271][T32423] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1768.377652][T32423] CPU: 1 PID: 32423 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1768.388090][T32423] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1768.398226][T32423] Call Trace: [ 1768.401592][T32423] [ 1768.404587][T32423] dump_stack_lvl+0xda/0x130 [ 1768.409281][T32423] dump_stack+0x15/0x20 07:59:46 executing program 0: prctl$PR_SET_NAME(0x41, &(0x7f0000000040)='/dev/bsg\x00') 07:59:46 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0xfefdffff}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) [ 1768.413535][T32423] should_fail_ex+0x21f/0x230 [ 1768.418246][T32423] __should_fail_alloc_page+0xfd/0x110 [ 1768.423740][T32423] __alloc_pages+0x108/0x340 [ 1768.428433][T32423] vma_alloc_folio+0x6a3/0x8c0 [ 1768.433231][T32423] shmem_get_folio_gfp+0x801/0x1200 [ 1768.438518][T32423] shmem_write_begin+0xa6/0x1d0 [ 1768.443412][T32423] generic_perform_write+0x1cf/0x410 [ 1768.448749][T32423] ? shmem_write_begin+0x1d0/0x1d0 [ 1768.453957][T32423] __generic_file_write_iter+0xa1/0x120 [ 1768.459539][T32423] generic_file_write_iter+0x7d/0x1c0 [ 1768.464968][T32423] vfs_write+0x4ab/0x7d0 [ 1768.469280][T32423] ksys_write+0xeb/0x1a0 [ 1768.473584][T32423] __x64_sys_write+0x42/0x50 [ 1768.478221][T32423] do_syscall_64+0x41/0xc0 [ 1768.482738][T32423] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1768.488674][T32423] RIP: 0033:0x7f3d42967b29 [ 1768.493131][T32423] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 07:59:46 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 23) 07:59:46 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/sctp\x00') sendto$llc(r0, &(0x7f0000000080)="23c10f584b3bd03d9d231f7bcb27725e1bec3463c85cfd9a4d9dbf6f04079d3e2cb8976d4e6fac9de626a74c5128f3a2c543635d7ce0bfc40b7de142bb5b9a686eb3e447c69e9c7a963c5e96b2efe17055735ba61cf3bec4905208647d41d7952fa801fda45da996f9a2480c857ca602725770ae40c81084ab9686515f38323cb9e6f080dc93aeb2818481054ebbede3f48c93c4e1e0f60582ecf3cc3bdff4a32c1037f6ea7776ec7ad94c4323", 0xad, 0x40080, 0x0, 0x0) ioctl$TIOCL_BLANKSCREEN(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) 07:59:46 executing program 0: prctl$PR_SET_NAME(0x41, 0x0) 07:59:46 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:46 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) ioctl$PTP_PIN_GETFUNC(r0, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x0, 0x2, 0x10000}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001680), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r4, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000380)={0x16, 0x98, 0xfa00, {&(0x7f0000000340), 0x4, r4, 0x1c, 0x1, @in6={0xa, 0x4e24, 0xffffffe0, @remote, 0x8}}}, 0xa0) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x200, 0x0) setsockopt$XDP_UMEM_FILL_RING(r5, 0x11b, 0x5, &(0x7f0000000300)=0x1000000, 0x4) ioctl$VT_WAITACTIVE(r2, 0x5607) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:46 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0xfffffdfe}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:46 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/sctp\x00') sendto$llc(r0, &(0x7f0000000080)="23c10f584b3bd03d9d231f7bcb27725e1bec3463c85cfd9a4d9dbf6f04079d3e2cb8976d4e6fac9de626a74c5128f3a2c543635d7ce0bfc40b7de142bb5b9a686eb3e447c69e9c7a963c5e96b2efe17055735ba61cf3bec4905208647d41d7952fa801fda45da996f9a2480c857ca602725770ae40c81084ab9686515f38323cb9e6f080dc93aeb2818481054ebbede3f48c93c4e1e0f60582ecf3cc3bdff4a32c1037f6ea7776ec7ad94c4323", 0xad, 0x40080, 0x0, 0x0) ioctl$TIOCL_BLANKSCREEN(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) [ 1768.512923][T32423] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1768.521422][T32423] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1768.529446][T32423] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1768.537443][T32423] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1768.545552][T32423] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1768.553625][T32423] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1768.561617][T32423] 07:59:46 executing program 0: prctl$PR_SET_NAME(0x41, 0x0) 07:59:46 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x551701, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) 07:59:46 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:46 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) ioctl$PTP_PIN_GETFUNC(r0, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x0, 0x2, 0x10000}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001680), 0x2, 0x0) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001680), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r4, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r4, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000380)={0x16, 0x98, 0xfa00, {&(0x7f0000000340), 0x4, r4, 0x1c, 0x1, @in6={0xa, 0x4e24, 0xffffffe0, @remote, 0x8}}}, 0xa0) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x200, 0x0) (async) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x200, 0x0) setsockopt$XDP_UMEM_FILL_RING(r5, 0x11b, 0x5, &(0x7f0000000300)=0x1000000, 0x4) ioctl$VT_WAITACTIVE(r2, 0x5607) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:46 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0x2}}, 0x20) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f0000000240)=0x121220, 0x4) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x10002, r1, 0x0, 0x1, @in={0x2, 0x4e23, @multicast1}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) sched_rr_get_interval(0x0, &(0x7f0000000300)) ioctl$PTP_PIN_GETFUNC(r0, 0xc0603d06, &(0x7f0000000280)={'\x00', 0x4, 0x0, 0xfff}) [ 1768.603948][T32452] FAULT_INJECTION: forcing a failure. [ 1768.603948][T32452] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1768.617316][T32452] CPU: 0 PID: 32452 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1768.627756][T32452] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1768.637843][T32452] Call Trace: [ 1768.641161][T32452] [ 1768.644114][T32452] dump_stack_lvl+0xda/0x130 [ 1768.648782][T32452] dump_stack+0x15/0x20 [ 1768.652970][T32452] should_fail_ex+0x21f/0x230 [ 1768.657682][T32452] __should_fail_alloc_page+0xfd/0x110 [ 1768.663269][T32452] __alloc_pages+0x108/0x340 [ 1768.667945][T32452] vma_alloc_folio+0x6a3/0x8c0 [ 1768.672840][T32452] shmem_get_folio_gfp+0x801/0x1200 [ 1768.678086][T32452] shmem_write_begin+0xa6/0x1d0 [ 1768.682984][T32452] generic_perform_write+0x1cf/0x410 [ 1768.688322][T32452] ? shmem_write_begin+0x1d0/0x1d0 [ 1768.693562][T32452] __generic_file_write_iter+0xa1/0x120 [ 1768.699195][T32452] generic_file_write_iter+0x7d/0x1c0 [ 1768.704675][T32452] vfs_write+0x4ab/0x7d0 [ 1768.709028][T32452] ksys_write+0xeb/0x1a0 [ 1768.713311][T32452] __x64_sys_write+0x42/0x50 [ 1768.717947][T32452] do_syscall_64+0x41/0xc0 [ 1768.722537][T32452] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1768.728447][T32452] RIP: 0033:0x7f3d42967b29 [ 1768.732895][T32452] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 07:59:46 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 24) 07:59:46 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/sctp\x00') sendto$llc(r0, &(0x7f0000000080)="23c10f584b3bd03d9d231f7bcb27725e1bec3463c85cfd9a4d9dbf6f04079d3e2cb8976d4e6fac9de626a74c5128f3a2c543635d7ce0bfc40b7de142bb5b9a686eb3e447c69e9c7a963c5e96b2efe17055735ba61cf3bec4905208647d41d7952fa801fda45da996f9a2480c857ca602725770ae40c81084ab9686515f38323cb9e6f080dc93aeb2818481054ebbede3f48c93c4e1e0f60582ecf3cc3bdff4a32c1037f6ea7776ec7ad94c4323", 0xad, 0x40080, 0x0, 0x0) (async) ioctl$TIOCL_BLANKSCREEN(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) 07:59:46 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x9}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0x2}}, 0x20) (async) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f0000000240)=0x121220, 0x4) (async) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x10002, r1, 0x0, 0x1, @in={0x2, 0x4e23, @multicast1}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) sched_rr_get_interval(0x0, &(0x7f0000000300)) (async) ioctl$PTP_PIN_GETFUNC(r0, 0xc0603d06, &(0x7f0000000280)={'\x00', 0x4, 0x0, 0xfff}) 07:59:46 executing program 0: prctl$PR_SET_NAME(0x41, 0x0) 07:59:46 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:46 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) ioctl$PTP_PIN_GETFUNC(r0, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x0, 0x2, 0x10000}) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001680), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r4, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000380)={0x16, 0x98, 0xfa00, {&(0x7f0000000340), 0x4, r4, 0x1c, 0x1, @in6={0xa, 0x4e24, 0xffffffe0, @remote, 0x8}}}, 0xa0) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) (async) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x200, 0x0) setsockopt$XDP_UMEM_FILL_RING(r5, 0x11b, 0x5, &(0x7f0000000300)=0x1000000, 0x4) (async) ioctl$VT_WAITACTIVE(r2, 0x5607) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) [ 1768.752878][T32452] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1768.761293][T32452] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1768.769314][T32452] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1768.777336][T32452] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1768.785351][T32452] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1768.793451][T32452] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1768.801440][T32452] 07:59:46 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x9}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0x2}}, 0x20) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f0000000240)=0x121220, 0x4) (async) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x10002, r1, 0x0, 0x1, @in={0x2, 0x4e23, @multicast1}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) sched_rr_get_interval(0x0, &(0x7f0000000300)) (async) ioctl$PTP_PIN_GETFUNC(r0, 0xc0603d06, &(0x7f0000000280)={'\x00', 0x4, 0x0, 0xfff}) 07:59:46 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') sendmsg$can_raw(0xffffffffffffffff, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@can={{0x3, 0x0, 0x1, 0x1}, 0x5, 0x2, 0x0, 0x0, "d0f5e9ebce137198"}, 0x10}, 0x1, 0x0, 0x0, 0x4004001}, 0x4040010) syz_init_net_socket$llc(0x1a, 0x2, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) 07:59:46 executing program 0: prctl$PR_SET_NAME(0x41, 0x0) [ 1768.828880][T32478] FAULT_INJECTION: forcing a failure. [ 1768.828880][T32478] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1768.842181][T32478] CPU: 0 PID: 32478 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1768.852619][T32478] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1768.862693][T32478] Call Trace: [ 1768.865981][T32478] [ 1768.868918][T32478] dump_stack_lvl+0xda/0x130 [ 1768.873544][T32478] dump_stack+0x15/0x20 07:59:46 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000280), 0x480100, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040), 0x0, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:46 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') sendmsg$can_raw(0xffffffffffffffff, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@can={{0x3, 0x0, 0x1, 0x1}, 0x5, 0x2, 0x0, 0x0, "d0f5e9ebce137198"}, 0x10}, 0x1, 0x0, 0x0, 0x4004001}, 0x4040010) syz_init_net_socket$llc(0x1a, 0x2, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') (async) sendmsg$can_raw(0xffffffffffffffff, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@can={{0x3, 0x0, 0x1, 0x1}, 0x5, 0x2, 0x0, 0x0, "d0f5e9ebce137198"}, 0x10}, 0x1, 0x0, 0x0, 0x4004001}, 0x4040010) (async) syz_init_net_socket$llc(0x1a, 0x2, 0x0) (async) syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) (async) 07:59:46 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) socket$xdp(0x2c, 0x3, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) [ 1768.877728][T32478] should_fail_ex+0x21f/0x230 [ 1768.882454][T32478] __should_fail_alloc_page+0xfd/0x110 [ 1768.887952][T32478] __alloc_pages+0x108/0x340 [ 1768.892616][T32478] vma_alloc_folio+0x6a3/0x8c0 [ 1768.897462][T32478] shmem_get_folio_gfp+0x801/0x1200 [ 1768.902877][T32478] shmem_write_begin+0xa6/0x1d0 [ 1768.907806][T32478] generic_perform_write+0x1cf/0x410 [ 1768.913264][T32478] ? shmem_write_begin+0x1d0/0x1d0 [ 1768.918410][T32478] __generic_file_write_iter+0xa1/0x120 [ 1768.924003][T32478] generic_file_write_iter+0x7d/0x1c0 [ 1768.929452][T32478] vfs_write+0x4ab/0x7d0 [ 1768.933821][T32478] ksys_write+0xeb/0x1a0 [ 1768.938179][T32478] __x64_sys_write+0x42/0x50 [ 1768.943300][T32478] do_syscall_64+0x41/0xc0 [ 1768.947753][T32478] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1768.953686][T32478] RIP: 0033:0x7f3d42967b29 [ 1768.958284][T32478] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 07:59:47 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 25) 07:59:47 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') sendmsg$can_raw(0xffffffffffffffff, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@can={{0x3, 0x0, 0x1, 0x1}, 0x5, 0x2, 0x0, 0x0, "d0f5e9ebce137198"}, 0x10}, 0x1, 0x0, 0x0, 0x4004001}, 0x4040010) (async) syz_init_net_socket$llc(0x1a, 0x2, 0x0) (async) syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) 07:59:47 executing program 0: prctl$PR_SET_NAME(0x41, 0x0) 07:59:47 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000280), 0x480100, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async, rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040), 0x0, 0x1}}, 0x20) (async, rerun: 32) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:47 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) socket$xdp(0x2c, 0x3, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) socket$xdp(0x2c, 0x3, 0x0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) 07:59:47 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x40030000000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) [ 1768.977989][T32478] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1768.986430][T32478] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1768.994447][T32478] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1769.002444][T32478] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1769.010445][T32478] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1769.018518][T32478] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1769.026504][T32478] 07:59:47 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) socket$xdp(0x2c, 0x3, 0x0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:47 executing program 0: prctl$PR_SET_NAME(0x41, 0x0) 07:59:47 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000280), 0x480100, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040), 0x0, 0x1}}, 0x20) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:47 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000000)={0x8006, 0x200, 0x1, 0x324, 0x6}) 07:59:47 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000000)={0x8006, 0x200, 0x1, 0x324, 0x6}) (async) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000000)={0x8006, 0x200, 0x1, 0x324, 0x6}) 07:59:47 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) ioctl$IOC_WATCH_QUEUE_SET_FILTER(r1, 0x5761, &(0x7f0000000080)={0x1, 0x0, [{0x57, 0xfffffeff, 0x8001, [0xfffffff7, 0x1bb, 0x2, 0xfb5a, 0x40008001, 0x80, 0x1, 0x10001]}]}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x80, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) sendmsg$DEVLINK_CMD_PORT_GET(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000200)={&(0x7f00000002c0)={0x84, r2, 0x200, 0x70bd25, 0x25dfdbff, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}}, {{@pci={{0x8}, {0x11}}, {0x8}}}]}, 0x84}, 0x1, 0x0, 0x0, 0x10}, 0x40880) [ 1769.084087][T32526] FAULT_INJECTION: forcing a failure. [ 1769.084087][T32526] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1769.097214][T32526] CPU: 0 PID: 32526 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1769.107767][T32526] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1769.117843][T32526] Call Trace: [ 1769.121133][T32526] [ 1769.124115][T32526] dump_stack_lvl+0xda/0x130 [ 1769.128742][T32526] dump_stack+0x15/0x20 [ 1769.132997][T32526] should_fail_ex+0x21f/0x230 [ 1769.137700][T32526] should_fail+0xb/0x10 [ 1769.141940][T32526] should_fail_usercopy+0x1a/0x20 [ 1769.146995][T32526] copy_page_from_iter_atomic+0x22d/0xcf0 [ 1769.152787][T32526] ? folio_test_hugetlb+0x3a/0x70 [ 1769.157906][T32526] ? shmem_write_begin+0x12a/0x1d0 [ 1769.163043][T32526] generic_perform_write+0x212/0x410 [ 1769.168406][T32526] ? shmem_write_begin+0x1d0/0x1d0 [ 1769.173671][T32526] __generic_file_write_iter+0xa1/0x120 [ 1769.179238][T32526] generic_file_write_iter+0x7d/0x1c0 [ 1769.184615][T32526] vfs_write+0x4ab/0x7d0 [ 1769.188868][T32526] ksys_write+0xeb/0x1a0 [ 1769.193160][T32526] __x64_sys_write+0x42/0x50 [ 1769.197764][T32526] do_syscall_64+0x41/0xc0 [ 1769.202187][T32526] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1769.208151][T32526] RIP: 0033:0x7f3d42967b29 [ 1769.212604][T32526] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1769.232273][T32526] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1769.240698][T32526] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1769.248673][T32526] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1769.256655][T32526] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1769.264653][T32526] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1769.272622][T32526] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1769.280596][T32526] 07:59:47 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 26) 07:59:47 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) ioctl$KDGKBMODE(r1, 0x4b44, &(0x7f0000000040)) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:47 executing program 0: prctl$PR_SET_NAME(0x42, &(0x7f0000000040)='/dev/bsg\x00') 07:59:47 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000000)={0x8006, 0x200, 0x1, 0x324, 0x6}) 07:59:47 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) ioctl$IOC_WATCH_QUEUE_SET_FILTER(r1, 0x5761, &(0x7f0000000080)={0x1, 0x0, [{0x57, 0xfffffeff, 0x8001, [0xfffffff7, 0x1bb, 0x2, 0xfb5a, 0x40008001, 0x80, 0x1, 0x10001]}]}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x80, 0x0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) sendmsg$DEVLINK_CMD_PORT_GET(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000200)={&(0x7f00000002c0)={0x84, r2, 0x200, 0x70bd25, 0x25dfdbff, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}}, {{@pci={{0x8}, {0x11}}, {0x8}}}]}, 0x84}, 0x1, 0x0, 0x0, 0x10}, 0x40880) 07:59:47 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x200000000000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) [ 1769.416965][T32552] FAULT_INJECTION: forcing a failure. [ 1769.416965][T32552] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1769.430311][T32552] CPU: 0 PID: 32552 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1769.440745][T32552] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1769.450819][T32552] Call Trace: [ 1769.454113][T32552] [ 1769.457066][T32552] dump_stack_lvl+0xda/0x130 [ 1769.461752][T32552] dump_stack+0x15/0x20 07:59:47 executing program 0: prctl$PR_SET_NAME(0x42, &(0x7f0000000040)='/dev/bsg\x00') 07:59:47 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) ioctl$KDGKBMODE(r1, 0x4b44, &(0x7f0000000040)) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:47 executing program 5: r0 = inotify_init1(0x80800) inotify_init1(0x800) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x24000104) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') 07:59:47 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) (async) ioctl$KDGKBMODE(r1, 0x4b44, &(0x7f0000000040)) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:47 executing program 5: r0 = inotify_init1(0x80800) inotify_init1(0x800) (async) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x24000104) (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') 07:59:47 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) ioctl$IOC_WATCH_QUEUE_SET_FILTER(r1, 0x5761, &(0x7f0000000080)={0x1, 0x0, [{0x57, 0xfffffeff, 0x8001, [0xfffffff7, 0x1bb, 0x2, 0xfb5a, 0x40008001, 0x80, 0x1, 0x10001]}]}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x80, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) sendmsg$DEVLINK_CMD_PORT_GET(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000200)={&(0x7f00000002c0)={0x84, r2, 0x200, 0x70bd25, 0x25dfdbff, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}}, {{@pci={{0x8}, {0x11}}, {0x8}}}]}, 0x84}, 0x1, 0x0, 0x0, 0x10}, 0x40880) (async) sendmsg$DEVLINK_CMD_PORT_GET(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000200)={&(0x7f00000002c0)={0x84, r2, 0x200, 0x70bd25, 0x25dfdbff, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}}, {{@pci={{0x8}, {0x11}}, {0x8}}}]}, 0x84}, 0x1, 0x0, 0x0, 0x10}, 0x40880) [ 1769.466055][T32552] should_fail_ex+0x21f/0x230 [ 1769.470863][T32552] __should_fail_alloc_page+0xfd/0x110 [ 1769.476408][T32552] __alloc_pages+0x108/0x340 [ 1769.481034][T32552] vma_alloc_folio+0x6a3/0x8c0 [ 1769.485847][T32552] shmem_get_folio_gfp+0x801/0x1200 [ 1769.491106][T32552] shmem_write_begin+0xa6/0x1d0 [ 1769.495981][T32552] generic_perform_write+0x1cf/0x410 [ 1769.501361][T32552] ? shmem_write_begin+0x1d0/0x1d0 [ 1769.506605][T32552] __generic_file_write_iter+0xa1/0x120 [ 1769.512205][T32552] generic_file_write_iter+0x7d/0x1c0 [ 1769.517925][T32552] vfs_write+0x4ab/0x7d0 [ 1769.522234][T32552] ksys_write+0xeb/0x1a0 [ 1769.526578][T32552] __x64_sys_write+0x42/0x50 [ 1769.531225][T32552] do_syscall_64+0x41/0xc0 [ 1769.535696][T32552] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1769.541683][T32552] RIP: 0033:0x7f3d42967b29 [ 1769.546092][T32552] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 07:59:47 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 27) 07:59:47 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000040)={0x0, r0}, 0x10) 07:59:47 executing program 0: prctl$PR_SET_NAME(0x42, &(0x7f0000000040)='/dev/bsg\x00') 07:59:47 executing program 5: r0 = inotify_init1(0x80800) inotify_init1(0x800) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x24000104) (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') 07:59:47 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:47 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x300000000000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:47 executing program 0: prctl$PR_SET_NAME(0x42, 0x0) [ 1769.565823][T32552] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1769.574554][T32552] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1769.582630][T32552] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1769.590627][T32552] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1769.598602][T32552] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1769.606764][T32552] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1769.614742][T32552] 07:59:47 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) (async) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000040)={0x0, r0}, 0x10) 07:59:47 executing program 5: accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @initdev}, &(0x7f0000000080)=0x10, 0x80000) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') 07:59:47 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) [ 1769.676954][T32591] FAULT_INJECTION: forcing a failure. [ 1769.676954][T32591] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1769.690195][T32591] CPU: 1 PID: 32591 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1769.700646][T32591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1769.712711][T32591] Call Trace: [ 1769.716007][T32591] [ 1769.718958][T32591] dump_stack_lvl+0xda/0x130 07:59:47 executing program 0: prctl$PR_SET_NAME(0x42, 0x0) 07:59:47 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000040)={0x0, r0}, 0x10) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000040)={0x0, r0}, 0x10) (async) [ 1769.723663][T32591] dump_stack+0x15/0x20 [ 1769.727878][T32591] should_fail_ex+0x21f/0x230 [ 1769.732711][T32591] should_fail+0xb/0x10 [ 1769.736975][T32591] should_fail_usercopy+0x1a/0x20 [ 1769.742071][T32591] copy_page_from_iter_atomic+0x22d/0xcf0 [ 1769.747844][T32591] ? folio_test_hugetlb+0x3a/0x70 [ 1769.752925][T32591] ? shmem_write_begin+0x12a/0x1d0 [ 1769.758087][T32591] generic_perform_write+0x212/0x410 [ 1769.763573][T32591] ? shmem_write_begin+0x1d0/0x1d0 [ 1769.768691][T32591] __generic_file_write_iter+0xa1/0x120 [ 1769.774327][T32591] generic_file_write_iter+0x7d/0x1c0 [ 1769.779715][T32591] vfs_write+0x4ab/0x7d0 [ 1769.783974][T32591] ksys_write+0xeb/0x1a0 [ 1769.788399][T32591] __x64_sys_write+0x42/0x50 [ 1769.793013][T32591] do_syscall_64+0x41/0xc0 [ 1769.797573][T32591] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1769.803683][T32591] RIP: 0033:0x7f3d42967b29 [ 1769.808101][T32591] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1769.827715][T32591] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1769.836129][T32591] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1769.844175][T32591] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1769.852275][T32591] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1769.860326][T32591] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1769.868533][T32591] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1769.876515][T32591] 07:59:47 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 28) 07:59:47 executing program 5: accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @initdev}, &(0x7f0000000080)=0x10, 0x80000) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') 07:59:47 executing program 0: prctl$PR_SET_NAME(0x42, 0x0) 07:59:47 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:47 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x700000000000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:47 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) read$ptp(r1, &(0x7f0000000280)=""/163, 0xa3) 07:59:48 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) (async) read$ptp(r1, &(0x7f0000000280)=""/163, 0xa3) 07:59:48 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCGDEV(r1, 0x80045432, &(0x7f0000000040)) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x0, 0x94a}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffffffffffe29) ioctl$SIOCPNDELRESOURCE(r0, 0x89ef, &(0x7f0000000080)=0x3ff) 07:59:48 executing program 0: prctl$PR_SET_NAME(0x42, 0x0) 07:59:48 executing program 5: accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @initdev}, &(0x7f0000000080)=0x10, 0x80000) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') 07:59:48 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCGDEV(r1, 0x80045432, &(0x7f0000000040)) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x0, 0x94a}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffffffffffe29) (async) ioctl$SIOCPNDELRESOURCE(r0, 0x89ef, &(0x7f0000000080)=0x3ff) [ 1770.040467][T32618] FAULT_INJECTION: forcing a failure. [ 1770.040467][T32618] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1770.053639][T32618] CPU: 0 PID: 32618 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1770.064125][T32618] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 07:59:48 executing program 0: prctl$PR_SET_NAME(0x42, 0x0) [ 1770.064208][T32618] Call Trace: [ 1770.064215][T32618] [ 1770.064223][T32618] dump_stack_lvl+0xda/0x130 [ 1770.064259][T32618] dump_stack+0x15/0x20 [ 1770.064285][T32618] should_fail_ex+0x21f/0x230 [ 1770.064365][T32618] should_fail+0xb/0x10 [ 1770.064387][T32618] should_fail_usercopy+0x1a/0x20 [ 1770.064455][T32618] copy_page_from_iter_atomic+0x22d/0xcf0 [ 1770.064522][T32618] ? folio_test_hugetlb+0x3a/0x70 [ 1770.064547][T32618] ? shmem_write_begin+0x12a/0x1d0 [ 1770.064573][T32618] generic_perform_write+0x212/0x410 [ 1770.064607][T32618] ? shmem_write_begin+0x1d0/0x1d0 [ 1770.064665][T32618] __generic_file_write_iter+0xa1/0x120 [ 1770.064702][T32618] generic_file_write_iter+0x7d/0x1c0 [ 1770.064735][T32618] vfs_write+0x4ab/0x7d0 [ 1770.064815][T32618] ksys_write+0xeb/0x1a0 [ 1770.064917][T32618] __x64_sys_write+0x42/0x50 [ 1770.064947][T32618] do_syscall_64+0x41/0xc0 [ 1770.064972][T32618] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1770.065055][T32618] RIP: 0033:0x7f3d42967b29 [ 1770.065070][T32618] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1770.065102][T32618] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 07:59:48 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 29) 07:59:48 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/d\xd0\x8e\x10/b\x00\x00') 07:59:48 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) read$ptp(r1, &(0x7f0000000280)=""/163, 0xa3) 07:59:48 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x800000000000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:48 executing program 0: prctl$PR_SET_NAME(0x42, 0x0) 07:59:48 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/d\xd0\x8e\x10/b\x00\x00') 07:59:48 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), r0) sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x68, r2, 0x901, 0x70bd26, 0x25dfdbff, {{}, {}, {0x4c, 0x18, {0x1, @link='syz1\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x20004000}, 0x4000004) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r3) ioctl$GIO_FONT(r3, 0x4b60, &(0x7f0000000380)=""/248) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:48 executing program 0: prctl$PR_SET_NAME(0x3d, &(0x7f0000000040)='/dev/bsg\x00') [ 1770.065128][T32618] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1770.065144][T32618] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1770.065160][T32618] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 07:59:48 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/d\xd0\x8e\x10/b\x00\x00') 07:59:48 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), r0) sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x68, r2, 0x901, 0x70bd26, 0x25dfdbff, {{}, {}, {0x4c, 0x18, {0x1, @link='syz1\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x20004000}, 0x4000004) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r3) (async) ioctl$GIO_FONT(r3, 0x4b60, &(0x7f0000000380)=""/248) (async, rerun: 32) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async, rerun: 32) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) [ 1770.065183][T32618] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1770.065198][T32618] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1770.065245][T32618] [ 1770.277103][T32646] FAULT_INJECTION: forcing a failure. [ 1770.277103][T32646] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1770.277135][T32646] CPU: 0 PID: 32646 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1770.277161][T32646] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1770.277179][T32646] Call Trace: [ 1770.277185][T32646] [ 1770.277192][T32646] dump_stack_lvl+0xda/0x130 [ 1770.277223][T32646] dump_stack+0x15/0x20 [ 1770.277246][T32646] should_fail_ex+0x21f/0x230 [ 1770.277325][T32646] should_fail+0xb/0x10 [ 1770.277350][T32646] should_fail_usercopy+0x1a/0x20 [ 1770.277377][T32646] copy_page_from_iter_atomic+0x22d/0xcf0 [ 1770.277415][T32646] ? folio_test_hugetlb+0x3a/0x70 [ 1770.277437][T32646] ? shmem_write_begin+0x12a/0x1d0 [ 1770.277532][T32646] generic_perform_write+0x212/0x410 [ 1770.277633][T32646] ? shmem_write_begin+0x1d0/0x1d0 [ 1770.277656][T32646] __generic_file_write_iter+0xa1/0x120 [ 1770.277794][T32646] generic_file_write_iter+0x7d/0x1c0 [ 1770.277830][T32646] vfs_write+0x4ab/0x7d0 [ 1770.277862][T32646] ksys_write+0xeb/0x1a0 [ 1770.277950][T32646] __x64_sys_write+0x42/0x50 [ 1770.277980][T32646] do_syscall_64+0x41/0xc0 [ 1770.278079][T32646] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1770.278115][T32646] RIP: 0033:0x7f3d42967b29 [ 1770.278129][T32646] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1770.278150][T32646] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1770.278180][T32646] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1770.278192][T32646] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1770.278274][T32646] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1770.278292][T32646] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1770.278307][T32646] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 07:59:48 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCGDEV(r1, 0x80045432, &(0x7f0000000040)) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x0, 0x94a}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffffffffffe29) (async) ioctl$SIOCPNDELRESOURCE(r0, 0x89ef, &(0x7f0000000080)=0x3ff) 07:59:48 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x1000000000000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:48 executing program 0: prctl$PR_SET_NAME(0x3d, &(0x7f0000000040)='/dev/bsg\x00') 07:59:48 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='\\^\xda\x00') prctl$PR_SET_NAME(0xf, &(0x7f0000000080)='-&]\'\x00') 07:59:48 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) syz_genetlink_get_family_id$tipc(&(0x7f0000000080), r0) (async) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), r0) sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x68, r2, 0x901, 0x70bd26, 0x25dfdbff, {{}, {}, {0x4c, 0x18, {0x1, @link='syz1\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x20004000}, 0x4000004) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r3) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r3) ioctl$GIO_FONT(r3, 0x4b60, &(0x7f0000000380)=""/248) (async) ioctl$GIO_FONT(r3, 0x4b60, &(0x7f0000000380)=""/248) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:48 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 30) [ 1770.278327][T32646] 07:59:48 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='\\^\xda\x00') prctl$PR_SET_NAME(0xf, &(0x7f0000000080)='-&]\'\x00') prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='\\^\xda\x00') (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000080)='-&]\'\x00') (async) 07:59:48 executing program 0: prctl$PR_SET_NAME(0x3d, &(0x7f0000000040)='/dev/bsg\x00') 07:59:48 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='\\^\xda\x00') prctl$PR_SET_NAME(0xf, &(0x7f0000000080)='-&]\'\x00') 07:59:48 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) syz_open_pts(r0, 0xa2800) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) [ 1770.575866][T32666] FAULT_INJECTION: forcing a failure. [ 1770.575866][T32666] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1770.589161][T32666] CPU: 0 PID: 32666 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1770.599670][T32666] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1770.609763][T32666] Call Trace: [ 1770.613064][T32666] [ 1770.616011][T32666] dump_stack_lvl+0xda/0x130 [ 1770.620698][T32666] dump_stack+0x15/0x20 07:59:48 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='/dev/random\x00') openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x381201, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='sit0\x00') ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8927, &(0x7f0000000100)={'sit0\x00', 0x0}) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r2 = accept$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @initdev}, &(0x7f0000000300)=0x10) getsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000180)={@initdev, @loopback, 0x0}, &(0x7f00000002c0)=0xc) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='attr/sockcreate\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x78e6, 0x6, 0x1ff, 0x0, r1, 0x1000, '\x00', r3, r4, 0x3, 0x1, 0x4, 0xc}, 0x48) 07:59:48 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='/dev/random\x00') (async) openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x381201, 0x0) (async) r0 = socket$inet_udp(0x2, 0x2, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='sit0\x00') (async, rerun: 32) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8927, &(0x7f0000000100)={'sit0\x00', 0x0}) (async, rerun: 32) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r2 = accept$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @initdev}, &(0x7f0000000300)=0x10) getsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000180)={@initdev, @loopback, 0x0}, &(0x7f00000002c0)=0xc) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='attr/sockcreate\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x78e6, 0x6, 0x1ff, 0x0, r1, 0x1000, '\x00', r3, r4, 0x3, 0x1, 0x4, 0xc}, 0x48) [ 1770.624896][T32666] should_fail_ex+0x21f/0x230 [ 1770.629658][T32666] __should_fail_alloc_page+0xfd/0x110 [ 1770.635219][T32666] __alloc_pages+0x108/0x340 [ 1770.639841][T32666] vma_alloc_folio+0x6a3/0x8c0 [ 1770.644653][T32666] shmem_get_folio_gfp+0x801/0x1200 [ 1770.649900][T32666] shmem_write_begin+0xa6/0x1d0 [ 1770.654782][T32666] generic_perform_write+0x1cf/0x410 [ 1770.660142][T32666] ? shmem_write_begin+0x1d0/0x1d0 [ 1770.665291][T32666] __generic_file_write_iter+0xa1/0x120 [ 1770.665330][T32666] generic_file_write_iter+0x7d/0x1c0 [ 1770.665365][T32666] vfs_write+0x4ab/0x7d0 [ 1770.665450][T32666] ksys_write+0xeb/0x1a0 [ 1770.665486][T32666] __x64_sys_write+0x42/0x50 [ 1770.665538][T32666] do_syscall_64+0x41/0xc0 [ 1770.665644][T32666] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1770.665684][T32666] RIP: 0033:0x7f3d42967b29 [ 1770.665704][T32666] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 07:59:48 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x9, 0x1, {}, 0x0, 0x0, 0xffff}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:48 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x6400000000000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:48 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='/dev/random\x00') openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x381201, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='sit0\x00') ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8927, &(0x7f0000000100)={'sit0\x00', 0x0}) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r2 = accept$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @initdev}, &(0x7f0000000300)=0x10) getsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000180)={@initdev, @loopback, 0x0}, &(0x7f00000002c0)=0xc) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='attr/sockcreate\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x78e6, 0x6, 0x1ff, 0x0, r1, 0x1000, '\x00', r3, r4, 0x3, 0x1, 0x4, 0xc}, 0x48) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') (async) prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='/dev/random\x00') (async) openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x381201, 0x0) (async) socket$inet_udp(0x2, 0x2, 0x0) (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='sit0\x00') (async) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8927, &(0x7f0000000100)={'sit0\x00', 0x0}) (async) pipe2$watch_queue(&(0x7f0000000080), 0x80) (async) accept$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @initdev}, &(0x7f0000000300)=0x10) (async) getsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000180)={@initdev, @loopback}, &(0x7f00000002c0)=0xc) (async) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='attr/sockcreate\x00') (async) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x78e6, 0x6, 0x1ff, 0x0, r1, 0x1000, '\x00', r3, r4, 0x3, 0x1, 0x4, 0xc}, 0x48) (async) 07:59:48 executing program 0: prctl$PR_SET_NAME(0x3d, 0x0) 07:59:48 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) syz_open_pts(r0, 0xa2800) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x0) (async, rerun: 64) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async, rerun: 64) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:48 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 31) 07:59:48 executing program 0: prctl$PR_SET_NAME(0x3d, 0x0) [ 1770.665726][T32666] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1770.665748][T32666] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1770.665764][T32666] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1770.665779][T32666] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1770.665854][T32666] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1770.665949][T32666] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1770.665972][T32666] 07:59:48 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x9, 0x1, {}, 0x0, 0x0, 0xffff}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:48 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/dev_snmp6\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x106, 0x1}}, 0x20) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f0000000040)={0x1000, 0x1}) 07:59:48 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) syz_open_pts(r0, 0xa2800) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) syz_open_pts(r0, 0xa2800) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) [ 1770.826456][T32718] FAULT_INJECTION: forcing a failure. [ 1770.826456][T32718] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1770.839599][T32718] CPU: 1 PID: 32718 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1770.850109][T32718] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1770.860181][T32718] Call Trace: [ 1770.863534][T32718] [ 1770.866573][T32718] dump_stack_lvl+0xda/0x130 [ 1770.871180][T32718] dump_stack+0x15/0x20 07:59:48 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/dev_snmp6\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x106, 0x1}}, 0x20) (async) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f0000000040)={0x1000, 0x1}) 07:59:48 executing program 0: prctl$PR_SET_NAME(0x3d, 0x0) 07:59:48 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f0000000080)={0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0x30, 0x1, @ib={0x1b, 0x81, 0x0, {"f201f2582b7a9e62d3afde74cfce0c6d"}, 0x0, 0x0, 0x3}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000340)={0x11, 0x10, 0xfa00, {&(0x7f0000000040), r2}}, 0x18) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f0000000380)=0xffffffff) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) [ 1770.875422][T32718] should_fail_ex+0x21f/0x230 [ 1770.880207][T32718] should_fail+0xb/0x10 [ 1770.884412][T32718] should_fail_usercopy+0x1a/0x20 [ 1770.889462][T32718] copy_page_from_iter_atomic+0x22d/0xcf0 [ 1770.895242][T32718] ? folio_test_hugetlb+0x3a/0x70 [ 1770.900332][T32718] ? shmem_write_begin+0x12a/0x1d0 [ 1770.905474][T32718] generic_perform_write+0x212/0x410 [ 1770.910798][T32718] ? shmem_write_begin+0x1d0/0x1d0 [ 1770.916001][T32718] __generic_file_write_iter+0xa1/0x120 [ 1770.921592][T32718] generic_file_write_iter+0x7d/0x1c0 [ 1770.927150][T32718] vfs_write+0x4ab/0x7d0 [ 1770.931470][T32718] ksys_write+0xeb/0x1a0 [ 1770.935755][T32718] __x64_sys_write+0x42/0x50 [ 1770.940521][T32718] do_syscall_64+0x41/0xc0 [ 1770.945003][T32718] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1770.950932][T32718] RIP: 0033:0x7f3d42967b29 [ 1770.955432][T32718] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 07:59:49 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0xdb06000000000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:49 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x9, 0x1, {}, 0x0, 0x0, 0xffff}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:49 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f0000000080)={0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0x30, 0x1, @ib={0x1b, 0x81, 0x0, {"f201f2582b7a9e62d3afde74cfce0c6d"}, 0x0, 0x0, 0x3}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000340)={0x11, 0x10, 0xfa00, {&(0x7f0000000040), r2}}, 0x18) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f0000000380)=0xffffffff) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) pipe(&(0x7f0000000140)) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x0, 0xffffffffffffffff, 0x30, 0x1, @ib={0x1b, 0x81, 0x0, {"f201f2582b7a9e62d3afde74cfce0c6d"}, 0x0, 0x0, 0x3}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000340)={0x11, 0x10, 0xfa00, {&(0x7f0000000040), r2}}, 0x18) (async) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f0000000380)=0xffffffff) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) 07:59:49 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/dev_snmp6\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x106, 0x1}}, 0x20) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f0000000040)={0x1000, 0x1}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/dev_snmp6\x00') (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x106, 0x1}}, 0x20) (async) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f0000000040)={0x1000, 0x1}) (async) [ 1770.975091][T32718] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1770.983541][T32718] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1770.991513][T32718] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1770.999484][T32718] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1771.007499][T32718] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1771.015469][T32718] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1771.023523][T32718] 07:59:49 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 32) 07:59:49 executing program 0: prctl$PR_SET_NAME(0x3d, 0x0) 07:59:49 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCNOTTY(r1, 0x5422) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000040)={0x11, 0xfffffffffffffffc, 0xfa00, {0x0}}, 0xffffffffffffffdd) 07:59:49 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f0000000080)={0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0x30, 0x1, @ib={0x1b, 0x81, 0x0, {"f201f2582b7a9e62d3afde74cfce0c6d"}, 0x0, 0x0, 0x3}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000340)={0x11, 0x10, 0xfa00, {&(0x7f0000000040), r2}}, 0x18) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f0000000380)=0xffffffff) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) pipe(&(0x7f0000000140)) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x0, 0xffffffffffffffff, 0x30, 0x1, @ib={0x1b, 0x81, 0x0, {"f201f2582b7a9e62d3afde74cfce0c6d"}, 0x0, 0x0, 0x3}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000340)={0x11, 0x10, 0xfa00, {&(0x7f0000000040), r2}}, 0x18) (async) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f0000000380)=0xffffffff) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) 07:59:49 executing program 5: bind$x25(0xffffffffffffffff, &(0x7f0000000000), 0x12) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='attr/keycreate\x00') mq_timedsend(r2, &(0x7f00000000c0)="4045bd44bc3aeb90b31dfd0e727bcc925de35cdd7b41e0bcc992266f12206105a4cde20f6bba3f6054798fd8e3d4e6e8ce3f2c347ab234a183acced3422662c3f3c1f10f473868a7b6ec7e127b469527a58ffb9a613123b39de74bb8bad38c1b6e1e56802649e06e0ff221f10f853586a1a6483f2ba43899bf13b1f0610b5cb7c1ceefb880f9b889bfef4a9a01f5e4d258062cac08b480a88cbe41ddc4e8c6", 0x9f, 0xffffffff, &(0x7f0000000180)={0x0, 0x989680}) r3 = syz_init_net_socket$x25(0x9, 0x5, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r4) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x44400, 0x0) mq_timedreceive(r5, &(0x7f00000001c0)=""/83, 0x53, 0x8000, 0x0) ioctl$SIOCX25SENDCALLACCPT(r3, 0x89e9) 07:59:49 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0xfefdffff00000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:49 executing program 0: prctl$PR_SET_NAME(0x3d, 0x0) 07:59:49 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) pipe(&(0x7f0000000040)) socket$xdp(0x2c, 0x3, 0x0) accept4$llc(r0, 0x0, &(0x7f0000000080), 0x0) 07:59:49 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCNOTTY(r1, 0x5422) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000040)={0x11, 0xfffffffffffffffc, 0xfa00, {0x0}}, 0xffffffffffffffdd) 07:59:49 executing program 5: bind$x25(0xffffffffffffffff, &(0x7f0000000000), 0x12) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) (async) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) (async) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='attr/keycreate\x00') mq_timedsend(r2, &(0x7f00000000c0)="4045bd44bc3aeb90b31dfd0e727bcc925de35cdd7b41e0bcc992266f12206105a4cde20f6bba3f6054798fd8e3d4e6e8ce3f2c347ab234a183acced3422662c3f3c1f10f473868a7b6ec7e127b469527a58ffb9a613123b39de74bb8bad38c1b6e1e56802649e06e0ff221f10f853586a1a6483f2ba43899bf13b1f0610b5cb7c1ceefb880f9b889bfef4a9a01f5e4d258062cac08b480a88cbe41ddc4e8c6", 0x9f, 0xffffffff, &(0x7f0000000180)={0x0, 0x989680}) (async) r3 = syz_init_net_socket$x25(0x9, 0x5, 0x0) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r4) (async, rerun: 64) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x44400, 0x0) (rerun: 64) mq_timedreceive(r5, &(0x7f00000001c0)=""/83, 0x53, 0x8000, 0x0) (async, rerun: 32) ioctl$SIOCX25SENDCALLACCPT(r3, 0x89e9) (rerun: 32) [ 1771.186969][ T304] FAULT_INJECTION: forcing a failure. [ 1771.186969][ T304] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1771.200321][ T304] CPU: 0 PID: 304 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1771.210583][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1771.220698][ T304] Call Trace: [ 1771.224006][ T304] [ 1771.226979][ T304] dump_stack_lvl+0xda/0x130 [ 1771.231654][ T304] dump_stack+0x15/0x20 07:59:49 executing program 0: prctl$PR_SET_NAME(0x3d, 0x0) 07:59:49 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) [ 1771.235880][ T304] should_fail_ex+0x21f/0x230 [ 1771.240621][ T304] __should_fail_alloc_page+0xfd/0x110 [ 1771.246147][ T304] __alloc_pages+0x108/0x340 [ 1771.250780][ T304] vma_alloc_folio+0x6a3/0x8c0 [ 1771.255660][ T304] shmem_get_folio_gfp+0x801/0x1200 [ 1771.260947][ T304] shmem_write_begin+0xa6/0x1d0 [ 1771.265852][ T304] generic_perform_write+0x1cf/0x410 [ 1771.271174][ T304] ? shmem_write_begin+0x1d0/0x1d0 [ 1771.276322][ T304] __generic_file_write_iter+0xa1/0x120 [ 1771.281996][ T304] generic_file_write_iter+0x7d/0x1c0 [ 1771.287396][ T304] vfs_write+0x4ab/0x7d0 [ 1771.291739][ T304] ksys_write+0xeb/0x1a0 [ 1771.296018][ T304] __x64_sys_write+0x42/0x50 [ 1771.300681][ T304] do_syscall_64+0x41/0xc0 [ 1771.305171][ T304] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1771.311237][ T304] RIP: 0033:0x7f3d42967b29 [ 1771.315672][ T304] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 07:59:49 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 33) 07:59:49 executing program 0: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x6400000000000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:49 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCNOTTY(r1, 0x5422) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000040)={0x11, 0xfffffffffffffffc, 0xfa00, {0x0}}, 0xffffffffffffffdd) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) pipe(&(0x7f0000000140)) (async) ioctl$TIOCNOTTY(r1, 0x5422) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000040)={0x11, 0xfffffffffffffffc, 0xfa00, {0x0}}, 0xffffffffffffffdd) (async) 07:59:49 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) pipe(&(0x7f0000000040)) socket$xdp(0x2c, 0x3, 0x0) accept4$llc(r0, 0x0, &(0x7f0000000080), 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) pipe(&(0x7f0000000040)) (async) socket$xdp(0x2c, 0x3, 0x0) (async) accept4$llc(r0, 0x0, &(0x7f0000000080), 0x0) (async) 07:59:49 executing program 5: bind$x25(0xffffffffffffffff, &(0x7f0000000000), 0x12) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='attr/keycreate\x00') (async) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='attr/keycreate\x00') mq_timedsend(r2, &(0x7f00000000c0)="4045bd44bc3aeb90b31dfd0e727bcc925de35cdd7b41e0bcc992266f12206105a4cde20f6bba3f6054798fd8e3d4e6e8ce3f2c347ab234a183acced3422662c3f3c1f10f473868a7b6ec7e127b469527a58ffb9a613123b39de74bb8bad38c1b6e1e56802649e06e0ff221f10f853586a1a6483f2ba43899bf13b1f0610b5cb7c1ceefb880f9b889bfef4a9a01f5e4d258062cac08b480a88cbe41ddc4e8c6", 0x9f, 0xffffffff, &(0x7f0000000180)={0x0, 0x989680}) r3 = syz_init_net_socket$x25(0x9, 0x5, 0x0) pipe(&(0x7f0000000140)) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r4) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x44400, 0x0) mq_timedreceive(r5, &(0x7f00000001c0)=""/83, 0x53, 0x8000, 0x0) ioctl$SIOCX25SENDCALLACCPT(r3, 0x89e9) (async) ioctl$SIOCX25SENDCALLACCPT(r3, 0x89e9) 07:59:49 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) [ 1771.335319][ T304] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1771.343749][ T304] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1771.351733][ T304] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1771.359828][ T304] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1771.367910][ T304] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1771.375896][ T304] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1771.383968][ T304] 07:59:49 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) pipe(&(0x7f0000000040)) (async) socket$xdp(0x2c, 0x3, 0x0) accept4$llc(r0, 0x0, &(0x7f0000000080), 0x0) [ 1771.420916][ T342] FAULT_INJECTION: forcing a failure. [ 1771.420916][ T342] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1771.434049][ T342] CPU: 1 PID: 342 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1771.444386][ T342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1771.454468][ T342] Call Trace: [ 1771.457766][ T342] [ 1771.460709][ T342] dump_stack_lvl+0xda/0x130 [ 1771.465338][ T342] dump_stack+0x15/0x20 07:59:49 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/tty/drivers\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x20, r2, 0x1, 0x70bd27, 0x25dfdbfe, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x6}]}, 0x20}, 0x1, 0x0, 0x0, 0x8c1}, 0x24020050) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000080)={@remote, @multicast1}, &(0x7f00000001c0)=0xc) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffeee) 07:59:49 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x50000, 0x0) mq_notify(r0, &(0x7f0000000200)={0x0, 0x33, 0x1, @thr={&(0x7f0000000080)="c995ddcd5e2e411d93a8606485b30511359acb4914eadc210f75ed1d8c6f610b0ac14488052a1c157752ea2691b94320f7e44af82b3d26eca636234f2aaae6fee3cca709d067fc4c09c87895db95fd222d22ba6bc3b24a52f877426b1f3fddc55c47d6123f93d9b2b09c027438bb400e76b2df3ccb4e9192f8f95b98b5357d8c98545299055516b1283ecb0718eb08406807a5f14f8a2c8a806dbee9e03f9a88bd7729d0cf5de51e7220c1f4755b", &(0x7f0000000140)="439ee8f27f8693118f5d058957f85d0acf8f30ebf2c3c239e27253854ea680bdcb8d0ee2fc3e31ce9db5aaa83beda850dd1f5d8c6a820cea9717c94edfdda2622ea7f87e082c742b6bac3074e097cc7c5586199e61d641df510a125a9f43415cb697edd08f5cd5d3260ef6428f273ae42846b42bc848c2c077160fa05a42a6683193c4cb6926d64b4ae0e5aeef914df8363f9611e1cdec5e957ae2b3d5fe925987a99b0111dd62e1"}}) 07:59:49 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000080)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000300)={0x16, 0x98, 0xfa00, {&(0x7f00000002c0), 0x2, 0xffffffffffffffff, 0x30, 0x1, @in={0x2, 0x4e24, @loopback}}}, 0xa0) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) 07:59:49 executing program 0: prctl$PR_SET_NAME(0x3c, &(0x7f0000000040)='/dev/bsg\x00') 07:59:49 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x50000, 0x0) mq_notify(r0, &(0x7f0000000200)={0x0, 0x33, 0x1, @thr={&(0x7f0000000080)="c995ddcd5e2e411d93a8606485b30511359acb4914eadc210f75ed1d8c6f610b0ac14488052a1c157752ea2691b94320f7e44af82b3d26eca636234f2aaae6fee3cca709d067fc4c09c87895db95fd222d22ba6bc3b24a52f877426b1f3fddc55c47d6123f93d9b2b09c027438bb400e76b2df3ccb4e9192f8f95b98b5357d8c98545299055516b1283ecb0718eb08406807a5f14f8a2c8a806dbee9e03f9a88bd7729d0cf5de51e7220c1f4755b", &(0x7f0000000140)="439ee8f27f8693118f5d058957f85d0acf8f30ebf2c3c239e27253854ea680bdcb8d0ee2fc3e31ce9db5aaa83beda850dd1f5d8c6a820cea9717c94edfdda2622ea7f87e082c742b6bac3074e097cc7c5586199e61d641df510a125a9f43415cb697edd08f5cd5d3260ef6428f273ae42846b42bc848c2c077160fa05a42a6683193c4cb6926d64b4ae0e5aeef914df8363f9611e1cdec5e957ae2b3d5fe925987a99b0111dd62e1"}}) (async) mq_notify(r0, &(0x7f0000000200)={0x0, 0x33, 0x1, @thr={&(0x7f0000000080)="c995ddcd5e2e411d93a8606485b30511359acb4914eadc210f75ed1d8c6f610b0ac14488052a1c157752ea2691b94320f7e44af82b3d26eca636234f2aaae6fee3cca709d067fc4c09c87895db95fd222d22ba6bc3b24a52f877426b1f3fddc55c47d6123f93d9b2b09c027438bb400e76b2df3ccb4e9192f8f95b98b5357d8c98545299055516b1283ecb0718eb08406807a5f14f8a2c8a806dbee9e03f9a88bd7729d0cf5de51e7220c1f4755b", &(0x7f0000000140)="439ee8f27f8693118f5d058957f85d0acf8f30ebf2c3c239e27253854ea680bdcb8d0ee2fc3e31ce9db5aaa83beda850dd1f5d8c6a820cea9717c94edfdda2622ea7f87e082c742b6bac3074e097cc7c5586199e61d641df510a125a9f43415cb697edd08f5cd5d3260ef6428f273ae42846b42bc848c2c077160fa05a42a6683193c4cb6926d64b4ae0e5aeef914df8363f9611e1cdec5e957ae2b3d5fe925987a99b0111dd62e1"}}) [ 1771.469523][ T342] should_fail_ex+0x21f/0x230 [ 1771.474216][ T342] should_fail+0xb/0x10 [ 1771.478395][ T342] should_fail_usercopy+0x1a/0x20 [ 1771.483530][ T342] copy_page_from_iter_atomic+0x22d/0xcf0 [ 1771.489323][ T342] ? folio_test_hugetlb+0x3a/0x70 [ 1771.494373][ T342] ? shmem_write_begin+0x12a/0x1d0 [ 1771.499507][ T342] generic_perform_write+0x212/0x410 [ 1771.504831][ T342] ? shmem_write_begin+0x1d0/0x1d0 [ 1771.509969][ T342] __generic_file_write_iter+0xa1/0x120 [ 1771.515621][ T342] generic_file_write_iter+0x7d/0x1c0 [ 1771.521074][ T342] vfs_write+0x4ab/0x7d0 [ 1771.525368][ T342] ksys_write+0xeb/0x1a0 [ 1771.529704][ T342] __x64_sys_write+0x42/0x50 [ 1771.534413][ T342] do_syscall_64+0x41/0xc0 [ 1771.538864][ T342] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1771.544934][ T342] RIP: 0033:0x7f3d42967b29 [ 1771.549392][ T342] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1771.569138][ T342] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1771.577684][ T342] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1771.585682][ T342] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1771.593693][ T342] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1771.601707][ T342] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1771.609699][ T342] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1771.617732][ T342] 07:59:49 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 34) 07:59:49 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:49 executing program 0: prctl$PR_SET_NAME(0x3c, &(0x7f0000000040)='/dev/bsg\x00') 07:59:49 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000080)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000300)={0x16, 0x98, 0xfa00, {&(0x7f00000002c0), 0x2, 0xffffffffffffffff, 0x30, 0x1, @in={0x2, 0x4e24, @loopback}}}, 0xa0) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) 07:59:49 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') (async) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x50000, 0x0) mq_notify(r0, &(0x7f0000000200)={0x0, 0x33, 0x1, @thr={&(0x7f0000000080)="c995ddcd5e2e411d93a8606485b30511359acb4914eadc210f75ed1d8c6f610b0ac14488052a1c157752ea2691b94320f7e44af82b3d26eca636234f2aaae6fee3cca709d067fc4c09c87895db95fd222d22ba6bc3b24a52f877426b1f3fddc55c47d6123f93d9b2b09c027438bb400e76b2df3ccb4e9192f8f95b98b5357d8c98545299055516b1283ecb0718eb08406807a5f14f8a2c8a806dbee9e03f9a88bd7729d0cf5de51e7220c1f4755b", &(0x7f0000000140)="439ee8f27f8693118f5d058957f85d0acf8f30ebf2c3c239e27253854ea680bdcb8d0ee2fc3e31ce9db5aaa83beda850dd1f5d8c6a820cea9717c94edfdda2622ea7f87e082c742b6bac3074e097cc7c5586199e61d641df510a125a9f43415cb697edd08f5cd5d3260ef6428f273ae42846b42bc848c2c077160fa05a42a6683193c4cb6926d64b4ae0e5aeef914df8363f9611e1cdec5e957ae2b3d5fe925987a99b0111dd62e1"}}) 07:59:49 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/tty/drivers\x00', 0x0, 0x0) (async) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x20, r2, 0x1, 0x70bd27, 0x25dfdbfe, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x6}]}, 0x20}, 0x1, 0x0, 0x0, 0x8c1}, 0x24020050) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000080)={@remote, @multicast1}, &(0x7f00000001c0)=0xc) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffeee) 07:59:49 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xa) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f0000000080)={0x10001, 0xf8, "c54f1939ec92c03479c4cf18d8f4bcb89e431c4501f9699b47f317ad69252e508b93fee2a651ec17e9eb07abc23afd909718bbc088de92838c897ba8f6134cf92b8dd04234b900f11a04f7c39b150175a53116ebb594316cdb999511ab72075c9c23f34cc2702268eff6c7b0059833dff98bf325a40fcb1836b26da9b67ac422c017c908d97eb23fd6db6d0413b930771651438689d1f48375f1a0e420c998cf421a13ebd96f47077716e61897abbf8fe41e78ee68bf66075b59efb35301281363bb3d8c525558c956a493bd4eec5c7488d8c39b38a2b36111741522eb3a09727da247b3dda3eee31354eab4ae3785b72fed23f3a7c4f46e"}) ioctl$SNAPSHOT_UNFREEZE(r0, 0x3302) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') ioctl$GIO_FONT(r1, 0x4b60, &(0x7f0000000180)=""/125) 07:59:49 executing program 0: prctl$PR_SET_NAME(0x3c, &(0x7f0000000040)='/dev/bsg\x00') 07:59:49 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000080)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000300)={0x16, 0x98, 0xfa00, {&(0x7f00000002c0), 0x2, 0xffffffffffffffff, 0x30, 0x1, @in={0x2, 0x4e24, @loopback}}}, 0xa0) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) 07:59:49 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000340)={0xffffffffffffffff}, 0x111, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000003c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000300), 0x1, r2, 0x10, 0x0, @ib={0x1b, 0x4, 0x5, {"a61676843a4776e12377b61bfef55aee"}, 0x6, 0x401, 0x81}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r3) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000040)={0x0, r3}, 0x10) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r4) accept4$llc(r4, 0x0, &(0x7f0000000080), 0x0) 07:59:49 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) (async) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xa) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) (async) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f0000000080)={0x10001, 0xf8, "c54f1939ec92c03479c4cf18d8f4bcb89e431c4501f9699b47f317ad69252e508b93fee2a651ec17e9eb07abc23afd909718bbc088de92838c897ba8f6134cf92b8dd04234b900f11a04f7c39b150175a53116ebb594316cdb999511ab72075c9c23f34cc2702268eff6c7b0059833dff98bf325a40fcb1836b26da9b67ac422c017c908d97eb23fd6db6d0413b930771651438689d1f48375f1a0e420c998cf421a13ebd96f47077716e61897abbf8fe41e78ee68bf66075b59efb35301281363bb3d8c525558c956a493bd4eec5c7488d8c39b38a2b36111741522eb3a09727da247b3dda3eee31354eab4ae3785b72fed23f3a7c4f46e"}) (async) ioctl$SNAPSHOT_UNFREEZE(r0, 0x3302) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') (async) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f0000000180)=""/125) [ 1771.776099][ T378] FAULT_INJECTION: forcing a failure. [ 1771.776099][ T378] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1771.789402][ T378] CPU: 1 PID: 378 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1771.799694][ T378] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1771.809793][ T378] Call Trace: [ 1771.813174][ T378] [ 1771.816199][ T378] dump_stack_lvl+0xda/0x130 [ 1771.820821][ T378] dump_stack+0x15/0x20 07:59:49 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000340)={0xffffffffffffffff}, 0x111, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000003c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000300), 0x1, r2, 0x10, 0x0, @ib={0x1b, 0x4, 0x5, {"a61676843a4776e12377b61bfef55aee"}, 0x6, 0x401, 0x81}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async, rerun: 64) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 64) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r3) (async, rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000040)={0x0, r3}, 0x10) (async, rerun: 64) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r4) accept4$llc(r4, 0x0, &(0x7f0000000080), 0x0) [ 1771.825018][ T378] should_fail_ex+0x21f/0x230 [ 1771.829777][ T378] __should_fail_alloc_page+0xfd/0x110 [ 1771.835270][ T378] __alloc_pages+0x108/0x340 [ 1771.839940][ T378] vma_alloc_folio+0x6a3/0x8c0 [ 1771.844732][ T378] shmem_get_folio_gfp+0x801/0x1200 [ 1771.849968][ T378] shmem_write_begin+0xa6/0x1d0 [ 1771.854867][ T378] generic_perform_write+0x1cf/0x410 [ 1771.860274][ T378] ? shmem_write_begin+0x1d0/0x1d0 [ 1771.865415][ T378] __generic_file_write_iter+0xa1/0x120 [ 1771.871000][ T378] generic_file_write_iter+0x7d/0x1c0 [ 1771.876410][ T378] vfs_write+0x4ab/0x7d0 [ 1771.880683][ T378] ksys_write+0xeb/0x1a0 [ 1771.884956][ T378] __x64_sys_write+0x42/0x50 [ 1771.889578][ T378] do_syscall_64+0x41/0xc0 [ 1771.894018][ T378] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1771.899943][ T378] RIP: 0033:0x7f3d42967b29 [ 1771.904543][ T378] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 07:59:50 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 35) 07:59:50 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) (async, rerun: 64) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xa) (rerun: 64) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) (async, rerun: 64) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f0000000080)={0x10001, 0xf8, "c54f1939ec92c03479c4cf18d8f4bcb89e431c4501f9699b47f317ad69252e508b93fee2a651ec17e9eb07abc23afd909718bbc088de92838c897ba8f6134cf92b8dd04234b900f11a04f7c39b150175a53116ebb594316cdb999511ab72075c9c23f34cc2702268eff6c7b0059833dff98bf325a40fcb1836b26da9b67ac422c017c908d97eb23fd6db6d0413b930771651438689d1f48375f1a0e420c998cf421a13ebd96f47077716e61897abbf8fe41e78ee68bf66075b59efb35301281363bb3d8c525558c956a493bd4eec5c7488d8c39b38a2b36111741522eb3a09727da247b3dda3eee31354eab4ae3785b72fed23f3a7c4f46e"}) (rerun: 64) ioctl$SNAPSHOT_UNFREEZE(r0, 0x3302) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') (async) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f0000000180)=""/125) 07:59:50 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000340)={0xffffffffffffffff}, 0x111, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000003c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000300), 0x1, r2, 0x10, 0x0, @ib={0x1b, 0x4, 0x5, {"a61676843a4776e12377b61bfef55aee"}, 0x6, 0x401, 0x81}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r3) (async) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000040)={0x0, r3}, 0x10) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r4) accept4$llc(r4, 0x0, &(0x7f0000000080), 0x0) 07:59:50 executing program 0: prctl$PR_SET_NAME(0x3c, 0x0) 07:59:50 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) [ 1771.924186][ T378] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1771.932622][ T378] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1771.940684][ T378] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1771.948672][ T378] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1771.956696][ T378] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1771.964678][ T378] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1771.972738][ T378] [ 1772.021912][ T420] FAULT_INJECTION: forcing a failure. [ 1772.021912][ T420] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1772.035041][ T420] CPU: 0 PID: 420 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1772.045363][ T420] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1772.055441][ T420] Call Trace: [ 1772.058749][ T420] [ 1772.061780][ T420] dump_stack_lvl+0xda/0x130 [ 1772.066548][ T420] dump_stack+0x15/0x20 07:59:50 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/tty/drivers\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x20, r2, 0x1, 0x70bd27, 0x25dfdbfe, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x6}]}, 0x20}, 0x1, 0x0, 0x0, 0x8c1}, 0x24020050) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000080)={@remote, @multicast1}, &(0x7f00000001c0)=0xc) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffeee) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/tty/drivers\x00', 0x0, 0x0) (async) syz_genetlink_get_family_id$nbd(&(0x7f0000000240), 0xffffffffffffffff) (async) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x20, r2, 0x1, 0x70bd27, 0x25dfdbfe, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x6}]}, 0x20}, 0x1, 0x0, 0x0, 0x8c1}, 0x24020050) (async) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000080)={@remote, @multicast1}, &(0x7f00000001c0)=0xc) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffeee) (async) 07:59:50 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x7f}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f00000002c0)=""/169) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000280)={0x11, 0x10, 0xfa00, {&(0x7f0000000080)}}, 0x18) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ip6_mr_vif\x00') ioctl$SIOCX25SENDCALLACCPT(r1, 0x89e9) syz_init_net_socket$llc(0x1a, 0x1, 0x0) 07:59:50 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/tty/drivers\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x20, r2, 0x1, 0x70bd27, 0x25dfdbfe, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x6}]}, 0x20}, 0x1, 0x0, 0x0, 0x8c1}, 0x24020050) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000080)={@remote, @multicast1}, &(0x7f00000001c0)=0xc) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffeee) 07:59:50 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:50 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='\x00') [ 1772.070874][ T420] should_fail_ex+0x21f/0x230 [ 1772.075602][ T420] should_fail+0xb/0x10 [ 1772.079775][ T420] should_fail_usercopy+0x1a/0x20 [ 1772.084901][ T420] copy_page_from_iter_atomic+0x22d/0xcf0 [ 1772.090662][ T420] ? folio_test_hugetlb+0x3a/0x70 [ 1772.096492][ T420] ? shmem_write_begin+0x12a/0x1d0 [ 1772.101627][ T420] generic_perform_write+0x212/0x410 [ 1772.107005][ T420] ? shmem_write_begin+0x1d0/0x1d0 [ 1772.112140][ T420] __generic_file_write_iter+0xa1/0x120 07:59:50 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='\x00') 07:59:50 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='\x00') [ 1772.117815][ T420] generic_file_write_iter+0x7d/0x1c0 [ 1772.123262][ T420] vfs_write+0x4ab/0x7d0 [ 1772.127625][ T420] ksys_write+0xeb/0x1a0 [ 1772.131906][ T420] __x64_sys_write+0x42/0x50 [ 1772.136584][ T420] do_syscall_64+0x41/0xc0 [ 1772.141023][ T420] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1772.146999][ T420] RIP: 0033:0x7f3d42967b29 [ 1772.151488][ T420] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1772.171127][ T420] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1772.179573][ T420] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1772.187732][ T420] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1772.195873][ T420] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1772.203925][ T420] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1772.211921][ T420] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1772.219992][ T420] 07:59:50 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 36) 07:59:50 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) ioctl$PTP_EXTTS_REQUEST(r1, 0x40103d02, &(0x7f0000000080)={0x3fe, 0x9}) 07:59:50 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x7f}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f00000002c0)=""/169) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000280)={0x11, 0x10, 0xfa00, {&(0x7f0000000080)}}, 0x18) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000280)={0x11, 0x10, 0xfa00, {&(0x7f0000000080)}}, 0x18) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ip6_mr_vif\x00') ioctl$SIOCX25SENDCALLACCPT(r1, 0x89e9) syz_init_net_socket$llc(0x1a, 0x1, 0x0) (async) syz_init_net_socket$llc(0x1a, 0x1, 0x0) 07:59:50 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x64}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:50 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) pipe2$watch_queue(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_open_pts(r1, 0x101100) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) socket$phonet(0x23, 0x2, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) 07:59:50 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/tty/drivers\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x20, r2, 0x1, 0x70bd27, 0x25dfdbfe, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x6}]}, 0x20}, 0x1, 0x0, 0x0, 0x8c1}, 0x24020050) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000080)={@remote, @multicast1}, &(0x7f00000001c0)=0xc) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffeee) 07:59:50 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x7f}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f00000002c0)=""/169) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000280)={0x11, 0x10, 0xfa00, {&(0x7f0000000080)}}, 0x18) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ip6_mr_vif\x00') ioctl$SIOCX25SENDCALLACCPT(r1, 0x89e9) (async) syz_init_net_socket$llc(0x1a, 0x1, 0x0) 07:59:50 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) pipe2$watch_queue(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_open_pts(r1, 0x101100) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) socket$phonet(0x23, 0x2, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) pipe2$watch_queue(&(0x7f00000001c0), 0x80) (async) syz_open_pts(r1, 0x101100) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) socket$phonet(0x23, 0x2, 0x1) (async) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) (async) 07:59:50 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') (async) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) ioctl$PTP_EXTTS_REQUEST(r1, 0x40103d02, &(0x7f0000000080)={0x3fe, 0x9}) 07:59:50 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0x3e, 0x0, @ib={0x1b, 0xfff, 0x3, {"512528c45efca71cbad78b20151d808d"}, 0x1ff, 0x14000000000000, 0x5}}}, 0xa0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000000080)={0x11, 0x10, 0xfa00, {0x0, r1}}, 0x18) [ 1772.430551][ T458] FAULT_INJECTION: forcing a failure. [ 1772.430551][ T458] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1772.443988][ T458] CPU: 1 PID: 458 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1772.454286][ T458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1772.464409][ T458] Call Trace: [ 1772.467703][ T458] [ 1772.470699][ T458] dump_stack_lvl+0xda/0x130 [ 1772.475417][ T458] dump_stack+0x15/0x20 07:59:50 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') pipe2$watch_queue(&(0x7f0000000000), 0x80) (async) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) (async) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) ioctl$PTP_EXTTS_REQUEST(r1, 0x40103d02, &(0x7f0000000080)={0x3fe, 0x9}) 07:59:50 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0x3e, 0x0, @ib={0x1b, 0xfff, 0x3, {"512528c45efca71cbad78b20151d808d"}, 0x1ff, 0x14000000000000, 0x5}}}, 0xa0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000000080)={0x11, 0x10, 0xfa00, {0x0, r1}}, 0x18) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x0, 0xffffffffffffffff, 0x3e, 0x0, @ib={0x1b, 0xfff, 0x3, {"512528c45efca71cbad78b20151d808d"}, 0x1ff, 0x14000000000000, 0x5}}}, 0xa0) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000000080)={0x11, 0x10, 0xfa00, {0x0, r1}}, 0x18) (async) [ 1772.479640][ T458] should_fail_ex+0x21f/0x230 [ 1772.484410][ T458] __should_fail_alloc_page+0xfd/0x110 [ 1772.489904][ T458] __alloc_pages+0x108/0x340 [ 1772.494586][ T458] vma_alloc_folio+0x6a3/0x8c0 [ 1772.499517][ T458] shmem_get_folio_gfp+0x801/0x1200 [ 1772.504760][ T458] shmem_write_begin+0xa6/0x1d0 [ 1772.509669][ T458] generic_perform_write+0x1cf/0x410 [ 1772.514999][ T458] ? shmem_write_begin+0x1d0/0x1d0 [ 1772.520175][ T458] __generic_file_write_iter+0xa1/0x120 [ 1772.525802][ T458] generic_file_write_iter+0x7d/0x1c0 [ 1772.531286][ T458] vfs_write+0x4ab/0x7d0 [ 1772.535679][ T458] ksys_write+0xeb/0x1a0 [ 1772.539975][ T458] __x64_sys_write+0x42/0x50 [ 1772.544725][ T458] do_syscall_64+0x41/0xc0 [ 1772.549200][ T458] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1772.555168][ T458] RIP: 0033:0x7f3d42967b29 [ 1772.559603][ T458] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 07:59:50 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 37) 07:59:50 executing program 5: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='fdinfo/4\x00') prctl$PR_SET_NAME(0xf, &(0x7f0000000180)=' \x8f\"\xa3\xe7\x03d\xbb\x85V\xe9R\x00F.\x84\x10(#\xd5t,\xf9\xd9\xb7\xf4\xd9\x12\x05\xb7Jj\xad\x10\x93\xa0\xa3\xafC\xccQ\xb3l|\x18\xd8\x1e\xce\x01\xffNW\x06\x05=P\x8a\xa6\xf8\x01T\x11\xc9B>\xdecb\x80\x19C)\x8e\x9eiIP\xec\x1cp{7\x1b\x91Z\xb59\xfd\xb4\xabnB\xae\xc5\xc0\xe6v\xd6F\x9b+1\x9a\xf2\x8b\x05\x15\x02\x1f\x89\xa4\x93\'\xd0\xa9\x00\xd7Gb\xd8\'\x99\xa7M\x8c\xb0\xa0\xbf\xca\x1bZ\xa7R\x835\xa7\xd4AB\xfdk*\xf42\xb0\xed\x01\xc8XD<94>\x8d\xfa\xe3\x9cn\x8d\xd4)\xf0\xd3(\xee\a1\x93\xc9kg\x94\xe3f|\x01\x00\x1f\x97\x99w\x80\x8f\xf4\xbf\xf6\xff\x84,\xfbO\xc3\xea9\xaf\xd1\xa9ur-\x00\xaaO\xaa\x18\x88;6\x894\x95*\xa8\xe9\r6\xfd\x9e\xe7.\x8c\xdf\x92G\xff\x7f\xcck0n_y0%\xbd\xe3\xfd\xec\x1c\x8c\xb0XK\x03\x00\x00\x00\x00\x00\x00\x00\x15\xf5fC\xd0\x00'/277) 07:59:50 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0x3e, 0x0, @ib={0x1b, 0xfff, 0x3, {"512528c45efca71cbad78b20151d808d"}, 0x1ff, 0x14000000000000, 0x5}}}, 0xa0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000000080)={0x11, 0x10, 0xfa00, {0x0, r1}}, 0x18) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x0, 0xffffffffffffffff, 0x3e, 0x0, @ib={0x1b, 0xfff, 0x3, {"512528c45efca71cbad78b20151d808d"}, 0x1ff, 0x14000000000000, 0x5}}}, 0xa0) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000000080)={0x11, 0x10, 0xfa00, {0x0, r1}}, 0x18) (async) 07:59:50 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) pipe2$watch_queue(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_open_pts(r1, 0x101100) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) socket$phonet(0x23, 0x2, 0x1) (async) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) 07:59:50 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x300}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) [ 1772.579279][ T458] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1772.587907][ T458] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1772.595940][ T458] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1772.603920][ T458] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1772.611979][ T458] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1772.620075][ T458] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1772.628093][ T458] [ 1772.678012][ T499] FAULT_INJECTION: forcing a failure. [ 1772.678012][ T499] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1772.691121][ T499] CPU: 0 PID: 499 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1772.701389][ T499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1772.711482][ T499] Call Trace: [ 1772.714779][ T499] [ 1772.717810][ T499] dump_stack_lvl+0xda/0x130 [ 1772.722421][ T499] dump_stack+0x15/0x20 [ 1772.726601][ T499] should_fail_ex+0x21f/0x230 [ 1772.731315][ T499] should_fail+0xb/0x10 [ 1772.735497][ T499] should_fail_usercopy+0x1a/0x20 [ 1772.740672][ T499] copy_page_from_iter_atomic+0x22d/0xcf0 [ 1772.746486][ T499] ? folio_test_hugetlb+0x3a/0x70 [ 1772.751618][ T499] ? shmem_write_begin+0x12a/0x1d0 [ 1772.756753][ T499] generic_perform_write+0x212/0x410 [ 1772.762142][ T499] ? shmem_write_begin+0x1d0/0x1d0 [ 1772.767274][ T499] __generic_file_write_iter+0xa1/0x120 [ 1772.772867][ T499] generic_file_write_iter+0x7d/0x1c0 07:59:50 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/tty/drivers\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x20, r2, 0x1, 0x70bd27, 0x25dfdbfe, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x6}]}, 0x20}, 0x1, 0x0, 0x0, 0x8c1}, 0x24020050) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000080)={@remote, @multicast1}, &(0x7f00000001c0)=0xc) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffeee) 07:59:50 executing program 5: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='fdinfo/4\x00') prctl$PR_SET_NAME(0xf, &(0x7f0000000180)=' \x8f\"\xa3\xe7\x03d\xbb\x85V\xe9R\x00F.\x84\x10(#\xd5t,\xf9\xd9\xb7\xf4\xd9\x12\x05\xb7Jj\xad\x10\x93\xa0\xa3\xafC\xccQ\xb3l|\x18\xd8\x1e\xce\x01\xffNW\x06\x05=P\x8a\xa6\xf8\x01T\x11\xc9B>\xdecb\x80\x19C)\x8e\x9eiIP\xec\x1cp{7\x1b\x91Z\xb59\xfd\xb4\xabnB\xae\xc5\xc0\xe6v\xd6F\x9b+1\x9a\xf2\x8b\x05\x15\x02\x1f\x89\xa4\x93\'\xd0\xa9\x00\xd7Gb\xd8\'\x99\xa7M\x8c\xb0\xa0\xbf\xca\x1bZ\xa7R\x835\xa7\xd4AB\xfdk*\xf42\xb0\xed\x01\xc8XD<94>\x8d\xfa\xe3\x9cn\x8d\xd4)\xf0\xd3(\xee\a1\x93\xc9kg\x94\xe3f|\x01\x00\x1f\x97\x99w\x80\x8f\xf4\xbf\xf6\xff\x84,\xfbO\xc3\xea9\xaf\xd1\xa9ur-\x00\xaaO\xaa\x18\x88;6\x894\x95*\xa8\xe9\r6\xfd\x9e\xe7.\x8c\xdf\x92G\xff\x7f\xcck0n_y0%\xbd\xe3\xfd\xec\x1c\x8c\xb0XK\x03\x00\x00\x00\x00\x00\x00\x00\x15\xf5fC\xd0\x00'/277) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='fdinfo/4\x00') (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000180)=' \x8f\"\xa3\xe7\x03d\xbb\x85V\xe9R\x00F.\x84\x10(#\xd5t,\xf9\xd9\xb7\xf4\xd9\x12\x05\xb7Jj\xad\x10\x93\xa0\xa3\xafC\xccQ\xb3l|\x18\xd8\x1e\xce\x01\xffNW\x06\x05=P\x8a\xa6\xf8\x01T\x11\xc9B>\xdecb\x80\x19C)\x8e\x9eiIP\xec\x1cp{7\x1b\x91Z\xb59\xfd\xb4\xabnB\xae\xc5\xc0\xe6v\xd6F\x9b+1\x9a\xf2\x8b\x05\x15\x02\x1f\x89\xa4\x93\'\xd0\xa9\x00\xd7Gb\xd8\'\x99\xa7M\x8c\xb0\xa0\xbf\xca\x1bZ\xa7R\x835\xa7\xd4AB\xfdk*\xf42\xb0\xed\x01\xc8XD<94>\x8d\xfa\xe3\x9cn\x8d\xd4)\xf0\xd3(\xee\a1\x93\xc9kg\x94\xe3f|\x01\x00\x1f\x97\x99w\x80\x8f\xf4\xbf\xf6\xff\x84,\xfbO\xc3\xea9\xaf\xd1\xa9ur-\x00\xaaO\xaa\x18\x88;6\x894\x95*\xa8\xe9\r6\xfd\x9e\xe7.\x8c\xdf\x92G\xff\x7f\xcck0n_y0%\xbd\xe3\xfd\xec\x1c\x8c\xb0XK\x03\x00\x00\x00\x00\x00\x00\x00\x15\xf5fC\xd0\x00'/277) (async) 07:59:50 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001680), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0xfffd, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:50 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001680), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0xfffd, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:50 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x6db}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:50 executing program 1: openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001680), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @ib={0x1b, 0xfffd, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) [ 1772.778340][ T499] vfs_write+0x4ab/0x7d0 [ 1772.782703][ T499] ksys_write+0xeb/0x1a0 [ 1772.786983][ T499] __x64_sys_write+0x42/0x50 [ 1772.791668][ T499] do_syscall_64+0x41/0xc0 [ 1772.796120][ T499] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1772.802044][ T499] RIP: 0033:0x7f3d42967b29 [ 1772.806473][ T499] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 07:59:50 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x0, 0x0, 0x3}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000080)={0x11, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) [ 1772.826236][ T499] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1772.834703][ T499] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1772.842863][ T499] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1772.850874][ T499] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1772.858902][ T499] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1772.867321][ T499] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1772.875330][ T499] 07:59:51 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 38) 07:59:51 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) ioctl$TIOCSISO7816(r1, 0xc0285443, &(0x7f0000000040)={0x8, 0x0, 0x0, 0x8, 0xad3}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:51 executing program 5: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='fdinfo/4\x00') prctl$PR_SET_NAME(0xf, &(0x7f0000000180)=' \x8f\"\xa3\xe7\x03d\xbb\x85V\xe9R\x00F.\x84\x10(#\xd5t,\xf9\xd9\xb7\xf4\xd9\x12\x05\xb7Jj\xad\x10\x93\xa0\xa3\xafC\xccQ\xb3l|\x18\xd8\x1e\xce\x01\xffNW\x06\x05=P\x8a\xa6\xf8\x01T\x11\xc9B>\xdecb\x80\x19C)\x8e\x9eiIP\xec\x1cp{7\x1b\x91Z\xb59\xfd\xb4\xabnB\xae\xc5\xc0\xe6v\xd6F\x9b+1\x9a\xf2\x8b\x05\x15\x02\x1f\x89\xa4\x93\'\xd0\xa9\x00\xd7Gb\xd8\'\x99\xa7M\x8c\xb0\xa0\xbf\xca\x1bZ\xa7R\x835\xa7\xd4AB\xfdk*\xf42\xb0\xed\x01\xc8XD<94>\x8d\xfa\xe3\x9cn\x8d\xd4)\xf0\xd3(\xee\a1\x93\xc9kg\x94\xe3f|\x01\x00\x1f\x97\x99w\x80\x8f\xf4\xbf\xf6\xff\x84,\xfbO\xc3\xea9\xaf\xd1\xa9ur-\x00\xaaO\xaa\x18\x88;6\x894\x95*\xa8\xe9\r6\xfd\x9e\xe7.\x8c\xdf\x92G\xff\x7f\xcck0n_y0%\xbd\xe3\xfd\xec\x1c\x8c\xb0XK\x03\x00\x00\x00\x00\x00\x00\x00\x15\xf5fC\xd0\x00'/277) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='fdinfo/4\x00') (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000180)=' \x8f\"\xa3\xe7\x03d\xbb\x85V\xe9R\x00F.\x84\x10(#\xd5t,\xf9\xd9\xb7\xf4\xd9\x12\x05\xb7Jj\xad\x10\x93\xa0\xa3\xafC\xccQ\xb3l|\x18\xd8\x1e\xce\x01\xffNW\x06\x05=P\x8a\xa6\xf8\x01T\x11\xc9B>\xdecb\x80\x19C)\x8e\x9eiIP\xec\x1cp{7\x1b\x91Z\xb59\xfd\xb4\xabnB\xae\xc5\xc0\xe6v\xd6F\x9b+1\x9a\xf2\x8b\x05\x15\x02\x1f\x89\xa4\x93\'\xd0\xa9\x00\xd7Gb\xd8\'\x99\xa7M\x8c\xb0\xa0\xbf\xca\x1bZ\xa7R\x835\xa7\xd4AB\xfdk*\xf42\xb0\xed\x01\xc8XD<94>\x8d\xfa\xe3\x9cn\x8d\xd4)\xf0\xd3(\xee\a1\x93\xc9kg\x94\xe3f|\x01\x00\x1f\x97\x99w\x80\x8f\xf4\xbf\xf6\xff\x84,\xfbO\xc3\xea9\xaf\xd1\xa9ur-\x00\xaaO\xaa\x18\x88;6\x894\x95*\xa8\xe9\r6\xfd\x9e\xe7.\x8c\xdf\x92G\xff\x7f\xcck0n_y0%\xbd\xe3\xfd\xec\x1c\x8c\xb0XK\x03\x00\x00\x00\x00\x00\x00\x00\x15\xf5fC\xd0\x00'/277) (async) 07:59:51 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x0, 0x0, 0x3}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000080)={0x11, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) 07:59:51 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x700}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) [ 1773.074438][ T535] FAULT_INJECTION: forcing a failure. [ 1773.074438][ T535] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1773.087733][ T535] CPU: 1 PID: 535 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1773.098009][ T535] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1773.108178][ T535] Call Trace: [ 1773.111475][ T535] [ 1773.114431][ T535] dump_stack_lvl+0xda/0x130 [ 1773.119058][ T535] dump_stack+0x15/0x20 07:59:51 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/tty/drivers\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x20, r1, 0x1, 0x70bd27, 0x25dfdbfe, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x6}]}, 0x20}, 0x1, 0x0, 0x0, 0x8c1}, 0x24020050) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffeee) 07:59:51 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)=0x0) mq_notify(r0, &(0x7f00000000c0)={0x0, 0x1b, 0x0, @tid=r1}) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='./\xfa\x00') syz_open_dev$tty1(0xc, 0x4, 0x3) 07:59:51 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x0, 0x0, 0x3}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x0, 0x0, 0x3}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000080)={0x11, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) 07:59:51 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) (async) ioctl$TIOCSISO7816(r1, 0xc0285443, &(0x7f0000000040)={0x8, 0x0, 0x0, 0x8, 0xad3}) (async, rerun: 64) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (rerun: 64) [ 1773.123388][ T535] should_fail_ex+0x21f/0x230 [ 1773.128172][ T535] __should_fail_alloc_page+0xfd/0x110 [ 1773.133705][ T535] __alloc_pages+0x108/0x340 [ 1773.138366][ T535] vma_alloc_folio+0x6a3/0x8c0 [ 1773.143345][ T535] shmem_get_folio_gfp+0x801/0x1200 [ 1773.148669][ T535] shmem_write_begin+0xa6/0x1d0 [ 1773.153589][ T535] generic_perform_write+0x1cf/0x410 [ 1773.158900][ T535] ? shmem_write_begin+0x1d0/0x1d0 [ 1773.164045][ T535] __generic_file_write_iter+0xa1/0x120 [ 1773.169658][ T535] generic_file_write_iter+0x7d/0x1c0 [ 1773.175068][ T535] vfs_write+0x4ab/0x7d0 [ 1773.179425][ T535] ksys_write+0xeb/0x1a0 [ 1773.183697][ T535] __x64_sys_write+0x42/0x50 [ 1773.188320][ T535] do_syscall_64+0x41/0xc0 [ 1773.192765][ T535] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1773.198726][ T535] RIP: 0033:0x7f3d42967b29 [ 1773.203157][ T535] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 07:59:51 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) (async) ioctl$TIOCSISO7816(r1, 0xc0285443, &(0x7f0000000040)={0x8, 0x0, 0x0, 0x8, 0xad3}) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:51 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x6400}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:51 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) (async) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)=0x0) mq_notify(r0, &(0x7f00000000c0)={0x0, 0x1b, 0x0, @tid=r1}) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='./\xfa\x00') (async, rerun: 64) syz_open_dev$tty1(0xc, 0x4, 0x3) (rerun: 64) 07:59:51 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 39) [ 1773.222807][ T535] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1773.231291][ T535] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1773.239370][ T535] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1773.247426][ T535] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1773.255483][ T535] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1773.263469][ T535] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1773.271454][ T535] 07:59:51 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/tty/drivers\x00', 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000240), 0xffffffffffffffff) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffeee) 07:59:51 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x28000, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) r1 = accept4$llc(r0, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x10, 0x0) connect$llc(r1, &(0x7f0000000280)={0x1a, 0x0, 0x6, 0x55, 0x1, 0x7}, 0x10) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) [ 1773.324289][ T557] FAULT_INJECTION: forcing a failure. [ 1773.324289][ T557] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1773.337463][ T557] CPU: 1 PID: 557 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1773.347726][ T557] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1773.357819][ T557] Call Trace: [ 1773.361118][ T557] [ 1773.364122][ T557] dump_stack_lvl+0xda/0x130 [ 1773.368823][ T557] dump_stack+0x15/0x20 07:59:51 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001680), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r3, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x4, r3, 0x2c, 0x1, @in6={0xa, 0x4e21, 0x1000, @loopback, 0x3}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) [ 1773.373071][ T557] should_fail_ex+0x21f/0x230 [ 1773.378035][ T557] should_fail+0xb/0x10 [ 1773.382222][ T557] should_fail_usercopy+0x1a/0x20 [ 1773.387271][ T557] copy_page_from_iter_atomic+0x22d/0xcf0 [ 1773.393043][ T557] ? folio_test_hugetlb+0x3a/0x70 [ 1773.398174][ T557] ? shmem_write_begin+0x12a/0x1d0 [ 1773.403320][ T557] generic_perform_write+0x212/0x410 [ 1773.408679][ T557] ? shmem_write_begin+0x1d0/0x1d0 [ 1773.413888][ T557] __generic_file_write_iter+0xa1/0x120 [ 1773.419508][ T557] generic_file_write_iter+0x7d/0x1c0 [ 1773.424955][ T557] vfs_write+0x4ab/0x7d0 [ 1773.429229][ T557] ksys_write+0xeb/0x1a0 [ 1773.433504][ T557] __x64_sys_write+0x42/0x50 [ 1773.438180][ T557] do_syscall_64+0x41/0xc0 [ 1773.442691][ T557] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1773.448623][ T557] RIP: 0033:0x7f3d42967b29 [ 1773.453079][ T557] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 07:59:51 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x28000, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) r1 = accept4$llc(r0, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x10, 0x0) connect$llc(r1, &(0x7f0000000280)={0x1a, 0x0, 0x6, 0x55, 0x1, 0x7}, 0x10) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x28000, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) accept4$llc(r0, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x10, 0x0) (async) connect$llc(r1, &(0x7f0000000280)={0x1a, 0x0, 0x6, 0x55, 0x1, 0x7}, 0x10) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) 07:59:51 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x28000, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) r1 = accept4$llc(r0, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x10, 0x0) connect$llc(r1, &(0x7f0000000280)={0x1a, 0x0, 0x6, 0x55, 0x1, 0x7}, 0x10) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:51 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0xdb06}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:51 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001680), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r3, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x4, r3, 0x2c, 0x1, @in6={0xa, 0x4e21, 0x1000, @loopback, 0x3}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) [ 1773.472797][ T557] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1773.481231][ T557] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1773.489233][ T557] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1773.497301][ T557] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1773.505360][ T557] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1773.513347][ T557] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1773.521414][ T557] 07:59:51 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)=0x0) mq_notify(r0, &(0x7f00000000c0)={0x0, 0x1b, 0x0, @tid=r1}) (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='./\xfa\x00') syz_open_dev$tty1(0xc, 0x4, 0x3) 07:59:51 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000080)={0x11, 0xfffffffffffffe16, 0xfa00, {0x0}}, 0xffffffffffffff2b) 07:59:51 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='?\x05\xbb\x8b\xdd1w!\xe3') prctl$PR_SET_NAME(0xf, &(0x7f0000000080)='\x00') setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x80000001}, 0x4) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/bsg\x00') prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='/dev/bsg\x00') 07:59:51 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001680), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r3, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x4, r3, 0x2c, 0x1, @in6={0xa, 0x4e21, 0x1000, @loopback, 0x3}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:51 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 40) 07:59:51 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000080)={0x11, 0xfffffffffffffe16, 0xfa00, {0x0}}, 0xffffffffffffff2b) 07:59:51 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x2f8, 0x0, {"a1d6c4dd732a80bff10d00"}, 0x4000000, 0x3, 0x4000000000000}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:51 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x34000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:51 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/tty/drivers\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffeee) 07:59:51 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='?\x05\xbb\x8b\xdd1w!\xe3') prctl$PR_SET_NAME(0xf, &(0x7f0000000080)='\x00') (async) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x80000001}, 0x4) (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/bsg\x00') (async) prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='/dev/bsg\x00') 07:59:51 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x2f8, 0x0, {"a1d6c4dd732a80bff10d00"}, 0x4000000, 0x3, 0x4000000000000}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:51 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='?\x05\xbb\x8b\xdd1w!\xe3') prctl$PR_SET_NAME(0xf, &(0x7f0000000080)='\x00') setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x80000001}, 0x4) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/bsg\x00') (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/bsg\x00') prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='/dev/bsg\x00') 07:59:51 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000080)={0x11, 0xfffffffffffffe16, 0xfa00, {0x0}}, 0xffffffffffffff2b) 07:59:51 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x2f8, 0x0, {"a1d6c4dd732a80bff10d00"}, 0x4000000, 0x3, 0x4000000000000}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:51 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f0000000080)={0x6, 0xeade, 0x3}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x3, 0xffffffffffffffff, 0x10, 0x1, @ib={0x1b, 0x8, 0x2, {"b9f6b2162cf74be2b2e60593365ca7b6"}, 0x1d20, 0x4, 0x3f}}}, 0xa0) [ 1773.761698][ T612] FAULT_INJECTION: forcing a failure. [ 1773.761698][ T612] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1773.775139][ T612] CPU: 0 PID: 612 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1773.785401][ T612] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1773.795475][ T612] Call Trace: [ 1773.798761][ T612] [ 1773.801715][ T612] dump_stack_lvl+0xda/0x130 [ 1773.806346][ T612] dump_stack+0x15/0x20 [ 1773.810543][ T612] should_fail_ex+0x21f/0x230 [ 1773.815325][ T612] __should_fail_alloc_page+0xfd/0x110 [ 1773.820937][ T612] __alloc_pages+0x108/0x340 [ 1773.825560][ T612] vma_alloc_folio+0x6a3/0x8c0 [ 1773.830361][ T612] shmem_get_folio_gfp+0x801/0x1200 [ 1773.835671][ T612] shmem_write_begin+0xa6/0x1d0 [ 1773.835698][ T612] generic_perform_write+0x1cf/0x410 [ 1773.845920][ T612] ? shmem_write_begin+0x1d0/0x1d0 [ 1773.845948][ T612] __generic_file_write_iter+0xa1/0x120 [ 1773.856646][ T612] generic_file_write_iter+0x7d/0x1c0 07:59:51 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async, rerun: 64) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) (rerun: 64) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f0000000080)={0x6, 0xeade, 0x3}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x3, 0xffffffffffffffff, 0x10, 0x1, @ib={0x1b, 0x8, 0x2, {"b9f6b2162cf74be2b2e60593365ca7b6"}, 0x1d20, 0x4, 0x3f}}}, 0xa0) [ 1773.862179][ T612] vfs_write+0x4ab/0x7d0 [ 1773.866468][ T612] ksys_write+0xeb/0x1a0 [ 1773.870811][ T612] __x64_sys_write+0x42/0x50 [ 1773.875471][ T612] do_syscall_64+0x41/0xc0 [ 1773.879941][ T612] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1773.885942][ T612] RIP: 0033:0x7f3d42967b29 [ 1773.890377][ T612] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 07:59:51 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 41) 07:59:51 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x400300}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:51 executing program 5: ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000000)={0x798f, 0x7ff}) prctl$PR_SET_NAME(0xf, &(0x7f0000000100)='Id\xc4W\xa6\xe6Pb\xfe\x89V\xe1\xe6\xbd\x81\xb2WR@pY\xc9J\x90\x02\x04>C\x98 \xee\xbf\xfd\xa73\xbc\x1b\'S\x87\x93D\x14%\xe6\x9c=tX\xf7\x9c\x92\xe4v\x11E\x8f.\xeb+\x1d;\xd8qcL|\x16\xe5P\xb3\x1b.a\xd1\xc1\xa8\x17\x02\xc7p\xa0D\x0e\x04\x00\xb3\xf5\x1f\'^.\xe3\xba\"\xb7p\x16N=\xded\xdc\xd15\xf8\xc0z\x8e\xbc\xcbC&\xb7\xec\x9d\xf5\a\xc2\x9a\x12\x14\xc0\x0f\xe7Z\xecr\xe4\\{\xd9H=\xed6\xba\xbd\xaa\xbbo\x8a\xbe\xa9\x01\xa7\x8c\xb6\x8b4\xf0\x87r\xd5\x96h\a\xcf\xfcu-\xe4\a\x19\xdb\xcd\x1dc4\xee\x7f\xcf\x04\xf2\xcf_(\xbc`i\xb2\x05\xca\xe2B.\x95\xc8\xb4\xe4\xe2\xaeD\x1fg#@p\xb7z~\x95\xbe\x8a\x94\n.>\xdd\xceR\"tM\xd6\xc1<)\x9bd\xd3x\xf1o\xa4\x9e\x06\x87\x84X\'~\xc7QyP\xc1\xdf#\x94\xd2\xe0\'\xfb\n\x1cF\xdc\xea\xc6\xe1\x89\xb3f\xd2\xcc\xa0\xa3@\x98{u\xa8\xd40xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000040)) ioctl$TIOCMIWAIT(r0, 0x545c, 0x0) [ 1773.910030][ T612] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1773.910053][ T612] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1773.910067][ T612] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1773.910084][ T612] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1773.942456][ T612] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 07:59:51 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x54801, 0x0) read$ptp(r0, &(0x7f0000000040)=""/75, 0x4b) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1a}}}}, 0xa0) r1 = syz_open_pts(r0, 0x10002) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) ioctl$VT_SETMODE(r2, 0x5602, &(0x7f0000000300)={0xca, 0x7f, 0x0, 0x1, 0x6}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) r3 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r0, 0x3309) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f00000003c0)={0x8, 0x80, 0x5, 0x1}) r4 = accept4$vsock_stream(r0, &(0x7f0000000340)={0x28, 0x0, 0x2711, @local}, 0x10, 0x80000) accept4$vsock_stream(r4, &(0x7f0000000380)={0x28, 0x0, 0xffffffff}, 0x10, 0x80000) ioctl$SIOCX25GFACILITIES(r3, 0x89ec, 0x0) sendto$x25(r3, &(0x7f0000000280)="1653", 0x2, 0x0, &(0x7f00000002c0)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x0}}, 0x12) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) [ 1773.942474][ T612] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1773.942496][ T612] [ 1773.985060][ T631] FAULT_INJECTION: forcing a failure. [ 1773.985060][ T631] name fail_page_alloc, interval 1, probability 0, space 0, times 0 07:59:52 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffeee) 07:59:52 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 42) 07:59:52 executing program 5: ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000000)={0x798f, 0x7ff}) prctl$PR_SET_NAME(0xf, &(0x7f0000000100)='Id\xc4W\xa6\xe6Pb\xfe\x89V\xe1\xe6\xbd\x81\xb2WR@pY\xc9J\x90\x02\x04>C\x98 \xee\xbf\xfd\xa73\xbc\x1b\'S\x87\x93D\x14%\xe6\x9c=tX\xf7\x9c\x92\xe4v\x11E\x8f.\xeb+\x1d;\xd8qcL|\x16\xe5P\xb3\x1b.a\xd1\xc1\xa8\x17\x02\xc7p\xa0D\x0e\x04\x00\xb3\xf5\x1f\'^.\xe3\xba\"\xb7p\x16N=\xded\xdc\xd15\xf8\xc0z\x8e\xbc\xcbC&\xb7\xec\x9d\xf5\a\xc2\x9a\x12\x14\xc0\x0f\xe7Z\xecr\xe4\\{\xd9H=\xed6\xba\xbd\xaa\xbbo\x8a\xbe\xa9\x01\xa7\x8c\xb6\x8b4\xf0\x87r\xd5\x96h\a\xcf\xfcu-\xe4\a\x19\xdb\xcd\x1dc4\xee\x7f\xcf\x04\xf2\xcf_(\xbc`i\xb2\x05\xca\xe2B.\x95\xc8\xb4\xe4\xe2\xaeD\x1fg#@p\xb7z~\x95\xbe\x8a\x94\n.>\xdd\xceR\"tM\xd6\xc1<)\x9bd\xd3x\xf1o\xa4\x9e\x06\x87\x84X\'~\xc7QyP\xc1\xdf#\x94\xd2\xe0\'\xfb\n\x1cF\xdc\xea\xc6\xe1\x89\xb3f\xd2\xcc\xa0\xa3@\x98{u\xa8\xd40xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000040)) ioctl$TIOCMIWAIT(r0, 0x545c, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000000)={0x798f, 0x7ff}) (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000100)='Id\xc4W\xa6\xe6Pb\xfe\x89V\xe1\xe6\xbd\x81\xb2WR@pY\xc9J\x90\x02\x04>C\x98 \xee\xbf\xfd\xa73\xbc\x1b\'S\x87\x93D\x14%\xe6\x9c=tX\xf7\x9c\x92\xe4v\x11E\x8f.\xeb+\x1d;\xd8qcL|\x16\xe5P\xb3\x1b.a\xd1\xc1\xa8\x17\x02\xc7p\xa0D\x0e\x04\x00\xb3\xf5\x1f\'^.\xe3\xba\"\xb7p\x16N=\xded\xdc\xd15\xf8\xc0z\x8e\xbc\xcbC&\xb7\xec\x9d\xf5\a\xc2\x9a\x12\x14\xc0\x0f\xe7Z\xecr\xe4\\{\xd9H=\xed6\xba\xbd\xaa\xbbo\x8a\xbe\xa9\x01\xa7\x8c\xb6\x8b4\xf0\x87r\xd5\x96h\a\xcf\xfcu-\xe4\a\x19\xdb\xcd\x1dc4\xee\x7f\xcf\x04\xf2\xcf_(\xbc`i\xb2\x05\xca\xe2B.\x95\xc8\xb4\xe4\xe2\xaeD\x1fg#@p\xb7z~\x95\xbe\x8a\x94\n.>\xdd\xceR\"tM\xd6\xc1<)\x9bd\xd3x\xf1o\xa4\x9e\x06\x87\x84X\'~\xc7QyP\xc1\xdf#\x94\xd2\xe0\'\xfb\n\x1cF\xdc\xea\xc6\xe1\x89\xb3f\xd2\xcc\xa0\xa3@\x98{u\xa8\xd40xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) ioctl$VT_SETMODE(r2, 0x5602, &(0x7f0000000300)={0xca, 0x7f, 0x0, 0x1, 0x6}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) r3 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r0, 0x3309) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f00000003c0)={0x8, 0x80, 0x5, 0x1}) r4 = accept4$vsock_stream(r0, &(0x7f0000000340)={0x28, 0x0, 0x2711, @local}, 0x10, 0x80000) accept4$vsock_stream(r4, &(0x7f0000000380)={0x28, 0x0, 0xffffffff}, 0x10, 0x80000) (async) accept4$vsock_stream(r4, &(0x7f0000000380)={0x28, 0x0, 0xffffffff}, 0x10, 0x80000) ioctl$SIOCX25GFACILITIES(r3, 0x89ec, 0x0) sendto$x25(r3, &(0x7f0000000280)="1653", 0x2, 0x0, &(0x7f00000002c0)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x0}}, 0x12) (async) sendto$x25(r3, &(0x7f0000000280)="1653", 0x2, 0x0, &(0x7f00000002c0)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x0}}, 0x12) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:52 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) [ 1773.985090][ T631] CPU: 1 PID: 631 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1773.985120][ T631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1773.985134][ T631] Call Trace: [ 1773.985141][ T631] [ 1773.985149][ T631] dump_stack_lvl+0xda/0x130 [ 1773.985227][ T631] dump_stack+0x15/0x20 [ 1773.985256][ T631] should_fail_ex+0x21f/0x230 [ 1773.985282][ T631] __should_fail_alloc_page+0xfd/0x110 [ 1773.985307][ T631] __alloc_pages+0x108/0x340 [ 1773.985331][ T631] vma_alloc_folio+0x6a3/0x8c0 [ 1773.985397][ T631] shmem_get_folio_gfp+0x801/0x1200 [ 1773.985433][ T631] shmem_write_begin+0xa6/0x1d0 [ 1773.985472][ T631] generic_perform_write+0x1cf/0x410 [ 1773.985502][ T631] ? shmem_write_begin+0x1d0/0x1d0 [ 1773.985610][ T631] __generic_file_write_iter+0xa1/0x120 07:59:52 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) syz_open_dev$tty20(0xc, 0x4, 0x0) (async) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f0000000080)={0x6, 0xeade, 0x3}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x3, 0xffffffffffffffff, 0x10, 0x1, @ib={0x1b, 0x8, 0x2, {"b9f6b2162cf74be2b2e60593365ca7b6"}, 0x1d20, 0x4, 0x3f}}}, 0xa0) 07:59:52 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x54801, 0x0) read$ptp(r0, &(0x7f0000000040)=""/75, 0x4b) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1a}}}}, 0xa0) r1 = syz_open_pts(r0, 0x10002) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) (async) ioctl$VT_SETMODE(r2, 0x5602, &(0x7f0000000300)={0xca, 0x7f, 0x0, 0x1, 0x6}) (async, rerun: 64) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (rerun: 64) r3 = syz_init_net_socket$x25(0x9, 0x5, 0x0) (async, rerun: 32) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r0, 0x3309) (rerun: 32) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f00000003c0)={0x8, 0x80, 0x5, 0x1}) (async, rerun: 64) r4 = accept4$vsock_stream(r0, &(0x7f0000000340)={0x28, 0x0, 0x2711, @local}, 0x10, 0x80000) (rerun: 64) accept4$vsock_stream(r4, &(0x7f0000000380)={0x28, 0x0, 0xffffffff}, 0x10, 0x80000) (async) ioctl$SIOCX25GFACILITIES(r3, 0x89ec, 0x0) sendto$x25(r3, &(0x7f0000000280)="1653", 0x2, 0x0, &(0x7f00000002c0)={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x0}}, 0x12) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) [ 1773.985687][ T631] generic_file_write_iter+0x7d/0x1c0 [ 1773.985716][ T631] vfs_write+0x4ab/0x7d0 [ 1773.985750][ T631] ksys_write+0xeb/0x1a0 [ 1773.985788][ T631] __x64_sys_write+0x42/0x50 [ 1773.985843][ T631] do_syscall_64+0x41/0xc0 [ 1773.985872][ T631] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1773.985906][ T631] RIP: 0033:0x7f3d42967b29 07:59:52 executing program 5: ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000000)={0x798f, 0x7ff}) prctl$PR_SET_NAME(0xf, &(0x7f0000000100)='Id\xc4W\xa6\xe6Pb\xfe\x89V\xe1\xe6\xbd\x81\xb2WR@pY\xc9J\x90\x02\x04>C\x98 \xee\xbf\xfd\xa73\xbc\x1b\'S\x87\x93D\x14%\xe6\x9c=tX\xf7\x9c\x92\xe4v\x11E\x8f.\xeb+\x1d;\xd8qcL|\x16\xe5P\xb3\x1b.a\xd1\xc1\xa8\x17\x02\xc7p\xa0D\x0e\x04\x00\xb3\xf5\x1f\'^.\xe3\xba\"\xb7p\x16N=\xded\xdc\xd15\xf8\xc0z\x8e\xbc\xcbC&\xb7\xec\x9d\xf5\a\xc2\x9a\x12\x14\xc0\x0f\xe7Z\xecr\xe4\\{\xd9H=\xed6\xba\xbd\xaa\xbbo\x8a\xbe\xa9\x01\xa7\x8c\xb6\x8b4\xf0\x87r\xd5\x96h\a\xcf\xfcu-\xe4\a\x19\xdb\xcd\x1dc4\xee\x7f\xcf\x04\xf2\xcf_(\xbc`i\xb2\x05\xca\xe2B.\x95\xc8\xb4\xe4\xe2\xaeD\x1fg#@p\xb7z~\x95\xbe\x8a\x94\n.>\xdd\xceR\"tM\xd6\xc1<)\x9bd\xd3x\xf1o\xa4\x9e\x06\x87\x84X\'~\xc7QyP\xc1\xdf#\x94\xd2\xe0\'\xfb\n\x1cF\xdc\xea\xc6\xe1\x89\xb3f\xd2\xcc\xa0\xa3@\x98{u\xa8\xd40xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000040)) (async) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000040)) ioctl$TIOCMIWAIT(r0, 0x545c, 0x0) 07:59:52 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SENDCALLACCPT(r0, 0x89e9) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') [ 1773.985921][ T631] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1773.985943][ T631] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1773.986036][ T631] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1773.986049][ T631] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1773.986064][ T631] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1773.986080][ T631] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 07:59:52 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SENDCALLACCPT(r0, 0x89e9) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') [ 1773.986094][ T631] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1773.986110][ T631] [ 1774.083897][ T642] FAULT_INJECTION: forcing a failure. [ 1774.083897][ T642] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1774.250669][ T642] CPU: 1 PID: 642 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1774.261022][ T642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1774.261041][ T642] Call Trace: [ 1774.261049][ T642] [ 1774.261058][ T642] dump_stack_lvl+0xda/0x130 07:59:52 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) pselect6(0x40, &(0x7f0000000080), &(0x7f0000000100)={0x4}, &(0x7f0000000140)={0x7}, 0x0, &(0x7f0000000200)={0x0}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"899aa3220ca08d1eea4330e3f9ffdde5"}, 0x0, 0x5, 0x2}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) openat$full(0xffffffffffffff9c, &(0x7f0000000380), 0x10000, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/sco\x00') ioctl$TIOCSLCKTRMIOS(r2, 0x5457, &(0x7f0000000440)) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000400)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000180), 0x101040, 0x0) ioctl$RNDADDTOENTCNT(r3, 0x40045201, &(0x7f0000000340)=0x8) 07:59:52 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000340)=0x1, 0x8) ioctl$PTP_EXTTS_REQUEST(r0, 0x40103d02, &(0x7f0000000040)={0x3, 0xc}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x3, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x4e20, 0xf719, @private2={0xfc, 0x2, '\x00', 0x1}, 0x3}}}, 0xbe) pipe(&(0x7f0000000080)) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) pipe2$watch_queue(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000002c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3a75d253a01185ed69", @ANYRES16=0x0, @ANYBLOB="050525bd7000fedbdf25010000000000000009410000004c0018fffffffd62726f6164636173742d6c696e6b00"/98], 0x68}, 0x1, 0x0, 0x0, 0x4000000}, 0x4040000) [ 1774.282006][ T642] dump_stack+0x15/0x20 [ 1774.286246][ T642] should_fail_ex+0x21f/0x230 [ 1774.290948][ T642] __should_fail_alloc_page+0xfd/0x110 [ 1774.296549][ T642] __alloc_pages+0x108/0x340 [ 1774.301178][ T642] vma_alloc_folio+0x6a3/0x8c0 [ 1774.306115][ T642] shmem_get_folio_gfp+0x801/0x1200 [ 1774.311357][ T642] shmem_write_begin+0xa6/0x1d0 [ 1774.316258][ T642] generic_perform_write+0x1cf/0x410 [ 1774.322034][ T642] ? shmem_write_begin+0x1d0/0x1d0 [ 1774.327168][ T642] __generic_file_write_iter+0xa1/0x120 [ 1774.332822][ T642] generic_file_write_iter+0x7d/0x1c0 [ 1774.338302][ T642] vfs_write+0x4ab/0x7d0 [ 1774.342585][ T642] ksys_write+0xeb/0x1a0 [ 1774.346922][ T642] __x64_sys_write+0x42/0x50 [ 1774.351680][ T642] do_syscall_64+0x41/0xc0 [ 1774.356120][ T642] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1774.362050][ T642] RIP: 0033:0x7f3d42967b29 07:59:52 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffeee) [ 1774.366502][ T642] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1774.386327][ T642] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1774.394770][ T642] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1774.402797][ T642] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1774.410844][ T642] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1774.418873][ T642] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 07:59:52 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 43) 07:59:52 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x3000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:52 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) pselect6(0x40, &(0x7f0000000080), &(0x7f0000000100)={0x4}, &(0x7f0000000140)={0x7}, 0x0, &(0x7f0000000200)={0x0}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"899aa3220ca08d1eea4330e3f9ffdde5"}, 0x0, 0x5, 0x2}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async, rerun: 32) openat$full(0xffffffffffffff9c, &(0x7f0000000380), 0x10000, 0x0) (rerun: 32) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r2 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/sco\x00') ioctl$TIOCSLCKTRMIOS(r2, 0x5457, &(0x7f0000000440)) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) (async, rerun: 64) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000400)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async, rerun: 64) r3 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000180), 0x101040, 0x0) ioctl$RNDADDTOENTCNT(r3, 0x40045201, &(0x7f0000000340)=0x8) 07:59:52 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000340)=0x1, 0x8) ioctl$PTP_EXTTS_REQUEST(r0, 0x40103d02, &(0x7f0000000040)={0x3, 0xc}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x3, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x4e20, 0xf719, @private2={0xfc, 0x2, '\x00', 0x1}, 0x3}}}, 0xbe) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x3, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x4e20, 0xf719, @private2={0xfc, 0x2, '\x00', 0x1}, 0x3}}}, 0xbe) pipe(&(0x7f0000000080)) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) pipe2$watch_queue(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000002c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3a75d253a01185ed69", @ANYRES16=0x0, @ANYBLOB="050525bd7000fedbdf25010000000000000009410000004c0018fffffffd62726f6164636173742d6c696e6b00"/98], 0x68}, 0x1, 0x0, 0x0, 0x4000000}, 0x4040000) (async) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000002c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3a75d253a01185ed69", @ANYRES16=0x0, @ANYBLOB="050525bd7000fedbdf25010000000000000009410000004c0018fffffffd62726f6164636173742d6c696e6b00"/98], 0x68}, 0x1, 0x0, 0x0, 0x4000000}, 0x4040000) 07:59:52 executing program 5: syz_init_net_socket$x25(0x9, 0x5, 0x0) (async) r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SENDCALLACCPT(r0, 0x89e9) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') [ 1774.426870][ T642] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1774.434871][ T642] 07:59:52 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000340)=0x1, 0x8) (async) ioctl$PTP_EXTTS_REQUEST(r0, 0x40103d02, &(0x7f0000000040)={0x3, 0xc}) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x3, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x4e20, 0xf719, @private2={0xfc, 0x2, '\x00', 0x1}, 0x3}}}, 0xbe) (async) pipe(&(0x7f0000000080)) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) pipe2$watch_queue(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000002c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3a75d253a01185ed69", @ANYRES16=0x0, @ANYBLOB="050525bd7000fedbdf25010000000000000009410000004c0018fffffffd62726f6164636173742d6c696e6b00"/98], 0x68}, 0x1, 0x0, 0x0, 0x4000000}, 0x4040000) 07:59:52 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x2a981, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) [ 1774.485795][ T698] FAULT_INJECTION: forcing a failure. [ 1774.485795][ T698] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1774.498938][ T698] CPU: 1 PID: 698 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1774.509213][ T698] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1774.519290][ T698] Call Trace: [ 1774.522660][ T698] [ 1774.525603][ T698] dump_stack_lvl+0xda/0x130 [ 1774.530266][ T698] dump_stack+0x15/0x20 07:59:52 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x2a981, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:52 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='\xaam/=\xee\xa8N\x18\x16*5\x8dl\xb0\xe2y(\xa120?\x9fhL\x91\xe4\xfap\xc7\xab\xc5\xb7(\xcd\x16\x97[\xa0\xe3\xc4\xa9\xd0\x04>\xf2)\xb2\xd0Uk\xa5;m\xabh)\xd0\x9b\xfd\x80\tMO') pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) inotify_rm_watch(r1, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) r2 = gettid() process_vm_writev(r2, &(0x7f0000000380)=[{0x0}, {&(0x7f0000000080)=""/252, 0xfc}, {&(0x7f0000000180)=""/108, 0x6c}], 0x3, &(0x7f0000000600)=[{&(0x7f0000000400)=""/17, 0x11}, {&(0x7f0000000440)=""/246, 0xf6}], 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000000)=r2, 0x12) [ 1774.534450][ T698] should_fail_ex+0x21f/0x230 [ 1774.539154][ T698] should_fail+0xb/0x10 [ 1774.543331][ T698] should_fail_usercopy+0x1a/0x20 [ 1774.548468][ T698] copy_page_from_iter_atomic+0x22d/0xcf0 [ 1774.554221][ T698] ? folio_test_hugetlb+0x3a/0x70 [ 1774.559392][ T698] ? shmem_write_begin+0x12a/0x1d0 [ 1774.564577][ T698] generic_perform_write+0x212/0x410 [ 1774.569975][ T698] ? shmem_write_begin+0x1d0/0x1d0 [ 1774.575117][ T698] __generic_file_write_iter+0xa1/0x120 [ 1774.580789][ T698] generic_file_write_iter+0x7d/0x1c0 07:59:52 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x2a981, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x2a981, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) 07:59:52 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) r1 = inotify_init1(0x800) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r3, 0x0, &(0x7f0000000200), 0x80000) inotify_rm_watch(r1, 0x0) ioctl$SIOCX25GCALLUSERDATA(r0, 0x89e4, &(0x7f00000002c0)={0x58, "4863aa55701faa4fea2a9948c35dd199571e699a31edef1e2ebb462fb09412c5ea89bdd5c45cc8b59c666e5886e29210e23ed47809de8dca20d75c103a26f0f32886fc158f4c6d5ddd452fe0431b4873a41af9a399f7695fff8ca1ae2660b9548e7ea7984c7c16e7a8621d968773f8c42d5072220fe75fe7c2f4d763b83506db"}) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001680), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r4, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r5, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r5, 0x0, 0x1, @in6={0xa, 0x4e22, 0x81, @loopback, 0x8}}}, 0xa0) ioctl$SIOCX25CALLACCPTAPPRV(r2, 0x89e8) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r6) ioctl$sock_inet_SIOCGARP(r6, 0x8954, &(0x7f0000000040)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xa}}, {0x306, @local}, 0x42, {0x2, 0x4e24, @rand_addr=0x64010101}, 'vxcan1\x00'}) [ 1774.586225][ T698] vfs_write+0x4ab/0x7d0 [ 1774.590516][ T698] ksys_write+0xeb/0x1a0 [ 1774.594909][ T698] __x64_sys_write+0x42/0x50 [ 1774.599536][ T698] do_syscall_64+0x41/0xc0 [ 1774.604050][ T698] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1774.610032][ T698] RIP: 0033:0x7f3d42967b29 [ 1774.614502][ T698] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1774.634363][ T698] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1774.642867][ T698] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1774.650862][ T698] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1774.658891][ T698] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1774.666908][ T698] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1774.674901][ T698] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1774.682901][ T698] 07:59:52 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffeee) 07:59:52 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 44) 07:59:52 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) r1 = inotify_init1(0x800) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r3, 0x0, &(0x7f0000000200), 0x80000) (async) inotify_rm_watch(r1, 0x0) (async) ioctl$SIOCX25GCALLUSERDATA(r0, 0x89e4, &(0x7f00000002c0)={0x58, "4863aa55701faa4fea2a9948c35dd199571e699a31edef1e2ebb462fb09412c5ea89bdd5c45cc8b59c666e5886e29210e23ed47809de8dca20d75c103a26f0f32886fc158f4c6d5ddd452fe0431b4873a41af9a399f7695fff8ca1ae2660b9548e7ea7984c7c16e7a8621d968773f8c42d5072220fe75fe7c2f4d763b83506db"}) (async) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001680), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r4, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r5, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) (async, rerun: 32) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r5, 0x0, 0x1, @in6={0xa, 0x4e22, 0x81, @loopback, 0x8}}}, 0xa0) (async, rerun: 32) ioctl$SIOCX25CALLACCPTAPPRV(r2, 0x89e8) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r6) (async) ioctl$sock_inet_SIOCGARP(r6, 0x8954, &(0x7f0000000040)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xa}}, {0x306, @local}, 0x42, {0x2, 0x4e24, @rand_addr=0x64010101}, 'vxcan1\x00'}) 07:59:52 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) pselect6(0x40, &(0x7f0000000080), &(0x7f0000000100)={0x4}, &(0x7f0000000140)={0x7}, 0x0, &(0x7f0000000200)={0x0}) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"899aa3220ca08d1eea4330e3f9ffdde5"}, 0x0, 0x5, 0x2}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000380), 0x10000, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r2 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/sco\x00') ioctl$TIOCSLCKTRMIOS(r2, 0x5457, &(0x7f0000000440)) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000400)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000180), 0x101040, 0x0) ioctl$RNDADDTOENTCNT(r3, 0x40045201, &(0x7f0000000340)=0x8) 07:59:52 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x7000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:52 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='\xaam/=\xee\xa8N\x18\x16*5\x8dl\xb0\xe2y(\xa120?\x9fhL\x91\xe4\xfap\xc7\xab\xc5\xb7(\xcd\x16\x97[\xa0\xe3\xc4\xa9\xd0\x04>\xf2)\xb2\xd0Uk\xa5;m\xabh)\xd0\x9b\xfd\x80\tMO') pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) inotify_rm_watch(r1, 0x0) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) (async) r2 = gettid() process_vm_writev(r2, &(0x7f0000000380)=[{0x0}, {&(0x7f0000000080)=""/252, 0xfc}, {&(0x7f0000000180)=""/108, 0x6c}], 0x3, &(0x7f0000000600)=[{&(0x7f0000000400)=""/17, 0x11}, {&(0x7f0000000440)=""/246, 0xf6}], 0x2, 0x0) (async) write$cgroup_pid(r0, &(0x7f0000000000)=r2, 0x12) 07:59:52 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) syz_open_pts(r0, 0x4000) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) [ 1774.865933][ T738] FAULT_INJECTION: forcing a failure. [ 1774.865933][ T738] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1774.879251][ T738] CPU: 0 PID: 738 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1774.889525][ T738] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1774.899602][ T738] Call Trace: [ 1774.902891][ T738] [ 1774.905838][ T738] dump_stack_lvl+0xda/0x130 [ 1774.910446][ T738] dump_stack+0x15/0x20 07:59:52 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) inotify_init1(0x800) (async) r1 = inotify_init1(0x800) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r3, 0x0, &(0x7f0000000200), 0x80000) inotify_rm_watch(r1, 0x0) ioctl$SIOCX25GCALLUSERDATA(r0, 0x89e4, &(0x7f00000002c0)={0x58, "4863aa55701faa4fea2a9948c35dd199571e699a31edef1e2ebb462fb09412c5ea89bdd5c45cc8b59c666e5886e29210e23ed47809de8dca20d75c103a26f0f32886fc158f4c6d5ddd452fe0431b4873a41af9a399f7695fff8ca1ae2660b9548e7ea7984c7c16e7a8621d968773f8c42d5072220fe75fe7c2f4d763b83506db"}) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001680), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r4, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r5, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r4, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r5, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r5, 0x0, 0x1, @in6={0xa, 0x4e22, 0x81, @loopback, 0x8}}}, 0xa0) ioctl$SIOCX25CALLACCPTAPPRV(r2, 0x89e8) (async) ioctl$SIOCX25CALLACCPTAPPRV(r2, 0x89e8) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r6) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r6) ioctl$sock_inet_SIOCGARP(r6, 0x8954, &(0x7f0000000040)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xa}}, {0x306, @local}, 0x42, {0x2, 0x4e24, @rand_addr=0x64010101}, 'vxcan1\x00'}) 07:59:52 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='\xaam/=\xee\xa8N\x18\x16*5\x8dl\xb0\xe2y(\xa120?\x9fhL\x91\xe4\xfap\xc7\xab\xc5\xb7(\xcd\x16\x97[\xa0\xe3\xc4\xa9\xd0\x04>\xf2)\xb2\xd0Uk\xa5;m\xabh)\xd0\x9b\xfd\x80\tMO') (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) inotify_rm_watch(r1, 0x0) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) r2 = gettid() process_vm_writev(r2, &(0x7f0000000380)=[{0x0}, {&(0x7f0000000080)=""/252, 0xfc}, {&(0x7f0000000180)=""/108, 0x6c}], 0x3, &(0x7f0000000600)=[{&(0x7f0000000400)=""/17, 0x11}, {&(0x7f0000000440)=""/246, 0xf6}], 0x2, 0x0) (async) write$cgroup_pid(r0, &(0x7f0000000000)=r2, 0x12) 07:59:52 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x8000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) [ 1774.914654][ T738] should_fail_ex+0x21f/0x230 [ 1774.919355][ T738] __should_fail_alloc_page+0xfd/0x110 [ 1774.924844][ T738] __alloc_pages+0x108/0x340 [ 1774.929471][ T738] vma_alloc_folio+0x6a3/0x8c0 [ 1774.934279][ T738] shmem_get_folio_gfp+0x801/0x1200 [ 1774.940034][ T738] shmem_write_begin+0xa6/0x1d0 [ 1774.944970][ T738] generic_perform_write+0x1cf/0x410 [ 1774.950291][ T738] ? shmem_write_begin+0x1d0/0x1d0 [ 1774.955441][ T738] __generic_file_write_iter+0xa1/0x120 07:59:52 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') r0 = getpgrp(0x0) getpgid(r0) 07:59:52 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') (async) r0 = getpgrp(0x0) getpgid(r0) 07:59:53 executing program 0: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffeee) [ 1774.961565][ T738] generic_file_write_iter+0x7d/0x1c0 [ 1774.967001][ T738] vfs_write+0x4ab/0x7d0 [ 1774.971283][ T738] ksys_write+0xeb/0x1a0 [ 1774.975578][ T738] __x64_sys_write+0x42/0x50 [ 1774.980273][ T738] do_syscall_64+0x41/0xc0 [ 1774.984720][ T738] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1774.990666][ T738] RIP: 0033:0x7f3d42967b29 [ 1774.995102][ T738] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 07:59:53 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 45) 07:59:53 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) syz_open_pts(r0, 0x4000) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:53 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') r0 = getpgrp(0x0) getpgid(r0) 07:59:53 executing program 0: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffeee) 07:59:53 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f0000000040)={0x8}) 07:59:53 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x10000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) [ 1775.014774][ T738] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1775.023224][ T738] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1775.031213][ T738] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1775.039223][ T738] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1775.047226][ T738] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1775.055274][ T738] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1775.063278][ T738] 07:59:53 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f0000000040)={0x8}) 07:59:53 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) syz_open_pts(r0, 0x4000) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) syz_open_pts(r0, 0x4000) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) 07:59:53 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000180), 0x1, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f00000001c0)={@empty, @initdev, 0x0}, &(0x7f0000000200)=0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x105000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x1000, 0x5, 0x9, 0x1801, r2, 0xa511, '\x00', r1, r3, 0x1, 0x101, 0x4}, 0x48) syz_open_pts(0xffffffffffffffff, 0x80) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') ioctl$PTP_SYS_OFFSET_PRECISE(0xffffffffffffffff, 0xc0403d08, &(0x7f0000000000)) sched_yield() openat$procfs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/partitions\x00', 0x0, 0x0) 07:59:53 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async, rerun: 64) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f0000000040)={0x8}) (rerun: 64) 07:59:53 executing program 0: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffeee) [ 1775.111904][ T771] FAULT_INJECTION: forcing a failure. [ 1775.111904][ T771] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1775.125082][ T771] CPU: 0 PID: 771 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1775.135478][ T771] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1775.145699][ T771] Call Trace: [ 1775.149006][ T771] [ 1775.151955][ T771] dump_stack_lvl+0xda/0x130 [ 1775.156628][ T771] dump_stack+0x15/0x20 07:59:53 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x64000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) [ 1775.160894][ T771] should_fail_ex+0x21f/0x230 [ 1775.165667][ T771] should_fail+0xb/0x10 [ 1775.169951][ T771] should_fail_usercopy+0x1a/0x20 [ 1775.174998][ T771] copy_page_from_iter_atomic+0x22d/0xcf0 [ 1775.180812][ T771] ? folio_test_hugetlb+0x3a/0x70 [ 1775.185883][ T771] ? shmem_write_begin+0x12a/0x1d0 [ 1775.191025][ T771] generic_perform_write+0x212/0x410 [ 1775.196408][ T771] ? shmem_write_begin+0x1d0/0x1d0 [ 1775.201554][ T771] __generic_file_write_iter+0xa1/0x120 [ 1775.207216][ T771] generic_file_write_iter+0x7d/0x1c0 [ 1775.212627][ T771] vfs_write+0x4ab/0x7d0 [ 1775.216951][ T771] ksys_write+0xeb/0x1a0 [ 1775.221319][ T771] __x64_sys_write+0x42/0x50 [ 1775.225955][ T771] do_syscall_64+0x41/0xc0 [ 1775.230450][ T771] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1775.236384][ T771] RIP: 0033:0x7f3d42967b29 [ 1775.240812][ T771] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1775.260470][ T771] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1775.269022][ T771] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1775.277012][ T771] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1775.284999][ T771] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1775.293010][ T771] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1775.301015][ T771] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1775.309064][ T771] 07:59:53 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 46) 07:59:53 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) pipe2$watch_queue(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r2 = syz_genetlink_get_family_id$smc(&(0x7f0000000080), r1) ioctl$SIOCPNDELRESOURCE(r0, 0x89ef, &(0x7f0000000040)=0xfff) sendmsg$SMC_PNETID_FLUSH(r0, &(0x7f0000000740)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000700)={&(0x7f0000000640)={0x84, r2, 0x200, 0x70bd2d, 0x25dfdbfe, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'team_slave_0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6_vti0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x84}, 0x1, 0x0, 0x0, 0x81}, 0x40) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r3) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_NODE_ADDR(r5, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r6, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r3, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x68, r6, 0x200, 0x70bd27, 0x25dfdbfb, {{}, {}, {0x4c, 0x18, {0x5, @link='broadcast-link\x00'}}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x68}}, 0x4004) pipe(&(0x7f00000008c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CTL_GET_FREE(r7, 0x4c82) r8 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000400), 0x80001, 0x0) sendmsg$DEVLINK_CMD_PORT_GET(r8, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000580)={&(0x7f0000000480)={0xc8, r4, 0x300, 0x70bd28, 0x25dfdbfe, {}, [{{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}}]}, 0xc8}, 0x1, 0x0, 0x0, 0x20000000}, 0x40) r9 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000840)={&(0x7f00000007c0)={0x68, 0x0, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BACKEND_IDENTIFIER={0x11, 0xa, '0000:00:10.0\x00'}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x4}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x522d}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x800}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x20}]}, 0x68}, 0x1, 0x0, 0x0, 0x48c0}, 0x40000040) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:53 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08dffe9433001faffdde5"}, 0x3}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) ioctl$PTP_EXTTS_REQUEST(r1, 0x40103d02, &(0x7f00000001c0)={0x8}) ioctl$RNDADDTOENTCNT(r2, 0x40045201, &(0x7f0000000240)=0x2) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001680), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f00000000c0)={0x16, 0x9c, 0xfa00, {0x0, 0x0, r4, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000440), 0x40000, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r5, &(0x7f00000002c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000080)={0xffffffffffffffff}, 0x0, r4, 0x1c, 0x1, @in={0x2, 0x4e22, @local}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000040), r6}}, 0x18) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000480)=0x1000, 0x8) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f0000000400)={0xffff7fff, 0x8}) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x1e) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000003c0), 0x1, 0x0) ioctl$TIOCSTI(r2, 0x5412, &(0x7f0000000380)=0x9) 07:59:53 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000180), 0x1, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f00000001c0)={@empty, @initdev, 0x0}, &(0x7f0000000200)=0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x105000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x1000, 0x5, 0x9, 0x1801, r2, 0xa511, '\x00', r1, r3, 0x1, 0x101, 0x4}, 0x48) syz_open_pts(0xffffffffffffffff, 0x80) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') ioctl$PTP_SYS_OFFSET_PRECISE(0xffffffffffffffff, 0xc0403d08, &(0x7f0000000000)) sched_yield() openat$procfs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/partitions\x00', 0x0, 0x0) pipe(&(0x7f0000000140)) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) (async) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000180), 0x1, 0x0) (async) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f00000001c0)={@empty, @initdev}, &(0x7f0000000200)=0xc) (async) pipe(&(0x7f0000000140)) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) (async) openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x105000, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x1000, 0x5, 0x9, 0x1801, r2, 0xa511, '\x00', r1, r3, 0x1, 0x101, 0x4}, 0x48) (async) syz_open_pts(0xffffffffffffffff, 0x80) (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') (async) ioctl$PTP_SYS_OFFSET_PRECISE(0xffffffffffffffff, 0xc0403d08, &(0x7f0000000000)) (async) sched_yield() (async) openat$procfs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/partitions\x00', 0x0, 0x0) (async) 07:59:53 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, 0x0, 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffeee) 07:59:53 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0xdb060000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:53 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) (async) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000180), 0x1, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f00000001c0)={@empty, @initdev, 0x0}, &(0x7f0000000200)=0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) (async) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x105000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x1000, 0x5, 0x9, 0x1801, r2, 0xa511, '\x00', r1, r3, 0x1, 0x101, 0x4}, 0x48) (async) syz_open_pts(0xffffffffffffffff, 0x80) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') ioctl$PTP_SYS_OFFSET_PRECISE(0xffffffffffffffff, 0xc0403d08, &(0x7f0000000000)) sched_yield() (async) openat$procfs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/partitions\x00', 0x0, 0x0) 07:59:53 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) pipe2$watch_queue(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r2 = syz_genetlink_get_family_id$smc(&(0x7f0000000080), r1) ioctl$SIOCPNDELRESOURCE(r0, 0x89ef, &(0x7f0000000040)=0xfff) (async) sendmsg$SMC_PNETID_FLUSH(r0, &(0x7f0000000740)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000700)={&(0x7f0000000640)={0x84, r2, 0x200, 0x70bd2d, 0x25dfdbfe, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'team_slave_0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6_vti0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x84}, 0x1, 0x0, 0x0, 0x81}, 0x40) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r3) (async) r5 = socket$nl_generic(0x10, 0x3, 0x10) (async) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_NODE_ADDR(r5, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r6, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r3, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x68, r6, 0x200, 0x70bd27, 0x25dfdbfb, {{}, {}, {0x4c, 0x18, {0x5, @link='broadcast-link\x00'}}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x68}}, 0x4004) pipe(&(0x7f00000008c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CTL_GET_FREE(r7, 0x4c82) r8 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000400), 0x80001, 0x0) sendmsg$DEVLINK_CMD_PORT_GET(r8, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000580)={&(0x7f0000000480)={0xc8, r4, 0x300, 0x70bd28, 0x25dfdbfe, {}, [{{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}}]}, 0xc8}, 0x1, 0x0, 0x0, 0x20000000}, 0x40) (async) r9 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000840)={&(0x7f00000007c0)={0x68, 0x0, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BACKEND_IDENTIFIER={0x11, 0xa, '0000:00:10.0\x00'}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x4}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x522d}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x800}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x20}]}, 0x68}, 0x1, 0x0, 0x0, 0x48c0}, 0x40000040) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:53 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08dffe9433001faffdde5"}, 0x3}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) (async, rerun: 32) ioctl$PTP_EXTTS_REQUEST(r1, 0x40103d02, &(0x7f00000001c0)={0x8}) (async, rerun: 32) ioctl$RNDADDTOENTCNT(r2, 0x40045201, &(0x7f0000000240)=0x2) (async, rerun: 32) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001680), 0x2, 0x0) (rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f00000000c0)={0x16, 0x9c, 0xfa00, {0x0, 0x0, r4, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000440), 0x40000, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r5, &(0x7f00000002c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000080)={0xffffffffffffffff}, 0x0, r4, 0x1c, 0x1, @in={0x2, 0x4e22, @local}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000040), r6}}, 0x18) (async, rerun: 64) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000480)=0x1000, 0x8) (async, rerun: 64) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f0000000400)={0xffff7fff, 0x8}) (async, rerun: 64) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x1e) (async, rerun: 64) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000003c0), 0x1, 0x0) (async, rerun: 32) ioctl$TIOCSTI(r2, 0x5412, &(0x7f0000000380)=0x9) (rerun: 32) 07:59:53 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08dffe9433001faffdde5"}, 0x3}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async, rerun: 32) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 32) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) ioctl$PTP_EXTTS_REQUEST(r1, 0x40103d02, &(0x7f00000001c0)={0x8}) (async) ioctl$RNDADDTOENTCNT(r2, 0x40045201, &(0x7f0000000240)=0x2) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001680), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f00000000c0)={0x16, 0x9c, 0xfa00, {0x0, 0x0, r4, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) (async, rerun: 64) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000440), 0x40000, 0x0) (rerun: 64) write$RDMA_USER_CM_CMD_JOIN_MCAST(r5, &(0x7f00000002c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000080)={0xffffffffffffffff}, 0x0, r4, 0x1c, 0x1, @in={0x2, 0x4e22, @local}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000040), r6}}, 0x18) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000480)=0x1000, 0x8) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f0000000400)={0xffff7fff, 0x8}) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x1e) (async) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000003c0), 0x1, 0x0) (async, rerun: 64) ioctl$TIOCSTI(r2, 0x5412, &(0x7f0000000380)=0x9) (rerun: 64) [ 1775.459248][ T814] FAULT_INJECTION: forcing a failure. [ 1775.459248][ T814] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1775.473091][ T814] CPU: 0 PID: 814 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1775.483440][ T814] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1775.493519][ T814] Call Trace: [ 1775.496860][ T814] [ 1775.499874][ T814] dump_stack_lvl+0xda/0x130 [ 1775.504552][ T814] dump_stack+0x15/0x20 07:59:53 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) pipe2$watch_queue(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r2 = syz_genetlink_get_family_id$smc(&(0x7f0000000080), r1) ioctl$SIOCPNDELRESOURCE(r0, 0x89ef, &(0x7f0000000040)=0xfff) (async) sendmsg$SMC_PNETID_FLUSH(r0, &(0x7f0000000740)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000700)={&(0x7f0000000640)={0x84, r2, 0x200, 0x70bd2d, 0x25dfdbfe, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'team_slave_0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6_vti0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x84}, 0x1, 0x0, 0x0, 0x81}, 0x40) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r3) (async) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_NODE_ADDR(r5, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r6, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r3, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x68, r6, 0x200, 0x70bd27, 0x25dfdbfb, {{}, {}, {0x4c, 0x18, {0x5, @link='broadcast-link\x00'}}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x68}}, 0x4004) pipe(&(0x7f00000008c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CTL_GET_FREE(r7, 0x4c82) r8 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000400), 0x80001, 0x0) sendmsg$DEVLINK_CMD_PORT_GET(r8, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000580)={&(0x7f0000000480)={0xc8, r4, 0x300, 0x70bd28, 0x25dfdbfe, {}, [{{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}}]}, 0xc8}, 0x1, 0x0, 0x0, 0x20000000}, 0x40) (async) r9 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000840)={&(0x7f00000007c0)={0x68, 0x0, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BACKEND_IDENTIFIER={0x11, 0xa, '0000:00:10.0\x00'}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x4}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x522d}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x800}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x20}]}, 0x68}, 0x1, 0x0, 0x0, 0x48c0}, 0x40000040) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:53 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0xfefdffff}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) [ 1775.508777][ T814] should_fail_ex+0x21f/0x230 [ 1775.513468][ T814] __should_fail_alloc_page+0xfd/0x110 [ 1775.518963][ T814] __alloc_pages+0x108/0x340 [ 1775.523639][ T814] vma_alloc_folio+0x6a3/0x8c0 [ 1775.528462][ T814] shmem_get_folio_gfp+0x801/0x1200 [ 1775.533818][ T814] shmem_write_begin+0xa6/0x1d0 [ 1775.538702][ T814] generic_perform_write+0x1cf/0x410 [ 1775.544024][ T814] ? shmem_write_begin+0x1d0/0x1d0 [ 1775.549203][ T814] __generic_file_write_iter+0xa1/0x120 [ 1775.554832][ T814] generic_file_write_iter+0x7d/0x1c0 [ 1775.560282][ T814] vfs_write+0x4ab/0x7d0 [ 1775.564632][ T814] ksys_write+0xeb/0x1a0 [ 1775.569006][ T814] __x64_sys_write+0x42/0x50 [ 1775.573634][ T814] do_syscall_64+0x41/0xc0 [ 1775.578144][ T814] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1775.584081][ T814] RIP: 0033:0x7f3d42967b29 [ 1775.588516][ T814] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 07:59:53 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 47) 07:59:53 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x38}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:53 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sysvipc/sem\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000240)={0x16, 0x98, 0xfa00, {&(0x7f0000000080)={0xffffffffffffffff}, 0x0, r2, 0x1c, 0x0, @in6={0xa, 0x4e21, 0x0, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000380)={0x11, 0x10, 0xfa00, {&(0x7f0000000340), r3}}, 0x18) connect$llc(0xffffffffffffffff, &(0x7f0000000300)={0x1a, 0x303, 0x80, 0x15, 0x9, 0x9, @random="77d80189cce3"}, 0x10) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:53 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, 0x0, 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffeee) 07:59:53 executing program 5: ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') 07:59:53 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0xfffffdfe}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) [ 1775.608154][ T814] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1775.616602][ T814] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1775.624682][ T814] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1775.632672][ T814] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1775.640668][ T814] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1775.648685][ T814] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1775.656672][ T814] 07:59:53 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, 0x0, 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffeee) 07:59:53 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x38}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x38}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) 07:59:53 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sysvipc/sem\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000240)={0x16, 0x98, 0xfa00, {&(0x7f0000000080)={0xffffffffffffffff}, 0x0, r2, 0x1c, 0x0, @in6={0xa, 0x4e21, 0x0, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000380)={0x11, 0x10, 0xfa00, {&(0x7f0000000340), r3}}, 0x18) connect$llc(0xffffffffffffffff, &(0x7f0000000300)={0x1a, 0x303, 0x80, 0x15, 0x9, 0x9, @random="77d80189cce3"}, 0x10) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sysvipc/sem\x00', 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000001c0), 0x111, 0x1}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000240)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x0, r2, 0x1c, 0x0, @in6={0xa, 0x4e21, 0x0, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000380)={0x11, 0x10, 0xfa00, {&(0x7f0000000340), r3}}, 0x18) (async) connect$llc(0xffffffffffffffff, &(0x7f0000000300)={0x1a, 0x303, 0x80, 0x15, 0x9, 0x9, @random="77d80189cce3"}, 0x10) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) 07:59:53 executing program 5: ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') 07:59:53 executing program 5: ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') 07:59:53 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sysvipc/sem\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000240)={0x16, 0x98, 0xfa00, {&(0x7f0000000080)={0xffffffffffffffff}, 0x0, r2, 0x1c, 0x0, @in6={0xa, 0x4e21, 0x0, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000380)={0x11, 0x10, 0xfa00, {&(0x7f0000000340), r3}}, 0x18) connect$llc(0xffffffffffffffff, &(0x7f0000000300)={0x1a, 0x303, 0x80, 0x15, 0x9, 0x9, @random="77d80189cce3"}, 0x10) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sysvipc/sem\x00', 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000001c0), 0x111, 0x1}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000240)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x0, r2, 0x1c, 0x0, @in6={0xa, 0x4e21, 0x0, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000380)={0x11, 0x10, 0xfa00, {&(0x7f0000000340), r3}}, 0x18) (async) connect$llc(0xffffffffffffffff, &(0x7f0000000300)={0x1a, 0x303, 0x80, 0x15, 0x9, 0x9, @random="77d80189cce3"}, 0x10) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) [ 1775.702572][ T848] FAULT_INJECTION: forcing a failure. [ 1775.702572][ T848] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1775.715699][ T848] CPU: 0 PID: 848 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1775.726049][ T848] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1775.736200][ T848] Call Trace: [ 1775.739624][ T848] [ 1775.742570][ T848] dump_stack_lvl+0xda/0x130 [ 1775.747197][ T848] dump_stack+0x15/0x20 [ 1775.751434][ T848] should_fail_ex+0x21f/0x230 [ 1775.756215][ T848] should_fail+0xb/0x10 [ 1775.760417][ T848] should_fail_usercopy+0x1a/0x20 [ 1775.765521][ T848] copy_page_from_iter_atomic+0x22d/0xcf0 [ 1775.771410][ T848] ? folio_test_hugetlb+0x3a/0x70 [ 1775.776473][ T848] ? shmem_write_begin+0x12a/0x1d0 [ 1775.781619][ T848] generic_perform_write+0x212/0x410 [ 1775.787019][ T848] ? shmem_write_begin+0x1d0/0x1d0 [ 1775.792172][ T848] __generic_file_write_iter+0xa1/0x120 [ 1775.797850][ T848] generic_file_write_iter+0x7d/0x1c0 [ 1775.803250][ T848] vfs_write+0x4ab/0x7d0 [ 1775.807589][ T848] ksys_write+0xeb/0x1a0 [ 1775.811950][ T848] __x64_sys_write+0x42/0x50 [ 1775.816599][ T848] do_syscall_64+0x41/0xc0 [ 1775.821077][ T848] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1775.827002][ T848] RIP: 0033:0x7f3d42967b29 [ 1775.831414][ T848] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1775.851024][ T848] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1775.859464][ T848] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1775.867447][ T848] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1775.875423][ T848] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1775.883431][ T848] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1775.891449][ T848] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1775.899424][ T848] 07:59:54 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 48) 07:59:54 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/bsg\x00') 07:59:54 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) setsockopt$CAN_RAW_LOOPBACK(r1, 0x65, 0x3, &(0x7f0000000040)=0x1, 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x1c, 0x0, @ib={0x1b, 0xfffc, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:54 executing program 1: openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x38}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:54 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffeee) 07:59:54 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:54 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async, rerun: 64) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 64) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) (async) setsockopt$CAN_RAW_LOOPBACK(r1, 0x65, 0x3, &(0x7f0000000040)=0x1, 0x4) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x1c, 0x0, @ib={0x1b, 0xfffc, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:54 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) syz_genetlink_get_family_id$nbd(&(0x7f0000000080), 0xffffffffffffffff) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, &(0x7f0000000040)=0x1, 0x4) 07:59:54 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/bsg\x00') 07:59:54 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffeee) 07:59:54 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/bsg\x00') (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/bsg\x00') 07:59:54 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffeee) [ 1776.064372][ T893] FAULT_INJECTION: forcing a failure. [ 1776.064372][ T893] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1776.077661][ T893] CPU: 0 PID: 893 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1776.087936][ T893] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1776.098056][ T893] Call Trace: [ 1776.101354][ T893] [ 1776.104377][ T893] dump_stack_lvl+0xda/0x130 [ 1776.109006][ T893] dump_stack+0x15/0x20 [ 1776.113191][ T893] should_fail_ex+0x21f/0x230 [ 1776.117893][ T893] __should_fail_alloc_page+0xfd/0x110 [ 1776.123394][ T893] __alloc_pages+0x108/0x340 [ 1776.128050][ T893] vma_alloc_folio+0x6a3/0x8c0 [ 1776.132922][ T893] shmem_get_folio_gfp+0x801/0x1200 [ 1776.138188][ T893] shmem_write_begin+0xa6/0x1d0 [ 1776.143076][ T893] generic_perform_write+0x1cf/0x410 [ 1776.148471][ T893] ? shmem_write_begin+0x1d0/0x1d0 [ 1776.153707][ T893] __generic_file_write_iter+0xa1/0x120 [ 1776.159285][ T893] generic_file_write_iter+0x7d/0x1c0 [ 1776.164715][ T893] vfs_write+0x4ab/0x7d0 [ 1776.169025][ T893] ksys_write+0xeb/0x1a0 [ 1776.173336][ T893] __x64_sys_write+0x42/0x50 [ 1776.177940][ T893] do_syscall_64+0x41/0xc0 [ 1776.182459][ T893] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1776.188370][ T893] RIP: 0033:0x7f3d42967b29 [ 1776.192778][ T893] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 07:59:54 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 49) 07:59:54 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) ioctl$SIOCX25GSUBSCRIP(r0, 0x89e0, &(0x7f0000000080)={'veth1_macvtap\x00', 0x8, 0x649}) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') 07:59:54 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x40030000000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:54 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) setsockopt$CAN_RAW_LOOPBACK(r1, 0x65, 0x3, &(0x7f0000000040)=0x1, 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x1c, 0x0, @ib={0x1b, 0xfffc, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) pipe(&(0x7f0000000140)) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) (async) setsockopt$CAN_RAW_LOOPBACK(r1, 0x65, 0x3, &(0x7f0000000040)=0x1, 0x4) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x1c, 0x0, @ib={0x1b, 0xfffc, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) 07:59:54 executing program 0: openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffeee) 07:59:54 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) syz_genetlink_get_family_id$nbd(&(0x7f0000000080), 0xffffffffffffffff) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, &(0x7f0000000040)=0x1, 0x4) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) syz_genetlink_get_family_id$nbd(&(0x7f0000000080), 0xffffffffffffffff) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, &(0x7f0000000040)=0x1, 0x4) (async) 07:59:54 executing program 0: openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffeee) [ 1776.212483][ T893] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1776.220893][ T893] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1776.228863][ T893] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1776.236857][ T893] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1776.244906][ T893] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1776.252887][ T893] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1776.260892][ T893] 07:59:54 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r0, 0x3309) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) openat$procfs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/partitions\x00', 0x0, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) inotify_add_watch(r1, &(0x7f0000000240)='./file0\x00', 0x34000000) sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="0298ebb7b66ea1edf02c1f730ab1c9da11b946cb4496eaff19", @ANYRES16=0x0, @ANYBLOB="00012abd7000fedbdf2501000000000000000841000000140018000007ff6574683a6e69637666300000"], 0x30}, 0x1, 0x0, 0x0, 0x4000001}, 0x4000030) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:54 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) (async) ioctl$SIOCX25GSUBSCRIP(r0, 0x89e0, &(0x7f0000000080)={'veth1_macvtap\x00', 0x8, 0x649}) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') 07:59:54 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r0, 0x3309) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) openat$procfs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/partitions\x00', 0x0, 0x0) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) (async) inotify_add_watch(r1, &(0x7f0000000240)='./file0\x00', 0x34000000) (async) sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="0298ebb7b66ea1edf02c1f730ab1c9da11b946cb4496eaff19", @ANYRES16=0x0, @ANYBLOB="00012abd7000fedbdf2501000000000000000841000000140018000007ff6574683a6e69637666300000"], 0x30}, 0x1, 0x0, 0x0, 0x4000001}, 0x4000030) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:54 executing program 0: openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffeee) 07:59:54 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) [ 1776.311553][ T931] FAULT_INJECTION: forcing a failure. [ 1776.311553][ T931] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1776.324705][ T931] CPU: 0 PID: 931 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1776.334969][ T931] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1776.345114][ T931] Call Trace: [ 1776.348429][ T931] [ 1776.351389][ T931] dump_stack_lvl+0xda/0x130 [ 1776.356065][ T931] dump_stack+0x15/0x20 [ 1776.360606][ T931] should_fail_ex+0x21f/0x230 [ 1776.365355][ T931] should_fail+0xb/0x10 [ 1776.369543][ T931] should_fail_usercopy+0x1a/0x20 [ 1776.374591][ T931] copy_page_from_iter_atomic+0x22d/0xcf0 [ 1776.380425][ T931] ? folio_test_hugetlb+0x3a/0x70 [ 1776.385479][ T931] ? shmem_write_begin+0x12a/0x1d0 [ 1776.390688][ T931] generic_perform_write+0x212/0x410 [ 1776.396051][ T931] ? shmem_write_begin+0x1d0/0x1d0 [ 1776.401219][ T931] __generic_file_write_iter+0xa1/0x120 [ 1776.406862][ T931] generic_file_write_iter+0x7d/0x1c0 [ 1776.412351][ T931] vfs_write+0x4ab/0x7d0 [ 1776.416729][ T931] ksys_write+0xeb/0x1a0 [ 1776.421033][ T931] __x64_sys_write+0x42/0x50 [ 1776.425631][ T931] do_syscall_64+0x41/0xc0 [ 1776.430085][ T931] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1776.435993][ T931] RIP: 0033:0x7f3d42967b29 [ 1776.440406][ T931] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1776.460024][ T931] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1776.468481][ T931] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1776.476446][ T931] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1776.484424][ T931] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1776.492476][ T931] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1776.500477][ T931] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1776.508448][ T931] 07:59:54 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 50) 07:59:54 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, 0x0, 0x0) 07:59:54 executing program 5: pipe(&(0x7f0000000140)) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) ioctl$SIOCX25GSUBSCRIP(r0, 0x89e0, &(0x7f0000000080)={'veth1_macvtap\x00', 0x8, 0x649}) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') 07:59:54 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) syz_genetlink_get_family_id$nbd(&(0x7f0000000080), 0xffffffffffffffff) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, &(0x7f0000000040)=0x1, 0x4) 07:59:54 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r0, 0x3309) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) (async) openat$procfs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/partitions\x00', 0x0, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) (async) inotify_add_watch(r1, &(0x7f0000000240)='./file0\x00', 0x34000000) sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="0298ebb7b66ea1edf02c1f730ab1c9da11b946cb4496eaff19", @ANYRES16=0x0, @ANYBLOB="00012abd7000fedbdf2501000000000000000841000000140018000007ff6574683a6e69637666300000"], 0x30}, 0x1, 0x0, 0x0, 0x4000001}, 0x4000030) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:54 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x300000000000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:54 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x891a, &(0x7f00000000c0)={'tunl0\x00', 0x0}) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/bsg\x00') 07:59:54 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, 0x0, 0x0) 07:59:54 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) 07:59:54 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, 0x0, 0x0) 07:59:54 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) [ 1776.654331][ T967] FAULT_INJECTION: forcing a failure. [ 1776.654331][ T967] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1776.667611][ T967] CPU: 0 PID: 967 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1776.677869][ T967] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1776.687961][ T967] Call Trace: [ 1776.691294][ T967] [ 1776.694241][ T967] dump_stack_lvl+0xda/0x130 [ 1776.698869][ T967] dump_stack+0x15/0x20 07:59:54 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffeee) [ 1776.703089][ T967] should_fail_ex+0x21f/0x230 [ 1776.707803][ T967] __should_fail_alloc_page+0xfd/0x110 [ 1776.713323][ T967] __alloc_pages+0x108/0x340 [ 1776.717966][ T967] vma_alloc_folio+0x6a3/0x8c0 [ 1776.722756][ T967] shmem_get_folio_gfp+0x801/0x1200 [ 1776.728037][ T967] shmem_write_begin+0xa6/0x1d0 [ 1776.732921][ T967] generic_perform_write+0x1cf/0x410 [ 1776.738249][ T967] ? shmem_write_begin+0x1d0/0x1d0 [ 1776.743403][ T967] __generic_file_write_iter+0xa1/0x120 [ 1776.749075][ T967] generic_file_write_iter+0x7d/0x1c0 [ 1776.754475][ T967] vfs_write+0x4ab/0x7d0 [ 1776.758823][ T967] ksys_write+0xeb/0x1a0 [ 1776.763119][ T967] __x64_sys_write+0x42/0x50 [ 1776.767828][ T967] do_syscall_64+0x41/0xc0 [ 1776.772276][ T967] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1776.778290][ T967] RIP: 0033:0x7f3d42967b29 [ 1776.782783][ T967] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 07:59:54 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 51) 07:59:54 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) 07:59:54 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x511703, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x2000000000000000, 0xffffffffffffffff, 0x0, 0x1, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0xa0) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, r1, 0x87) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x2080, 0x0) r3 = add_key$fscrypt_v1(&(0x7f0000000300), &(0x7f0000000340)={'fscrypt:', @desc3}, &(0x7f0000000380)={0x0, "138c55cf23e64bc1485910f81f736ad973849e97b64cfc449123aaa42b0509b42acd9a2c5d6017afd8737d8141c0fd79db542ed02f067a519aef4c5b65ef010c", 0x3b}, 0x48, 0xfffffffffffffff9) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r4) keyctl$KEYCTL_WATCH_KEY(0x20, r3, r4, 0xfa) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000280), 0x111, 0x4}}, 0x20) 07:59:54 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') (async) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x891a, &(0x7f00000000c0)={'tunl0\x00', 0x0}) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/bsg\x00') 07:59:54 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffeee) 07:59:54 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x700000000000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) [ 1776.802397][ T967] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1776.810944][ T967] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1776.818958][ T967] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1776.826942][ T967] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1776.834910][ T967] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1776.842898][ T967] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1776.850899][ T967] 07:59:54 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x511703, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x2000000000000000, 0xffffffffffffffff, 0x0, 0x1, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0xa0) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, r1, 0x87) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async, rerun: 32) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async, rerun: 32) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x2080, 0x0) (async) r3 = add_key$fscrypt_v1(&(0x7f0000000300), &(0x7f0000000340)={'fscrypt:', @desc3}, &(0x7f0000000380)={0x0, "138c55cf23e64bc1485910f81f736ad973849e97b64cfc449123aaa42b0509b42acd9a2c5d6017afd8737d8141c0fd79db542ed02f067a519aef4c5b65ef010c", 0x3b}, 0x48, 0xfffffffffffffff9) (async, rerun: 64) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 64) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r4) keyctl$KEYCTL_WATCH_KEY(0x20, r3, r4, 0xfa) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000280), 0x111, 0x4}}, 0x20) 07:59:54 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') (async) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x891a, &(0x7f00000000c0)={'tunl0\x00', 0x0}) (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/bsg\x00') [ 1776.889538][ T993] FAULT_INJECTION: forcing a failure. [ 1776.889538][ T993] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1776.902648][ T993] CPU: 0 PID: 993 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1776.912924][ T993] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1776.923040][ T993] Call Trace: [ 1776.926443][ T993] [ 1776.929395][ T993] dump_stack_lvl+0xda/0x130 [ 1776.934017][ T993] dump_stack+0x15/0x20 07:59:54 executing program 4: ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x800000, 0xffffffffffffffff, 0x10, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r3) ioctl$SIOCPNDELRESOURCE(r2, 0x89ef, &(0x7f0000000040)=0xfff) 07:59:54 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x511703, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x2000000000000000, 0xffffffffffffffff, 0x0, 0x1, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0xa0) (async) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, r1, 0x87) (async, rerun: 64) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (rerun: 64) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x2080, 0x0) (async) r3 = add_key$fscrypt_v1(&(0x7f0000000300), &(0x7f0000000340)={'fscrypt:', @desc3}, &(0x7f0000000380)={0x0, "138c55cf23e64bc1485910f81f736ad973849e97b64cfc449123aaa42b0509b42acd9a2c5d6017afd8737d8141c0fd79db542ed02f067a519aef4c5b65ef010c", 0x3b}, 0x48, 0xfffffffffffffff9) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r4) (async) keyctl$KEYCTL_WATCH_KEY(0x20, r3, r4, 0xfa) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000280), 0x111, 0x4}}, 0x20) 07:59:54 executing program 4: ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x800000, 0xffffffffffffffff, 0x10, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r3) (async) ioctl$SIOCPNDELRESOURCE(r2, 0x89ef, &(0x7f0000000040)=0xfff) [ 1776.938200][ T993] should_fail_ex+0x21f/0x230 [ 1776.942903][ T993] should_fail+0xb/0x10 [ 1776.947087][ T993] should_fail_usercopy+0x1a/0x20 [ 1776.952138][ T993] copy_page_from_iter_atomic+0x22d/0xcf0 [ 1776.957898][ T993] ? folio_test_hugetlb+0x3a/0x70 [ 1776.962952][ T993] ? shmem_write_begin+0x12a/0x1d0 [ 1776.968123][ T993] generic_perform_write+0x212/0x410 [ 1776.973531][ T993] ? shmem_write_begin+0x1d0/0x1d0 [ 1776.978665][ T993] __generic_file_write_iter+0xa1/0x120 [ 1776.984254][ T993] generic_file_write_iter+0x7d/0x1c0 07:59:55 executing program 4: ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x800000, 0xffffffffffffffff, 0x10, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r3) (async) ioctl$SIOCPNDELRESOURCE(r2, 0x89ef, &(0x7f0000000040)=0xfff) [ 1776.989669][ T993] vfs_write+0x4ab/0x7d0 [ 1776.994005][ T993] ksys_write+0xeb/0x1a0 [ 1776.998292][ T993] __x64_sys_write+0x42/0x50 [ 1777.002925][ T993] do_syscall_64+0x41/0xc0 [ 1777.007381][ T993] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1777.013322][ T993] RIP: 0033:0x7f3d42967b29 [ 1777.017756][ T993] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1777.037411][ T993] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1777.045851][ T993] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1777.053843][ T993] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1777.061873][ T993] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1777.069855][ T993] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1777.077855][ T993] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1777.085898][ T993] 07:59:55 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 52) 07:59:55 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e23, @multicast1}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:55 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000002340)={&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f00000012c0)=[{&(0x7f0000000000)=""/59, 0x3b}, {&(0x7f0000000100)=""/1, 0x1}, {&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000180)=""/44, 0x2c}, {&(0x7f00000001c0)=""/154, 0x9a}, {&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/11, 0xb}], 0x7, &(0x7f0000001340)=""/4096, 0x1000}, 0x40000000) 07:59:55 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x800000000000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:55 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x80) ioctl$VT_WAITACTIVE(r0, 0x5607) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010027bd7000fbdbdf25030000000c0003000300000000bb29007de382eb2c496cf34cdfab0a"], 0x20}, 0x1, 0x0, 0x0, 0x48c0}, 0x1) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:55 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/tty/drivers\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x20, r1, 0x1, 0x70bd27, 0x25dfdbfe, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x6}]}, 0x20}, 0x1, 0x0, 0x0, 0x8c1}, 0x24020050) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffeee) 07:59:55 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') (async, rerun: 32) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000002340)={&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f00000012c0)=[{&(0x7f0000000000)=""/59, 0x3b}, {&(0x7f0000000100)=""/1, 0x1}, {&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000180)=""/44, 0x2c}, {&(0x7f00000001c0)=""/154, 0x9a}, {&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/11, 0xb}], 0x7, &(0x7f0000001340)=""/4096, 0x1000}, 0x40000000) (rerun: 32) 07:59:55 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x80) ioctl$VT_WAITACTIVE(r0, 0x5607) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010027bd7000fbdbdf25030000000c0003000300000000bb29007de382eb2c496cf34cdfab0a"], 0x20}, 0x1, 0x0, 0x0, 0x48c0}, 0x1) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) syz_open_pts(0xffffffffffffffff, 0x80) (async) ioctl$VT_WAITACTIVE(r0, 0x5607) (async) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010027bd7000fbdbdf25030000000c0003000300000000bb29007de382eb2c496cf34cdfab0a"], 0x20}, 0x1, 0x0, 0x0, 0x48c0}, 0x1) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) 07:59:55 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e23, @multicast1}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e23, @multicast1}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:55 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') (async) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000002340)={&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f00000012c0)=[{&(0x7f0000000000)=""/59, 0x3b}, {&(0x7f0000000100)=""/1, 0x1}, {&(0x7f0000000140)=""/33, 0x21}, {&(0x7f0000000180)=""/44, 0x2c}, {&(0x7f00000001c0)=""/154, 0x9a}, {&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/11, 0xb}], 0x7, &(0x7f0000001340)=""/4096, 0x1000}, 0x40000000) 07:59:55 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e23, @multicast1}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e23, @multicast1}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) [ 1777.263071][ T1031] FAULT_INJECTION: forcing a failure. [ 1777.263071][ T1031] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1777.276492][ T1031] CPU: 0 PID: 1031 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1777.286924][ T1031] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1777.297073][ T1031] Call Trace: [ 1777.300451][ T1031] [ 1777.303415][ T1031] dump_stack_lvl+0xda/0x130 [ 1777.308055][ T1031] dump_stack+0x15/0x20 07:59:55 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/\x88\x8a\x9fR$\xe1\f\x11\xe0bg\x00!:\x19\x00') getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000080)={@initdev, @initdev, @local}, &(0x7f00000000c0)=0xc) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0x2711, @my=0x1}, 0x10, 0x80000) [ 1777.312259][ T1031] should_fail_ex+0x21f/0x230 [ 1777.317033][ T1031] __should_fail_alloc_page+0xfd/0x110 [ 1777.322535][ T1031] __alloc_pages+0x108/0x340 [ 1777.327170][ T1031] vma_alloc_folio+0x6a3/0x8c0 [ 1777.332037][ T1031] shmem_get_folio_gfp+0x801/0x1200 [ 1777.337296][ T1031] shmem_write_begin+0xa6/0x1d0 [ 1777.342252][ T1031] generic_perform_write+0x1cf/0x410 [ 1777.347587][ T1031] ? shmem_write_begin+0x1d0/0x1d0 [ 1777.352728][ T1031] __generic_file_write_iter+0xa1/0x120 [ 1777.358520][ T1031] generic_file_write_iter+0x7d/0x1c0 [ 1777.363938][ T1031] vfs_write+0x4ab/0x7d0 [ 1777.368242][ T1031] ksys_write+0xeb/0x1a0 [ 1777.372604][ T1031] __x64_sys_write+0x42/0x50 [ 1777.377301][ T1031] do_syscall_64+0x41/0xc0 [ 1777.381821][ T1031] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1777.387798][ T1031] RIP: 0033:0x7f3d42967b29 [ 1777.392241][ T1031] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 07:59:55 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 53) 07:59:55 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r2, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000280)={&(0x7f0000000080)={0x28, r2, 0x2, 0x70bd2c, 0x25dfdbfd, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}}, 0x8800) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:55 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/\x88\x8a\x9fR$\xe1\f\x11\xe0bg\x00!:\x19\x00') getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000080)={@initdev, @initdev, @local}, &(0x7f00000000c0)=0xc) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0x2711, @my=0x1}, 0x10, 0x80000) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/\x88\x8a\x9fR$\xe1\f\x11\xe0bg\x00!:\x19\x00') (async) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000080)={@initdev, @initdev, @local}, &(0x7f00000000c0)=0xc) (async) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0x2711, @my=0x1}, 0x10, 0x80000) (async) 07:59:55 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:55 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x80) ioctl$VT_WAITACTIVE(r0, 0x5607) (async) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010027bd7000fbdbdf25030000000c0003000300000000bb29007de382eb2c496cf34cdfab0a"], 0x20}, 0x1, 0x0, 0x0, 0x48c0}, 0x1) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) [ 1777.412004][ T1031] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1777.420486][ T1031] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1777.428508][ T1031] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1777.436603][ T1031] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1777.444686][ T1031] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1777.452698][ T1031] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1777.460795][ T1031] [ 1777.517885][ T1068] FAULT_INJECTION: forcing a failure. [ 1777.517885][ T1068] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1777.531040][ T1068] CPU: 0 PID: 1068 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1777.541394][ T1068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1777.551538][ T1068] Call Trace: [ 1777.554836][ T1068] [ 1777.557856][ T1068] dump_stack_lvl+0xda/0x130 [ 1777.562537][ T1068] dump_stack+0x15/0x20 07:59:55 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/tty/drivers\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x20, r1, 0x1, 0x70bd27, 0x25dfdbfe, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x6}]}, 0x20}, 0x1, 0x0, 0x0, 0x8c1}, 0x24020050) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffeee) 07:59:55 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r2, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000280)={&(0x7f0000000080)={0x28, r2, 0x2, 0x70bd2c, 0x25dfdbfd, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}}, 0x8800) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$tipc(&(0x7f0000000080), 0xffffffffffffffff) (async) sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r2, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) (async) sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000280)={&(0x7f0000000080)={0x28, r2, 0x2, 0x70bd2c, 0x25dfdbfd, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}}, 0x8800) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) 07:59:55 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/\x88\x8a\x9fR$\xe1\f\x11\xe0bg\x00!:\x19\x00') getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000080)={@initdev, @initdev, @local}, &(0x7f00000000c0)=0xc) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0x2711, @my=0x1}, 0x10, 0x80000) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/\x88\x8a\x9fR$\xe1\f\x11\xe0bg\x00!:\x19\x00') (async) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000080)={@initdev, @initdev, @local}, &(0x7f00000000c0)=0xc) (async) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0x2711, @my=0x1}, 0x10, 0x80000) (async) 07:59:55 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x0, 0xa4}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) mq_getsetattr(r0, &(0x7f0000000040)={0x8000000000000000, 0xffffffffffffff00, 0x8, 0x9}, &(0x7f0000000080)) 07:59:55 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x6400000000000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) [ 1777.566722][ T1068] should_fail_ex+0x21f/0x230 [ 1777.571525][ T1068] should_fail+0xb/0x10 [ 1777.575776][ T1068] should_fail_usercopy+0x1a/0x20 [ 1777.580829][ T1068] copy_page_from_iter_atomic+0x22d/0xcf0 [ 1777.586620][ T1068] ? folio_test_hugetlb+0x3a/0x70 [ 1777.591750][ T1068] ? shmem_write_begin+0x12a/0x1d0 [ 1777.596886][ T1068] generic_perform_write+0x212/0x410 [ 1777.602241][ T1068] ? shmem_write_begin+0x1d0/0x1d0 [ 1777.607467][ T1068] __generic_file_write_iter+0xa1/0x120 07:59:55 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/bsg\x00') [ 1777.613234][ T1068] generic_file_write_iter+0x7d/0x1c0 [ 1777.618730][ T1068] vfs_write+0x4ab/0x7d0 [ 1777.623080][ T1068] ksys_write+0xeb/0x1a0 [ 1777.627361][ T1068] __x64_sys_write+0x42/0x50 [ 1777.632058][ T1068] do_syscall_64+0x41/0xc0 [ 1777.636503][ T1068] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1777.642433][ T1068] RIP: 0033:0x7f3d42967b29 [ 1777.646869][ T1068] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 07:59:55 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0xdb06000000000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) [ 1777.666681][ T1068] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1777.675314][ T1068] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1777.683376][ T1068] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1777.691528][ T1068] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1777.699526][ T1068] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1777.707522][ T1068] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1777.715518][ T1068] 07:59:55 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 54) 07:59:55 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x0, 0xa4}}}, 0xa0) (async, rerun: 64) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async, rerun: 64) mq_getsetattr(r0, &(0x7f0000000040)={0x8000000000000000, 0xffffffffffffff00, 0x8, 0x9}, &(0x7f0000000080)) 07:59:55 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r2, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000280)={&(0x7f0000000080)={0x28, r2, 0x2, 0x70bd2c, 0x25dfdbfd, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}}, 0x8800) (async) sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000280)={&(0x7f0000000080)={0x28, r2, 0x2, 0x70bd2c, 0x25dfdbfd, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}}, 0x8800) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:55 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/bsg\x00') 07:59:55 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0xfefdffff00000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:55 executing program 0: prctl$PR_SET_NAME(0x3a, 0x0) 07:59:55 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/bsg\x00') 07:59:55 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) getsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x4, &(0x7f0000000300), &(0x7f0000000340)=0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000280)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x2, r1, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @loopback}}}, 0xa0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000003c0)='net/ip_tables_matches\x00') ioctl$SIOCX25SDTEFACILITIES(r2, 0x89eb, &(0x7f0000000380)={0x4, 0x7ff, 0x9700, 0x81, 0x4, 0xd, 0xe, "8ef44a578274ef0e88718c114a6488cfe220b209", "77f2c90f9eaeec8646e21e35bd1852f5eca014f2"}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 07:59:55 executing program 5: ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000300)={0x7, 0xffff, 0x9, 0xffff}) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='totmaps\x00') recvmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000100)=""/124, 0x7c}], 0x1, &(0x7f00000001c0)=""/220, 0xdc}, 0x40000000) setsockopt$CAN_RAW_ERR_FILTER(0xffffffffffffffff, 0x65, 0x2, &(0x7f0000000340)=0x5, 0x4) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10a80, 0x0) setsockopt$CAN_RAW_ERR_FILTER(r1, 0x65, 0x2, &(0x7f00000003c0), 0x4) 07:59:55 executing program 0: prctl$PR_SET_NAME(0x3a, 0x0) 07:59:55 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x0, 0xa4}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) mq_getsetattr(r0, &(0x7f0000000040)={0x8000000000000000, 0xffffffffffffff00, 0x8, 0x9}, &(0x7f0000000080)) [ 1777.905170][ T1113] FAULT_INJECTION: forcing a failure. [ 1777.905170][ T1113] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1777.918563][ T1113] CPU: 0 PID: 1113 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1777.928971][ T1113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1777.939064][ T1113] Call Trace: [ 1777.942357][ T1113] [ 1777.945364][ T1113] dump_stack_lvl+0xda/0x130 [ 1777.950000][ T1113] dump_stack+0x15/0x20 07:59:55 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000040)=0xd2c) [ 1777.954196][ T1113] should_fail_ex+0x21f/0x230 [ 1777.958932][ T1113] __should_fail_alloc_page+0xfd/0x110 [ 1777.964421][ T1113] __alloc_pages+0x108/0x340 [ 1777.969175][ T1113] vma_alloc_folio+0x6a3/0x8c0 [ 1777.974001][ T1113] shmem_get_folio_gfp+0x801/0x1200 [ 1777.979249][ T1113] shmem_write_begin+0xa6/0x1d0 [ 1777.984169][ T1113] generic_perform_write+0x1cf/0x410 [ 1777.989517][ T1113] ? shmem_write_begin+0x1d0/0x1d0 [ 1777.994737][ T1113] __generic_file_write_iter+0xa1/0x120 [ 1778.000374][ T1113] generic_file_write_iter+0x7d/0x1c0 [ 1778.005905][ T1113] vfs_write+0x4ab/0x7d0 [ 1778.010271][ T1113] ksys_write+0xeb/0x1a0 [ 1778.014553][ T1113] __x64_sys_write+0x42/0x50 [ 1778.019218][ T1113] do_syscall_64+0x41/0xc0 [ 1778.023666][ T1113] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1778.029681][ T1113] RIP: 0033:0x7f3d42967b29 [ 1778.034121][ T1113] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 07:59:56 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 55) 07:59:56 executing program 5: ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000300)={0x7, 0xffff, 0x9, 0xffff}) (async) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='totmaps\x00') recvmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000100)=""/124, 0x7c}], 0x1, &(0x7f00000001c0)=""/220, 0xdc}, 0x40000000) (async) setsockopt$CAN_RAW_ERR_FILTER(0xffffffffffffffff, 0x65, 0x2, &(0x7f0000000340)=0x5, 0x4) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') (async) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10a80, 0x0) setsockopt$CAN_RAW_ERR_FILTER(r1, 0x65, 0x2, &(0x7f00000003c0), 0x4) 07:59:56 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:56 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) (async) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000040)=0xd2c) 07:59:56 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) getsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x4, &(0x7f0000000300), &(0x7f0000000340)=0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000280)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x2, r1, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @loopback}}}, 0xa0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000003c0)='net/ip_tables_matches\x00') ioctl$SIOCX25SDTEFACILITIES(r2, 0x89eb, &(0x7f0000000380)={0x4, 0x7ff, 0x9700, 0x81, 0x4, 0xd, 0xe, "8ef44a578274ef0e88718c114a6488cfe220b209", "77f2c90f9eaeec8646e21e35bd1852f5eca014f2"}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) getsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x4, &(0x7f0000000300), &(0x7f0000000340)=0x4) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x3}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000280), 0x2, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x2, r1, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @loopback}}}, 0xa0) (async) syz_open_procfs(0xffffffffffffffff, &(0x7f00000003c0)='net/ip_tables_matches\x00') (async) ioctl$SIOCX25SDTEFACILITIES(r2, 0x89eb, &(0x7f0000000380)={0x4, 0x7ff, 0x9700, 0x81, 0x4, 0xd, 0xe, "8ef44a578274ef0e88718c114a6488cfe220b209", "77f2c90f9eaeec8646e21e35bd1852f5eca014f2"}) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) (async) 07:59:56 executing program 0: prctl$PR_SET_NAME(0x3a, 0x0) [ 1778.053834][ T1113] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1778.062306][ T1113] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1778.070294][ T1113] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1778.078330][ T1113] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1778.086305][ T1113] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1778.094275][ T1113] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1778.102249][ T1113] 07:59:56 executing program 5: ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000300)={0x7, 0xffff, 0x9, 0xffff}) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='totmaps\x00') recvmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000100)=""/124, 0x7c}], 0x1, &(0x7f00000001c0)=""/220, 0xdc}, 0x40000000) (async) setsockopt$CAN_RAW_ERR_FILTER(0xffffffffffffffff, 0x65, 0x2, &(0x7f0000000340)=0x5, 0x4) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') (async) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x10a80, 0x0) setsockopt$CAN_RAW_ERR_FILTER(r1, 0x65, 0x2, &(0x7f00000003c0), 0x4) 07:59:56 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000040)=0xd2c) 07:59:56 executing program 0: prctl$PR_SET_NAME(0x3b, &(0x7f0000000040)='/dev/bsg\x00') [ 1778.127833][ T1145] FAULT_INJECTION: forcing a failure. [ 1778.127833][ T1145] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1778.140963][ T1145] CPU: 0 PID: 1145 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1778.151315][ T1145] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1778.161399][ T1145] Call Trace: [ 1778.164694][ T1145] [ 1778.167638][ T1145] dump_stack_lvl+0xda/0x130 [ 1778.172261][ T1145] dump_stack+0x15/0x20 07:59:56 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) r1 = syz_open_pts(r0, 0x403202) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) ioctl$TIOCSTI(r2, 0x5412, &(0x7f0000000080)=0x4) ioctl$TIOCSIG(r1, 0x40045436, 0x13) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000040)={0x3, 0x6c, 0x8000, 0x4, 0x4}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCL_BLANKSCREEN(r1, 0x541c, &(0x7f0000000340)) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r4) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x30, 0x0, 0x4, 0x70bd25, 0x25dfdbfc, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x880}, 0x4080) bind$can_raw(r4, &(0x7f00000001c0), 0x10) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:56 executing program 5: getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, &(0x7f00000000c0)=0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), r0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)={0x68, r3, 0x320, 0x70bd2d, 0x25dfdbfc, {{}, {}, {0x4c, 0x18, {0x8000, @media='eth\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x20048000}, 0x4000000) accept4$inet(r1, &(0x7f0000000140)={0x2, 0x0, @initdev}, &(0x7f0000000180)=0x10, 0x0) rt_sigpending(&(0x7f0000000000), 0x8) r4 = syz_genetlink_get_family_id$smc(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$SMC_PNETID_ADD(r0, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x60, r4, 0x1, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'nr0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'vlan0\x00'}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000004}, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/Eev\xff\x7f\x00\x00\x00\x00\x00\x00\xecZ\x97y\x92\x8a\x1bQi\xec\xd0\xb8\x91\xfc~\xe4\xd8\xbbC\xcd}\xa5.\xa3\x81\xf29\xc2\xb6\xeb\xb1\xe3B\xcd\xc5n\x1e1') prctl$PR_SET_NAME(0xf, &(0x7f0000000100)='\\\x00') [ 1778.176444][ T1145] should_fail_ex+0x21f/0x230 [ 1778.181222][ T1145] should_fail+0xb/0x10 [ 1778.185401][ T1145] should_fail_usercopy+0x1a/0x20 [ 1778.190452][ T1145] copy_page_from_iter_atomic+0x22d/0xcf0 [ 1778.196209][ T1145] ? folio_test_hugetlb+0x3a/0x70 [ 1778.201322][ T1145] ? shmem_write_begin+0x12a/0x1d0 [ 1778.206463][ T1145] generic_perform_write+0x212/0x410 [ 1778.211841][ T1145] ? shmem_write_begin+0x1d0/0x1d0 [ 1778.216991][ T1145] __generic_file_write_iter+0xa1/0x120 [ 1778.222656][ T1145] generic_file_write_iter+0x7d/0x1c0 07:59:56 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) r1 = syz_open_pts(r0, 0x403202) (async, rerun: 64) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 64) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) ioctl$TIOCSTI(r2, 0x5412, &(0x7f0000000080)=0x4) (async, rerun: 64) ioctl$TIOCSIG(r1, 0x40045436, 0x13) (async, rerun: 64) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000040)={0x3, 0x6c, 0x8000, 0x4, 0x4}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) (async) ioctl$TIOCL_BLANKSCREEN(r1, 0x541c, &(0x7f0000000340)) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r4) (async) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x30, 0x0, 0x4, 0x70bd25, 0x25dfdbfc, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x880}, 0x4080) (async) bind$can_raw(r4, &(0x7f00000001c0), 0x10) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) [ 1778.228063][ T1145] vfs_write+0x4ab/0x7d0 [ 1778.232359][ T1145] ksys_write+0xeb/0x1a0 [ 1778.236709][ T1145] __x64_sys_write+0x42/0x50 [ 1778.241432][ T1145] do_syscall_64+0x41/0xc0 [ 1778.245881][ T1145] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1778.251815][ T1145] RIP: 0033:0x7f3d42967b29 [ 1778.256250][ T1145] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1778.275892][ T1145] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1778.284328][ T1145] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1778.292322][ T1145] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1778.300309][ T1145] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1778.308297][ T1145] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1778.316353][ T1145] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1778.324468][ T1145] 07:59:56 executing program 0: prctl$PR_SET_NAME(0x3b, &(0x7f0000000040)='/dev/bsg\x00') 07:59:56 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:56 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) getsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x4, &(0x7f0000000300), &(0x7f0000000340)=0x4) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000280)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x2, r1, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @loopback}}}, 0xa0) (async) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000003c0)='net/ip_tables_matches\x00') ioctl$SIOCX25SDTEFACILITIES(r2, 0x89eb, &(0x7f0000000380)={0x4, 0x7ff, 0x9700, 0x81, 0x4, 0xd, 0xe, "8ef44a578274ef0e88718c114a6488cfe220b209", "77f2c90f9eaeec8646e21e35bd1852f5eca014f2"}) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 07:59:56 executing program 5: getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, &(0x7f00000000c0)=0xc) (async) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, &(0x7f00000000c0)=0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) syz_genetlink_get_family_id$tipc(&(0x7f0000000200), r0) (async) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), r0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)={0x68, r3, 0x320, 0x70bd2d, 0x25dfdbfc, {{}, {}, {0x4c, 0x18, {0x8000, @media='eth\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x20048000}, 0x4000000) (async) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)={0x68, r3, 0x320, 0x70bd2d, 0x25dfdbfc, {{}, {}, {0x4c, 0x18, {0x8000, @media='eth\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x20048000}, 0x4000000) accept4$inet(r1, &(0x7f0000000140)={0x2, 0x0, @initdev}, &(0x7f0000000180)=0x10, 0x0) rt_sigpending(&(0x7f0000000000), 0x8) r4 = syz_genetlink_get_family_id$smc(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$SMC_PNETID_ADD(r0, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x60, r4, 0x1, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'nr0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'vlan0\x00'}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000004}, 0x0) (async) sendmsg$SMC_PNETID_ADD(r0, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x60, r4, 0x1, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'nr0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'vlan0\x00'}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000004}, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/Eev\xff\x7f\x00\x00\x00\x00\x00\x00\xecZ\x97y\x92\x8a\x1bQi\xec\xd0\xb8\x91\xfc~\xe4\xd8\xbbC\xcd}\xa5.\xa3\x81\xf29\xc2\xb6\xeb\xb1\xe3B\xcd\xc5n\x1e1') prctl$PR_SET_NAME(0xf, &(0x7f0000000100)='\\\x00') 07:59:56 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) r1 = syz_open_pts(r0, 0x403202) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) ioctl$TIOCSTI(r2, 0x5412, &(0x7f0000000080)=0x4) (async) ioctl$TIOCSIG(r1, 0x40045436, 0x13) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000040)={0x3, 0x6c, 0x8000, 0x4, 0x4}) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCL_BLANKSCREEN(r1, 0x541c, &(0x7f0000000340)) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r4) (async) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x30, 0x0, 0x4, 0x70bd25, 0x25dfdbfc, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x880}, 0x4080) (async) bind$can_raw(r4, &(0x7f00000001c0), 0x10) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:56 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 56) 07:59:56 executing program 0: prctl$PR_SET_NAME(0x3b, &(0x7f0000000040)='/dev/bsg\x00') 07:59:56 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) ioctl$KDENABIO(r0, 0x4b36) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x2, 0xffffffffffffffff, 0x1c, 0x0, @in6={0xa, 0x4e24, 0x8001, @mcast1, 0x6}}}, 0xa0) 07:59:56 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), 0xffffffffffffffff) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f0000000040)={0x18, 0x0, {0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x2b}, 'dvmrp1\x00'}}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:56 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) ioctl$KDENABIO(r0, 0x4b36) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x2, 0xffffffffffffffff, 0x1c, 0x0, @in6={0xa, 0x4e24, 0x8001, @mcast1, 0x6}}}, 0xa0) 07:59:56 executing program 5: getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev}, &(0x7f00000000c0)=0xc) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) (async) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), r0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)={0x68, r3, 0x320, 0x70bd2d, 0x25dfdbfc, {{}, {}, {0x4c, 0x18, {0x8000, @media='eth\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x20048000}, 0x4000000) accept4$inet(r1, &(0x7f0000000140)={0x2, 0x0, @initdev}, &(0x7f0000000180)=0x10, 0x0) (async, rerun: 64) rt_sigpending(&(0x7f0000000000), 0x8) (async, rerun: 64) r4 = syz_genetlink_get_family_id$smc(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$SMC_PNETID_ADD(r0, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x60, r4, 0x1, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'nr0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'vlan0\x00'}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000004}, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/Eev\xff\x7f\x00\x00\x00\x00\x00\x00\xecZ\x97y\x92\x8a\x1bQi\xec\xd0\xb8\x91\xfc~\xe4\xd8\xbbC\xcd}\xa5.\xa3\x81\xf29\xc2\xb6\xeb\xb1\xe3B\xcd\xc5n\x1e1') (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000100)='\\\x00') [ 1778.476027][ T1196] FAULT_INJECTION: forcing a failure. [ 1778.476027][ T1196] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1778.489372][ T1196] CPU: 0 PID: 1196 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1778.499773][ T1196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1778.509916][ T1196] Call Trace: [ 1778.513208][ T1196] [ 1778.516155][ T1196] dump_stack_lvl+0xda/0x130 [ 1778.520771][ T1196] dump_stack+0x15/0x20 07:59:56 executing program 0: prctl$PR_SET_NAME(0x3b, 0x0) [ 1778.524962][ T1196] should_fail_ex+0x21f/0x230 [ 1778.529677][ T1196] __should_fail_alloc_page+0xfd/0x110 [ 1778.535156][ T1196] __alloc_pages+0x108/0x340 [ 1778.539771][ T1196] vma_alloc_folio+0x6a3/0x8c0 [ 1778.544633][ T1196] shmem_get_folio_gfp+0x801/0x1200 [ 1778.549939][ T1196] shmem_write_begin+0xa6/0x1d0 [ 1778.554881][ T1196] generic_perform_write+0x1cf/0x410 [ 1778.560243][ T1196] ? shmem_write_begin+0x1d0/0x1d0 [ 1778.565385][ T1196] __generic_file_write_iter+0xa1/0x120 [ 1778.570978][ T1196] generic_file_write_iter+0x7d/0x1c0 [ 1778.576377][ T1196] vfs_write+0x4ab/0x7d0 [ 1778.580662][ T1196] ksys_write+0xeb/0x1a0 [ 1778.585040][ T1196] __x64_sys_write+0x42/0x50 [ 1778.589721][ T1196] do_syscall_64+0x41/0xc0 [ 1778.594160][ T1196] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1778.600174][ T1196] RIP: 0033:0x7f3d42967b29 [ 1778.604789][ T1196] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 07:59:56 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 57) 07:59:56 executing program 1: openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) pipe(&(0x7f0000000140)) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) ioctl$KDENABIO(r0, 0x4b36) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x2, 0xffffffffffffffff, 0x1c, 0x0, @in6={0xa, 0x4e24, 0x8001, @mcast1, 0x6}}}, 0xa0) [ 1778.624421][ T1196] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1778.632910][ T1196] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1778.640903][ T1196] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1778.648964][ T1196] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1778.657213][ T1196] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1778.665255][ T1196] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1778.673249][ T1196] 07:59:56 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:56 executing program 0: prctl$PR_SET_NAME(0x3b, 0x0) 07:59:56 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), 0xffffffffffffffff) (async) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f0000000040)={0x18, 0x0, {0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x2b}, 'dvmrp1\x00'}}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:56 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='*{\\^$%@,]\x00') 07:59:56 executing program 0: prctl$PR_SET_NAME(0x3b, 0x0) 07:59:56 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), 0xffffffffffffffff) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f0000000040)={0x18, 0x0, {0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x2b}, 'dvmrp1\x00'}}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) pipe(&(0x7f0000000140)) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), 0xffffffffffffffff) (async) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f0000000040)={0x18, 0x0, {0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x2b}, 'dvmrp1\x00'}}) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) [ 1778.693798][ T1215] FAULT_INJECTION: forcing a failure. [ 1778.693798][ T1215] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1778.706919][ T1215] CPU: 0 PID: 1215 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1778.717338][ T1215] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1778.727507][ T1215] Call Trace: [ 1778.730799][ T1215] [ 1778.733778][ T1215] dump_stack_lvl+0xda/0x130 [ 1778.738462][ T1215] dump_stack+0x15/0x20 07:59:56 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000001c0)={0x16, 0x2, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1, @in6={0xa, 0x0, 0xffffffff, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x80000001}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) setsockopt$CAN_RAW_ERR_FILTER(r2, 0x65, 0x2, &(0x7f0000000080)=0x2, 0x4) 07:59:56 executing program 0: prctl$PR_SET_NAME(0x3b, 0x0) 07:59:56 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) [ 1778.742672][ T1215] should_fail_ex+0x21f/0x230 [ 1778.747380][ T1215] should_fail+0xb/0x10 [ 1778.751644][ T1215] should_fail_usercopy+0x1a/0x20 [ 1778.756722][ T1215] copy_page_from_iter_atomic+0x22d/0xcf0 [ 1778.762952][ T1215] ? folio_test_hugetlb+0x3a/0x70 [ 1778.768052][ T1215] ? shmem_write_begin+0x12a/0x1d0 [ 1778.773189][ T1215] generic_perform_write+0x212/0x410 [ 1778.779107][ T1215] ? shmem_write_begin+0x1d0/0x1d0 [ 1778.784255][ T1215] __generic_file_write_iter+0xa1/0x120 07:59:56 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000001c0)={0x16, 0x2, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1, @in6={0xa, 0x0, 0xffffffff, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x80000001}}}, 0xa0) (async, rerun: 32) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (rerun: 32) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) setsockopt$CAN_RAW_ERR_FILTER(r2, 0x65, 0x2, &(0x7f0000000080)=0x2, 0x4) [ 1778.789858][ T1215] generic_file_write_iter+0x7d/0x1c0 [ 1778.795685][ T1215] vfs_write+0x4ab/0x7d0 [ 1778.799968][ T1215] ksys_write+0xeb/0x1a0 [ 1778.804309][ T1215] __x64_sys_write+0x42/0x50 [ 1778.808962][ T1215] do_syscall_64+0x41/0xc0 [ 1778.813415][ T1215] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1778.819383][ T1215] RIP: 0033:0x7f3d42967b29 [ 1778.823874][ T1215] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1778.843508][ T1215] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1778.851999][ T1215] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1778.860013][ T1215] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1778.868086][ T1215] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1778.876111][ T1215] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1778.884153][ T1215] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1778.892231][ T1215] 07:59:57 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 58) 07:59:57 executing program 0: ioctl$PTP_EXTTS_REQUEST2(0xffffffffffffffff, 0x40103d0b, &(0x7f0000000080)={0xf10f}) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000580), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x0, 0xffffffffffffffff, 0x10, 0x0, @in6={0xa, 0x4e24, 0x0, @private0={0xfc, 0x0, '\x00', 0x8}, 0x7}}}, 0xa0) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='comm\x00') r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001680), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) getrusage(0xffffffffffffffff, &(0x7f00000006c0)) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000640), 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r3, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000005c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r4, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r5, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000004c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000480), 0x3, r5, 0x10, 0x1, @in6={0xa, 0x4e24, 0xdb14, @mcast2, 0x3}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000003c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000380), 0x4, r3, 0x30, 0x1, @in={0x2, 0x4e21, @remote}}}, 0xa0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x400000, 0x0) 07:59:57 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x4c03, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:57 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='*{\\^$%@,]\x00') 07:59:57 executing program 1: openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000001c0)={0x16, 0x2, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1, @in6={0xa, 0x0, 0xffffffff, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x80000001}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) setsockopt$CAN_RAW_ERR_FILTER(r2, 0x65, 0x2, &(0x7f0000000080)=0x2, 0x4) 07:59:57 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:57 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='*{\\^$%@,]\x00') 07:59:57 executing program 0: ioctl$PTP_EXTTS_REQUEST2(0xffffffffffffffff, 0x40103d0b, &(0x7f0000000080)={0xf10f}) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000580), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x0, 0xffffffffffffffff, 0x10, 0x0, @in6={0xa, 0x4e24, 0x0, @private0={0xfc, 0x0, '\x00', 0x8}, 0x7}}}, 0xa0) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='comm\x00') r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001680), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) getrusage(0xffffffffffffffff, &(0x7f00000006c0)) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000640), 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r3, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000005c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r4, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r5, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000004c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000480), 0x3, r5, 0x10, 0x1, @in6={0xa, 0x4e24, 0xdb14, @mcast2, 0x3}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000003c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000380), 0x4, r3, 0x30, 0x1, @in={0x2, 0x4e21, @remote}}}, 0xa0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x400000, 0x0) 07:59:57 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x4c03, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:57 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x3, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) r1 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000040)={0x4, 0xe1, 0x1ff, 0x5, 0x1f}) 07:59:57 executing program 0: ioctl$PTP_EXTTS_REQUEST2(0xffffffffffffffff, 0x40103d0b, &(0x7f0000000080)={0xf10f}) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000580), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x0, 0xffffffffffffffff, 0x10, 0x0, @in6={0xa, 0x4e24, 0x0, @private0={0xfc, 0x0, '\x00', 0x8}, 0x7}}}, 0xa0) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='comm\x00') r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001680), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) getrusage(0xffffffffffffffff, &(0x7f00000006c0)) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000640), 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r3, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000005c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r4, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r5, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000004c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000480), 0x3, r5, 0x10, 0x1, @in6={0xa, 0x4e24, 0xdb14, @mcast2, 0x3}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000003c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000380), 0x4, r3, 0x30, 0x1, @in={0x2, 0x4e21, @remote}}}, 0xa0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x400000, 0x0) 07:59:57 executing program 0: ioctl$PTP_EXTTS_REQUEST2(0xffffffffffffffff, 0x40103d0b, &(0x7f0000000080)={0xf10f}) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000580), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x0, 0xffffffffffffffff, 0x10, 0x0, @in6={0xa, 0x4e24, 0x0, @private0={0xfc, 0x0, '\x00', 0x8}, 0x7}}}, 0xa0) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='comm\x00') r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001680), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) getrusage(0xffffffffffffffff, &(0x7f00000006c0)) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000640), 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r3, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000005c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r4, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r5, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000004c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000480), 0x3, r5, 0x10, 0x1, @in6={0xa, 0x4e24, 0xdb14, @mcast2, 0x3}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000003c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000380), 0x4, r3, 0x30, 0x1, @in={0x2, 0x4e21, @remote}}}, 0xa0) [ 1779.049052][ T1262] FAULT_INJECTION: forcing a failure. [ 1779.049052][ T1262] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1779.062792][ T1262] CPU: 0 PID: 1262 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1779.073166][ T1262] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1779.083483][ T1262] Call Trace: [ 1779.086853][ T1262] [ 1779.089886][ T1262] dump_stack_lvl+0xda/0x130 [ 1779.094526][ T1262] dump_stack+0x15/0x20 [ 1779.098992][ T1262] should_fail_ex+0x21f/0x230 [ 1779.103730][ T1262] __should_fail_alloc_page+0xfd/0x110 [ 1779.109240][ T1262] __alloc_pages+0x108/0x340 [ 1779.113882][ T1262] vma_alloc_folio+0x6a3/0x8c0 [ 1779.118679][ T1262] shmem_get_folio_gfp+0x801/0x1200 [ 1779.123969][ T1262] shmem_write_begin+0xa6/0x1d0 [ 1779.128847][ T1262] generic_perform_write+0x1cf/0x410 [ 1779.134362][ T1262] ? shmem_write_begin+0x1d0/0x1d0 [ 1779.139619][ T1262] __generic_file_write_iter+0xa1/0x120 [ 1779.145267][ T1262] generic_file_write_iter+0x7d/0x1c0 [ 1779.150769][ T1262] vfs_write+0x4ab/0x7d0 [ 1779.155073][ T1262] ksys_write+0xeb/0x1a0 [ 1779.159390][ T1262] __x64_sys_write+0x42/0x50 [ 1779.163987][ T1262] do_syscall_64+0x41/0xc0 [ 1779.168423][ T1262] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1779.174449][ T1262] RIP: 0033:0x7f3d42967b29 [ 1779.178914][ T1262] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1779.198544][ T1262] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1779.207012][ T1262] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1779.215046][ T1262] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1779.223095][ T1262] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1779.231130][ T1262] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1779.239196][ T1262] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 07:59:57 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 59) 07:59:57 executing program 0: ioctl$PTP_EXTTS_REQUEST2(0xffffffffffffffff, 0x40103d0b, &(0x7f0000000080)={0xf10f}) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000580), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x0, 0xffffffffffffffff, 0x10, 0x0, @in6={0xa, 0x4e24, 0x0, @private0={0xfc, 0x0, '\x00', 0x8}, 0x7}}}, 0xa0) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='comm\x00') r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001680), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) getrusage(0xffffffffffffffff, &(0x7f00000006c0)) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000640), 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r3, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000005c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r4, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r5, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000004c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000480), 0x3, r5, 0x10, 0x1, @in6={0xa, 0x4e24, 0xdb14, @mcast2, 0x3}}}, 0xa0) 07:59:57 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x4c03, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:57 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) ioctl$SIOCPNDELRESOURCE(r0, 0x89ef, &(0x7f0000000000)) 07:59:57 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x3, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) r1 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000040)={0x4, 0xe1, 0x1ff, 0x5, 0x1f}) 07:59:57 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x64}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) [ 1779.247169][ T1262] 07:59:57 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) ioctl$TIOCMIWAIT(r0, 0x545c, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) ioctl$TCSETS2(r1, 0x402c542b, &(0x7f0000000040)={0x6, 0x3, 0x200, 0x20, 0x4, "8af63c482cb9c23575aef46f73d03875f482ed", 0x4, 0x1}) ioctl$KDADDIO(r1, 0x4b34, 0x6712) 07:59:57 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) (async, rerun: 64) ioctl$SIOCPNDELRESOURCE(r0, 0x89ef, &(0x7f0000000000)) (rerun: 64) 07:59:57 executing program 0: ioctl$PTP_EXTTS_REQUEST2(0xffffffffffffffff, 0x40103d0b, &(0x7f0000000080)={0xf10f}) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000580), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x0, 0xffffffffffffffff, 0x10, 0x0, @in6={0xa, 0x4e24, 0x0, @private0={0xfc, 0x0, '\x00', 0x8}, 0x7}}}, 0xa0) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='comm\x00') r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001680), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) getrusage(0xffffffffffffffff, &(0x7f00000006c0)) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000640), 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r3, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000005c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r4, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r5, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) 07:59:57 executing program 0: ioctl$PTP_EXTTS_REQUEST2(0xffffffffffffffff, 0x40103d0b, &(0x7f0000000080)={0xf10f}) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000580), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x0, 0xffffffffffffffff, 0x10, 0x0, @in6={0xa, 0x4e24, 0x0, @private0={0xfc, 0x0, '\x00', 0x8}, 0x7}}}, 0xa0) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='comm\x00') r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001680), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) getrusage(0xffffffffffffffff, &(0x7f00000006c0)) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000640), 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r3, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000005c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20) [ 1779.282999][ T1286] FAULT_INJECTION: forcing a failure. [ 1779.282999][ T1286] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1779.296135][ T1286] CPU: 0 PID: 1286 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1779.306477][ T1286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1779.316611][ T1286] Call Trace: [ 1779.319904][ T1286] [ 1779.322862][ T1286] dump_stack_lvl+0xda/0x130 [ 1779.327491][ T1286] dump_stack+0x15/0x20 07:59:57 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x3, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) r1 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000040)={0x4, 0xe1, 0x1ff, 0x5, 0x1f}) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x3, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) syz_open_dev$tty1(0xc, 0x4, 0x3) (async) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000040)={0x4, 0xe1, 0x1ff, 0x5, 0x1f}) (async) 07:59:57 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) (async, rerun: 32) ioctl$TIOCMIWAIT(r0, 0x545c, 0x0) (rerun: 32) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async, rerun: 64) ioctl$TCSETS2(r1, 0x402c542b, &(0x7f0000000040)={0x6, 0x3, 0x200, 0x20, 0x4, "8af63c482cb9c23575aef46f73d03875f482ed", 0x4, 0x1}) (rerun: 64) ioctl$KDADDIO(r1, 0x4b34, 0x6712) [ 1779.331786][ T1286] should_fail_ex+0x21f/0x230 [ 1779.336489][ T1286] should_fail+0xb/0x10 [ 1779.340680][ T1286] should_fail_usercopy+0x1a/0x20 [ 1779.345790][ T1286] copy_page_from_iter_atomic+0x22d/0xcf0 [ 1779.351574][ T1286] ? folio_test_hugetlb+0x3a/0x70 [ 1779.356621][ T1286] ? shmem_write_begin+0x12a/0x1d0 [ 1779.361769][ T1286] generic_perform_write+0x212/0x410 [ 1779.367117][ T1286] ? shmem_write_begin+0x1d0/0x1d0 [ 1779.372250][ T1286] __generic_file_write_iter+0xa1/0x120 [ 1779.372299][ T1286] generic_file_write_iter+0x7d/0x1c0 [ 1779.372411][ T1286] vfs_write+0x4ab/0x7d0 [ 1779.372443][ T1286] ksys_write+0xeb/0x1a0 [ 1779.372478][ T1286] __x64_sys_write+0x42/0x50 [ 1779.396690][ T1286] do_syscall_64+0x41/0xc0 [ 1779.401268][ T1286] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1779.407201][ T1286] RIP: 0033:0x7f3d42967b29 [ 1779.411654][ T1286] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1779.431315][ T1286] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1779.439792][ T1286] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1779.447887][ T1286] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1779.455893][ T1286] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1779.463951][ T1286] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1779.471962][ T1286] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1779.479938][ T1286] 07:59:57 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 60) 07:59:57 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0xfc, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x0, 0xffffffffffffffff, 0x1c, 0x0, @in={0x2, 0x4e24, @remote}}}, 0xa0) 07:59:57 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:57 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) ioctl$TIOCMIWAIT(r0, 0x545c, 0x0) (async) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) ioctl$TCSETS2(r1, 0x402c542b, &(0x7f0000000040)={0x6, 0x3, 0x200, 0x20, 0x4, "8af63c482cb9c23575aef46f73d03875f482ed", 0x4, 0x1}) (async) ioctl$KDADDIO(r1, 0x4b34, 0x6712) 07:59:57 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) ioctl$SIOCPNDELRESOURCE(r0, 0x89ef, &(0x7f0000000000)) 07:59:57 executing program 0: ioctl$PTP_EXTTS_REQUEST2(0xffffffffffffffff, 0x40103d0b, &(0x7f0000000080)={0xf10f}) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000580), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x0, 0xffffffffffffffff, 0x10, 0x0, @in6={0xa, 0x4e24, 0x0, @private0={0xfc, 0x0, '\x00', 0x8}, 0x7}}}, 0xa0) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='comm\x00') r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001680), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) getrusage(0xffffffffffffffff, &(0x7f00000006c0)) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000640), 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r3, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000005c0), 0x2, 0x0) 07:59:57 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0xfc, 0x0}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x0, 0xffffffffffffffff, 0x1c, 0x0, @in={0x2, 0x4e24, @remote}}}, 0xa0) 07:59:57 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x543701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) setsockopt$CAN_RAW_LOOPBACK(0xffffffffffffffff, 0x65, 0x3, &(0x7f0000000080)=0x1, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='net/fib_trie\x00') setsockopt$CAN_RAW_FILTER(r1, 0x65, 0x1, &(0x7f0000000240)=[{{0x3, 0x1, 0x1, 0x1}, {0x0, 0x1}}], 0x8) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x200, 0x0) ioctl$TIOCSLCKTRMIOS(r2, 0x5457, &(0x7f0000000040)) 07:59:57 executing program 0: ioctl$PTP_EXTTS_REQUEST2(0xffffffffffffffff, 0x40103d0b, &(0x7f0000000080)={0xf10f}) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000580), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x0, 0xffffffffffffffff, 0x10, 0x0, @in6={0xa, 0x4e24, 0x0, @private0={0xfc, 0x0, '\x00', 0x8}, 0x7}}}, 0xa0) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='comm\x00') r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001680), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) getrusage(0xffffffffffffffff, &(0x7f00000006c0)) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000640), 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r3, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) 07:59:57 executing program 5: r0 = add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc4}, &(0x7f00000000c0)={0x0, "33f3272f2d72b0021f31efbc486df8eb2f4047000000000180000020c500103766f8ffffffffffffff5772e7f281ce7fbe906b4aa5835c10716db3736ef9476b"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, r0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) keyctl$KEYCTL_WATCH_KEY(0x20, r0, r1, 0xd9) prctl$PR_SET_NAME(0xf, &(0x7f0000000080)='\x80\n\x00\x00\x00\x00\x00\x00\x00W\xa8\xa5\x9aeCB\x92\x06c\xe5\xee\xaa\x97+\xb5\xac\xe7YHGu\xf4l\xc8?\x9f\x1b\xde\x02&\xc35\xc6\xe4\xc8+(\xb8\xfa]\xc4\x11>\xcd=\x8d\x9f\x04\x97o\x06\xff\xe8\xe9\xebZ\xb5~\x9f\xa3E\xa7\x8a\xe9d\x86\x19\xc7\xd0\v\b\x13V\x94`\xeae\x86\xd2\xd1\xd2\xb6\xc4\x98\x83G\xae\xf1\x18R\xea&\xb9G\x8a\x7fp\xe8\x83\xe5\v\v\xdc\x92\t\x90Q\x0f\xde\x81aO\r\x82\x90V\xc6\x03Q7k]\x1b\t\xaa0') 07:59:57 executing program 0: ioctl$PTP_EXTTS_REQUEST2(0xffffffffffffffff, 0x40103d0b, &(0x7f0000000080)={0xf10f}) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000580), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x0, 0xffffffffffffffff, 0x10, 0x0, @in6={0xa, 0x4e24, 0x0, @private0={0xfc, 0x0, '\x00', 0x8}, 0x7}}}, 0xa0) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='comm\x00') r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001680), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20) getrusage(0xffffffffffffffff, &(0x7f00000006c0)) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000640), 0x2, 0x4}}, 0x20) 07:59:57 executing program 5: r0 = add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc4}, &(0x7f00000000c0)={0x0, "33f3272f2d72b0021f31efbc486df8eb2f4047000000000180000020c500103766f8ffffffffffffff5772e7f281ce7fbe906b4aa5835c10716db3736ef9476b"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, r0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) keyctl$KEYCTL_WATCH_KEY(0x20, r0, r1, 0xd9) prctl$PR_SET_NAME(0xf, &(0x7f0000000080)='\x80\n\x00\x00\x00\x00\x00\x00\x00W\xa8\xa5\x9aeCB\x92\x06c\xe5\xee\xaa\x97+\xb5\xac\xe7YHGu\xf4l\xc8?\x9f\x1b\xde\x02&\xc35\xc6\xe4\xc8+(\xb8\xfa]\xc4\x11>\xcd=\x8d\x9f\x04\x97o\x06\xff\xe8\xe9\xebZ\xb5~\x9f\xa3E\xa7\x8a\xe9d\x86\x19\xc7\xd0\v\b\x13V\x94`\xeae\x86\xd2\xd1\xd2\xb6\xc4\x98\x83G\xae\xf1\x18R\xea&\xb9G\x8a\x7fp\xe8\x83\xe5\v\v\xdc\x92\t\x90Q\x0f\xde\x81aO\r\x82\x90V\xc6\x03Q7k]\x1b\t\xaa0') add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc4}, &(0x7f00000000c0)={0x0, "33f3272f2d72b0021f31efbc486df8eb2f4047000000000180000020c500103766f8ffffffffffffff5772e7f281ce7fbe906b4aa5835c10716db3736ef9476b"}, 0x48, 0xfffffffffffffffb) (async) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, r0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) (async) keyctl$KEYCTL_WATCH_KEY(0x20, r0, r1, 0xd9) (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000080)='\x80\n\x00\x00\x00\x00\x00\x00\x00W\xa8\xa5\x9aeCB\x92\x06c\xe5\xee\xaa\x97+\xb5\xac\xe7YHGu\xf4l\xc8?\x9f\x1b\xde\x02&\xc35\xc6\xe4\xc8+(\xb8\xfa]\xc4\x11>\xcd=\x8d\x9f\x04\x97o\x06\xff\xe8\xe9\xebZ\xb5~\x9f\xa3E\xa7\x8a\xe9d\x86\x19\xc7\xd0\v\b\x13V\x94`\xeae\x86\xd2\xd1\xd2\xb6\xc4\x98\x83G\xae\xf1\x18R\xea&\xb9G\x8a\x7fp\xe8\x83\xe5\v\v\xdc\x92\t\x90Q\x0f\xde\x81aO\r\x82\x90V\xc6\x03Q7k]\x1b\t\xaa0') (async) [ 1779.645711][ T1338] FAULT_INJECTION: forcing a failure. [ 1779.645711][ T1338] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1779.659242][ T1338] CPU: 0 PID: 1338 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1779.669610][ T1338] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1779.679892][ T1338] Call Trace: [ 1779.683190][ T1338] [ 1779.686154][ T1338] dump_stack_lvl+0xda/0x130 [ 1779.690802][ T1338] dump_stack+0x15/0x20 [ 1779.695000][ T1338] should_fail_ex+0x21f/0x230 [ 1779.699738][ T1338] __should_fail_alloc_page+0xfd/0x110 [ 1779.705335][ T1338] __alloc_pages+0x108/0x340 [ 1779.709969][ T1338] vma_alloc_folio+0x6a3/0x8c0 [ 1779.714825][ T1338] shmem_get_folio_gfp+0x801/0x1200 [ 1779.720114][ T1338] shmem_write_begin+0xa6/0x1d0 [ 1779.725012][ T1338] generic_perform_write+0x1cf/0x410 [ 1779.730416][ T1338] ? shmem_write_begin+0x1d0/0x1d0 [ 1779.735566][ T1338] __generic_file_write_iter+0xa1/0x120 [ 1779.741160][ T1338] generic_file_write_iter+0x7d/0x1c0 [ 1779.746573][ T1338] vfs_write+0x4ab/0x7d0 [ 1779.750937][ T1338] ksys_write+0xeb/0x1a0 [ 1779.755196][ T1338] __x64_sys_write+0x42/0x50 [ 1779.759804][ T1338] do_syscall_64+0x41/0xc0 [ 1779.764229][ T1338] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1779.770332][ T1338] RIP: 0033:0x7f3d42967b29 [ 1779.774767][ T1338] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 07:59:57 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 61) 07:59:57 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x6db}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:57 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x543701, 0x0) (async) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x543701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) setsockopt$CAN_RAW_LOOPBACK(0xffffffffffffffff, 0x65, 0x3, &(0x7f0000000080)=0x1, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='net/fib_trie\x00') setsockopt$CAN_RAW_FILTER(r1, 0x65, 0x1, &(0x7f0000000240)=[{{0x3, 0x1, 0x1, 0x1}, {0x0, 0x1}}], 0x8) openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x200, 0x0) (async) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x200, 0x0) ioctl$TIOCSLCKTRMIOS(r2, 0x5457, &(0x7f0000000040)) 07:59:57 executing program 5: r0 = add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc4}, &(0x7f00000000c0)={0x0, "33f3272f2d72b0021f31efbc486df8eb2f4047000000000180000020c500103766f8ffffffffffffff5772e7f281ce7fbe906b4aa5835c10716db3736ef9476b"}, 0x48, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, r0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) keyctl$KEYCTL_WATCH_KEY(0x20, r0, r1, 0xd9) prctl$PR_SET_NAME(0xf, &(0x7f0000000080)='\x80\n\x00\x00\x00\x00\x00\x00\x00W\xa8\xa5\x9aeCB\x92\x06c\xe5\xee\xaa\x97+\xb5\xac\xe7YHGu\xf4l\xc8?\x9f\x1b\xde\x02&\xc35\xc6\xe4\xc8+(\xb8\xfa]\xc4\x11>\xcd=\x8d\x9f\x04\x97o\x06\xff\xe8\xe9\xebZ\xb5~\x9f\xa3E\xa7\x8a\xe9d\x86\x19\xc7\xd0\v\b\x13V\x94`\xeae\x86\xd2\xd1\xd2\xb6\xc4\x98\x83G\xae\xf1\x18R\xea&\xb9G\x8a\x7fp\xe8\x83\xe5\v\v\xdc\x92\t\x90Q\x0f\xde\x81aO\r\x82\x90V\xc6\x03Q7k]\x1b\t\xaa0') add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc4}, &(0x7f00000000c0)={0x0, "33f3272f2d72b0021f31efbc486df8eb2f4047000000000180000020c500103766f8ffffffffffffff5772e7f281ce7fbe906b4aa5835c10716db3736ef9476b"}, 0x48, 0xfffffffffffffffb) (async) add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, r0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) (async) keyctl$KEYCTL_WATCH_KEY(0x20, r0, r1, 0xd9) (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000080)='\x80\n\x00\x00\x00\x00\x00\x00\x00W\xa8\xa5\x9aeCB\x92\x06c\xe5\xee\xaa\x97+\xb5\xac\xe7YHGu\xf4l\xc8?\x9f\x1b\xde\x02&\xc35\xc6\xe4\xc8+(\xb8\xfa]\xc4\x11>\xcd=\x8d\x9f\x04\x97o\x06\xff\xe8\xe9\xebZ\xb5~\x9f\xa3E\xa7\x8a\xe9d\x86\x19\xc7\xd0\v\b\x13V\x94`\xeae\x86\xd2\xd1\xd2\xb6\xc4\x98\x83G\xae\xf1\x18R\xea&\xb9G\x8a\x7fp\xe8\x83\xe5\v\v\xdc\x92\t\x90Q\x0f\xde\x81aO\r\x82\x90V\xc6\x03Q7k]\x1b\t\xaa0') (async) 07:59:57 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0xfc, 0x0}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0xfc, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x0, 0xffffffffffffffff, 0x1c, 0x0, @in={0x2, 0x4e24, @remote}}}, 0xa0) 07:59:57 executing program 0: ioctl$PTP_EXTTS_REQUEST2(0xffffffffffffffff, 0x40103d0b, &(0x7f0000000080)={0xf10f}) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000580), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x0, 0xffffffffffffffff, 0x10, 0x0, @in6={0xa, 0x4e24, 0x0, @private0={0xfc, 0x0, '\x00', 0x8}, 0x7}}}, 0xa0) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='comm\x00') r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001680), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000640), 0x2, 0x4}}, 0x20) 07:59:57 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x543701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async, rerun: 32) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (rerun: 32) setsockopt$CAN_RAW_LOOPBACK(0xffffffffffffffff, 0x65, 0x3, &(0x7f0000000080)=0x1, 0x4) (async) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='net/fib_trie\x00') setsockopt$CAN_RAW_FILTER(r1, 0x65, 0x1, &(0x7f0000000240)=[{{0x3, 0x1, 0x1, 0x1}, {0x0, 0x1}}], 0x8) (async) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x200, 0x0) ioctl$TIOCSLCKTRMIOS(r2, 0x5457, &(0x7f0000000040)) [ 1779.794486][ T1338] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1779.802996][ T1338] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1779.811044][ T1338] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1779.819022][ T1338] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1779.827110][ T1338] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1779.835084][ T1338] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1779.843078][ T1338] 07:59:57 executing program 0: ioctl$PTP_EXTTS_REQUEST2(0xffffffffffffffff, 0x40103d0b, &(0x7f0000000080)={0xf10f}) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000580), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x0, 0xffffffffffffffff, 0x10, 0x0, @in6={0xa, 0x4e24, 0x0, @private0={0xfc, 0x0, '\x00', 0x8}, 0x7}}}, 0xa0) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='comm\x00') openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001680), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000640), 0x2, 0x4}}, 0x20) 07:59:57 executing program 1: rt_sigreturn() r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f00000002c0)) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x106, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) [ 1779.873083][ T1366] FAULT_INJECTION: forcing a failure. [ 1779.873083][ T1366] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1779.886201][ T1366] CPU: 0 PID: 1366 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1779.896660][ T1366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1779.906814][ T1366] Call Trace: [ 1779.910233][ T1366] [ 1779.913182][ T1366] dump_stack_lvl+0xda/0x130 [ 1779.917876][ T1366] dump_stack+0x15/0x20 07:59:57 executing program 0: ioctl$PTP_EXTTS_REQUEST2(0xffffffffffffffff, 0x40103d0b, &(0x7f0000000080)={0xf10f}) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000580), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x0, 0xffffffffffffffff, 0x10, 0x0, @in6={0xa, 0x4e24, 0x0, @private0={0xfc, 0x0, '\x00', 0x8}, 0x7}}}, 0xa0) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='comm\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000640), 0x2, 0x4}}, 0x20) 07:59:57 executing program 1: rt_sigreturn() (async) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) (async) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f00000002c0)) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x106, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:57 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x700}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) [ 1779.922122][ T1366] should_fail_ex+0x21f/0x230 [ 1779.926824][ T1366] should_fail+0xb/0x10 [ 1779.931076][ T1366] should_fail_usercopy+0x1a/0x20 [ 1779.936146][ T1366] copy_page_from_iter_atomic+0x22d/0xcf0 [ 1779.941929][ T1366] ? folio_test_hugetlb+0x3a/0x70 [ 1779.946978][ T1366] ? shmem_write_begin+0x12a/0x1d0 [ 1779.952158][ T1366] generic_perform_write+0x212/0x410 [ 1779.957494][ T1366] ? shmem_write_begin+0x1d0/0x1d0 [ 1779.962709][ T1366] __generic_file_write_iter+0xa1/0x120 [ 1779.968454][ T1366] generic_file_write_iter+0x7d/0x1c0 [ 1779.973865][ T1366] vfs_write+0x4ab/0x7d0 [ 1779.978159][ T1366] ksys_write+0xeb/0x1a0 [ 1779.982447][ T1366] __x64_sys_write+0x42/0x50 [ 1779.987077][ T1366] do_syscall_64+0x41/0xc0 [ 1779.991518][ T1366] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1779.997462][ T1366] RIP: 0033:0x7f3d42967b29 [ 1780.001895][ T1366] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1780.021528][ T1366] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1780.029973][ T1366] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1780.037998][ T1366] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1780.045994][ T1366] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1780.054086][ T1366] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1780.062074][ T1366] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1780.070095][ T1366] 07:59:58 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 62) 07:59:58 executing program 1: rt_sigreturn() (async) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) (async) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f00000002c0)) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x106, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:58 executing program 0: ioctl$PTP_EXTTS_REQUEST2(0xffffffffffffffff, 0x40103d0b, &(0x7f0000000080)={0xf10f}) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000580), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x0, 0xffffffffffffffff, 0x10, 0x0, @in6={0xa, 0x4e24, 0x0, @private0={0xfc, 0x0, '\x00', 0x8}, 0x7}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000640), 0x2, 0x4}}, 0x20) 07:59:58 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) ioctl$sock_x25_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={@remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}, 0x6, 'veth1_to_batadv\x00'}) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='\xe1\x90A\xd0\xa2\xd9\xe2xj\t\'\xf2C\x97\x04\x84\xfe%\x04\x00\xa01\xe4m\xdf\x90b\x1a\rMO\xbc\x02\xe6\x93yl\x1d\"\x9c\xd4C\xfe\x18w\v\x93\xfa\xcc\x7f') 07:59:58 executing program 4: getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000080)={@multicast1, @remote}, &(0x7f0000000040)=0xc) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) ioctl$KDENABIO(r0, 0x4b36) 07:59:58 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x6400}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:58 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) (async) ioctl$sock_x25_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={@remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}, 0x6, 'veth1_to_batadv\x00'}) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='\xe1\x90A\xd0\xa2\xd9\xe2xj\t\'\xf2C\x97\x04\x84\xfe%\x04\x00\xa01\xe4m\xdf\x90b\x1a\rMO\xbc\x02\xe6\x93yl\x1d\"\x9c\xd4C\xfe\x18w\v\x93\xfa\xcc\x7f') 07:59:58 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:58 executing program 0: ioctl$PTP_EXTTS_REQUEST2(0xffffffffffffffff, 0x40103d0b, &(0x7f0000000080)={0xf10f}) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000580), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x0, 0xffffffffffffffff, 0x10, 0x0, @in6={0xa, 0x4e24, 0x0, @private0={0xfc, 0x0, '\x00', 0x8}, 0x7}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000640), 0x2, 0x4}}, 0x20) 07:59:58 executing program 4: getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000080)={@multicast1, @remote}, &(0x7f0000000040)=0xc) (async, rerun: 32) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (rerun: 32) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) ioctl$KDENABIO(r0, 0x4b36) 07:59:58 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) (async) ioctl$sock_x25_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={@remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}, 0x6, 'veth1_to_batadv\x00'}) (async, rerun: 64) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='\xe1\x90A\xd0\xa2\xd9\xe2xj\t\'\xf2C\x97\x04\x84\xfe%\x04\x00\xa01\xe4m\xdf\x90b\x1a\rMO\xbc\x02\xe6\x93yl\x1d\"\x9c\xd4C\xfe\x18w\v\x93\xfa\xcc\x7f') (rerun: 64) [ 1780.234166][ T1408] FAULT_INJECTION: forcing a failure. [ 1780.234166][ T1408] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1780.247464][ T1408] CPU: 1 PID: 1408 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1780.257870][ T1408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1780.268024][ T1408] Call Trace: [ 1780.271347][ T1408] [ 1780.274318][ T1408] dump_stack_lvl+0xda/0x130 [ 1780.278953][ T1408] dump_stack+0x15/0x20 07:59:58 executing program 4: getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000080)={@multicast1, @remote}, &(0x7f0000000040)=0xc) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) ioctl$KDENABIO(r0, 0x4b36) [ 1780.283181][ T1408] should_fail_ex+0x21f/0x230 [ 1780.287885][ T1408] __should_fail_alloc_page+0xfd/0x110 [ 1780.293441][ T1408] __alloc_pages+0x108/0x340 [ 1780.298104][ T1408] vma_alloc_folio+0x6a3/0x8c0 [ 1780.302907][ T1408] shmem_get_folio_gfp+0x801/0x1200 [ 1780.308200][ T1408] shmem_write_begin+0xa6/0x1d0 [ 1780.313056][ T1408] generic_perform_write+0x1cf/0x410 [ 1780.318439][ T1408] ? shmem_write_begin+0x1d0/0x1d0 [ 1780.323554][ T1408] __generic_file_write_iter+0xa1/0x120 [ 1780.329159][ T1408] generic_file_write_iter+0x7d/0x1c0 [ 1780.334539][ T1408] vfs_write+0x4ab/0x7d0 [ 1780.338790][ T1408] ksys_write+0xeb/0x1a0 [ 1780.343056][ T1408] __x64_sys_write+0x42/0x50 [ 1780.347684][ T1408] do_syscall_64+0x41/0xc0 [ 1780.352169][ T1408] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1780.358085][ T1408] RIP: 0033:0x7f3d42967b29 [ 1780.362495][ T1408] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 07:59:58 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 63) 07:59:58 executing program 0: ioctl$PTP_EXTTS_REQUEST2(0xffffffffffffffff, 0x40103d0b, &(0x7f0000000080)={0xf10f}) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000580), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x0, 0xffffffffffffffff, 0x10, 0x0, @in6={0xa, 0x4e24, 0x0, @private0={0xfc, 0x0, '\x00', 0x8}, 0x7}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000640), 0x2, 0x4}}, 0x20) 07:59:58 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/\x7fev/bsg\x00') pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) sendto$llc(r0, &(0x7f0000000080)="2e9be7cd42886b3ad00f8e0666cd1042d9b39ea621721d19eb3b91a1ee9187dd1081367fce77a3265acacec07284495d65fd5b2e690492e6d2818ab2c271bb1d68113d27cc457438ed47055f8a579a909908259a78c126d2260c7e38b986e7886dd42c3f89a35ccac3da203265d1c2b7e20c803a2c871d34bf2c19d08bf1cd9c1d7f1bc5bb9d03", 0x87, 0x24008004, 0x0, 0x0) ioctl$SIOCX25GSUBSCRIP(r0, 0x89e0, &(0x7f0000000140)={'syz_tun\x00', 0x0, 0x4}) 07:59:58 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:58 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000040)=0x10000000) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gretap0\x00', &(0x7f0000000440)=ANY=[@ANYBLOB="657273c28cabd1759f70616e785dab7d18ed298760021f30000000000000000000", @ANYRES32=0x0, @ANYBLOB="00010080000001ff0000000146170058006400000729907864010100e0000002440c6021ac1414aa00000006004434aa71ac1414aa00000005ac1e000100000008ffffffff00000000e000000100000009ac14141300000009e00000017fffffff000000"]}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_targets\x00') ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000005c0)={'syztnl2\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x40, 0x7800, 0x1, 0x3, {{0x24, 0x4, 0x2, 0x3, 0x90, 0x64, 0x0, 0x1, 0x4, 0x0, @local, @broadcast, {[@timestamp_prespec={0x44, 0x1c, 0x6c, 0x3, 0xa, [{@dev={0xac, 0x14, 0x14, 0x33}, 0x9}, {@empty, 0x7f}, {@remote, 0x10001}]}, @timestamp={0x44, 0x14, 0xed, 0x0, 0x2, [0x1, 0x0, 0x3, 0x1000]}, @end, @end, @cipso={0x86, 0x37, 0xffffffffffffffff, [{0x2, 0x7, "cfe397691b"}, {0x1, 0x2}, {0x5, 0x4, "a74f"}, {0x5, 0x6, 'fmp}'}, {0x0, 0x2}, {0x6, 0xb, "0a575cab727bc8ce8e"}, {0x2, 0x11, "03eb55a25c19f0159d4b6646f2df49"}]}, @noop, @ssrr={0x89, 0xf, 0xb0, [@rand_addr=0x64010102, @remote, @private=0xa010102]}]}}}}}) ioctl$SIOCX25SENDCALLACCPT(r2, 0x89e9) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f00000003c0)={@multicast1, @multicast1, 0x0}, &(0x7f0000000400)=0xc) sendmsg$can_raw(r1, &(0x7f0000000380)={&(0x7f00000002c0)={0x1d, r4}, 0x10, &(0x7f0000000340)={&(0x7f0000000300)=@can={{0x2, 0x1}, 0x1, 0x2, 0x0, 0x0, "95b5a8bc6da7385e"}, 0x10}, 0x1, 0x0, 0x0, 0x400c000}, 0x9d00916555b56754) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000001c0)={'\x00', 0xffff638f, 0x1, 0xd2}) 07:59:58 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0xdb06}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) [ 1780.382156][ T1408] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1780.390608][ T1408] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1780.398660][ T1408] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1780.406632][ T1408] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1780.414653][ T1408] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1780.422621][ T1408] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1780.430592][ T1408] 07:59:58 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/\x7fev/bsg\x00') pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) sendto$llc(r0, &(0x7f0000000080)="2e9be7cd42886b3ad00f8e0666cd1042d9b39ea621721d19eb3b91a1ee9187dd1081367fce77a3265acacec07284495d65fd5b2e690492e6d2818ab2c271bb1d68113d27cc457438ed47055f8a579a909908259a78c126d2260c7e38b986e7886dd42c3f89a35ccac3da203265d1c2b7e20c803a2c871d34bf2c19d08bf1cd9c1d7f1bc5bb9d03", 0x87, 0x24008004, 0x0, 0x0) (async) ioctl$SIOCX25GSUBSCRIP(r0, 0x89e0, &(0x7f0000000140)={'syz_tun\x00', 0x0, 0x4}) 07:59:58 executing program 0: ioctl$PTP_EXTTS_REQUEST2(0xffffffffffffffff, 0x40103d0b, &(0x7f0000000080)={0xf10f}) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000580), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='comm\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000640), 0x2, 0x4}}, 0x20) 07:59:58 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) 07:59:58 executing program 0: ioctl$PTP_EXTTS_REQUEST2(0xffffffffffffffff, 0x40103d0b, &(0x7f0000000080)={0xf10f}) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000580), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='comm\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000640), 0x2, 0x4}}, 0x20) [ 1780.470717][ T1435] FAULT_INJECTION: forcing a failure. [ 1780.470717][ T1435] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1780.483901][ T1435] CPU: 1 PID: 1435 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1780.494257][ T1435] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1780.504329][ T1435] Call Trace: [ 1780.507653][ T1435] [ 1780.510601][ T1435] dump_stack_lvl+0xda/0x130 [ 1780.515252][ T1435] dump_stack+0x15/0x20 07:59:58 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/\x7fev/bsg\x00') pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) sendto$llc(r0, &(0x7f0000000080)="2e9be7cd42886b3ad00f8e0666cd1042d9b39ea621721d19eb3b91a1ee9187dd1081367fce77a3265acacec07284495d65fd5b2e690492e6d2818ab2c271bb1d68113d27cc457438ed47055f8a579a909908259a78c126d2260c7e38b986e7886dd42c3f89a35ccac3da203265d1c2b7e20c803a2c871d34bf2c19d08bf1cd9c1d7f1bc5bb9d03", 0x87, 0x24008004, 0x0, 0x0) ioctl$SIOCX25GSUBSCRIP(r0, 0x89e0, &(0x7f0000000140)={'syz_tun\x00', 0x0, 0x4}) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/\x7fev/bsg\x00') (async) pipe2$watch_queue(&(0x7f0000000000), 0x80) (async) sendto$llc(r0, &(0x7f0000000080)="2e9be7cd42886b3ad00f8e0666cd1042d9b39ea621721d19eb3b91a1ee9187dd1081367fce77a3265acacec07284495d65fd5b2e690492e6d2818ab2c271bb1d68113d27cc457438ed47055f8a579a909908259a78c126d2260c7e38b986e7886dd42c3f89a35ccac3da203265d1c2b7e20c803a2c871d34bf2c19d08bf1cd9c1d7f1bc5bb9d03", 0x87, 0x24008004, 0x0, 0x0) (async) ioctl$SIOCX25GSUBSCRIP(r0, 0x89e0, &(0x7f0000000140)={'syz_tun\x00', 0x0, 0x4}) (async) 07:59:58 executing program 1: ioctl$PTP_ENABLE_PPS(0xffffffffffffffff, 0x40043d04, 0x1) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) [ 1780.519516][ T1435] should_fail_ex+0x21f/0x230 [ 1780.524296][ T1435] should_fail+0xb/0x10 [ 1780.528480][ T1435] should_fail_usercopy+0x1a/0x20 [ 1780.533610][ T1435] copy_page_from_iter_atomic+0x22d/0xcf0 [ 1780.539484][ T1435] ? folio_test_hugetlb+0x3a/0x70 [ 1780.544548][ T1435] ? shmem_write_begin+0x12a/0x1d0 [ 1780.549693][ T1435] generic_perform_write+0x212/0x410 [ 1780.555091][ T1435] ? shmem_write_begin+0x1d0/0x1d0 [ 1780.560222][ T1435] __generic_file_write_iter+0xa1/0x120 [ 1780.565801][ T1435] generic_file_write_iter+0x7d/0x1c0 [ 1780.571242][ T1435] vfs_write+0x4ab/0x7d0 [ 1780.575585][ T1435] ksys_write+0xeb/0x1a0 [ 1780.580003][ T1435] __x64_sys_write+0x42/0x50 [ 1780.584625][ T1435] do_syscall_64+0x41/0xc0 [ 1780.589096][ T1435] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1780.595022][ T1435] RIP: 0033:0x7f3d42967b29 [ 1780.599527][ T1435] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1780.619155][ T1435] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1780.627635][ T1435] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1780.635696][ T1435] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1780.643676][ T1435] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1780.651693][ T1435] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1780.659672][ T1435] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1780.667996][ T1435] 07:59:58 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 64) 07:59:58 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') ptrace$ARCH_GET_FS(0x1e, 0xffffffffffffffff, &(0x7f0000000380), 0x1003) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000000)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8, &(0x7f0000000080)=[0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) 07:59:58 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000040)=0x10000000) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gretap0\x00', &(0x7f0000000440)=ANY=[@ANYBLOB="657273c28cabd1759f70616e785dab7d18ed298760021f30000000000000000000", @ANYRES32=0x0, @ANYBLOB="00010080000001ff0000000146170058006400000729907864010100e0000002440c6021ac1414aa00000006004434aa71ac1414aa00000005ac1e000100000008ffffffff00000000e000000100000009ac14141300000009e00000017fffffff000000"]}) (async, rerun: 64) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 64) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_targets\x00') ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000005c0)={'syztnl2\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x40, 0x7800, 0x1, 0x3, {{0x24, 0x4, 0x2, 0x3, 0x90, 0x64, 0x0, 0x1, 0x4, 0x0, @local, @broadcast, {[@timestamp_prespec={0x44, 0x1c, 0x6c, 0x3, 0xa, [{@dev={0xac, 0x14, 0x14, 0x33}, 0x9}, {@empty, 0x7f}, {@remote, 0x10001}]}, @timestamp={0x44, 0x14, 0xed, 0x0, 0x2, [0x1, 0x0, 0x3, 0x1000]}, @end, @end, @cipso={0x86, 0x37, 0xffffffffffffffff, [{0x2, 0x7, "cfe397691b"}, {0x1, 0x2}, {0x5, 0x4, "a74f"}, {0x5, 0x6, 'fmp}'}, {0x0, 0x2}, {0x6, 0xb, "0a575cab727bc8ce8e"}, {0x2, 0x11, "03eb55a25c19f0159d4b6646f2df49"}]}, @noop, @ssrr={0x89, 0xf, 0xb0, [@rand_addr=0x64010102, @remote, @private=0xa010102]}]}}}}}) (async) ioctl$SIOCX25SENDCALLACCPT(r2, 0x89e9) (async, rerun: 64) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f00000003c0)={@multicast1, @multicast1, 0x0}, &(0x7f0000000400)=0xc) (rerun: 64) sendmsg$can_raw(r1, &(0x7f0000000380)={&(0x7f00000002c0)={0x1d, r4}, 0x10, &(0x7f0000000340)={&(0x7f0000000300)=@can={{0x2, 0x1}, 0x1, 0x2, 0x0, 0x0, "95b5a8bc6da7385e"}, 0x10}, 0x1, 0x0, 0x0, 0x400c000}, 0x9d00916555b56754) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000001c0)={'\x00', 0xffff638f, 0x1, 0xd2}) 07:59:58 executing program 1: ioctl$PTP_ENABLE_PPS(0xffffffffffffffff, 0x40043d04, 0x1) (async) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:58 executing program 0: ioctl$PTP_EXTTS_REQUEST2(0xffffffffffffffff, 0x40103d0b, &(0x7f0000000080)={0xf10f}) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000580), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='comm\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000640), 0x2, 0x4}}, 0x20) 07:59:58 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x34000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:58 executing program 0: ioctl$PTP_EXTTS_REQUEST2(0xffffffffffffffff, 0x40103d0b, &(0x7f0000000080)={0xf10f}) openat$bsg(0xffffffffffffff9c, &(0x7f0000000580), 0x551701, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000340)='comm\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000640), 0x2, 0x4}}, 0x20) 07:59:58 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000040)=0x10000000) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gretap0\x00', &(0x7f0000000440)=ANY=[@ANYBLOB="657273c28cabd1759f70616e785dab7d18ed298760021f30000000000000000000", @ANYRES32=0x0, @ANYBLOB="00010080000001ff0000000146170058006400000729907864010100e0000002440c6021ac1414aa00000006004434aa71ac1414aa00000005ac1e000100000008ffffffff00000000e000000100000009ac14141300000009e00000017fffffff000000"]}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_targets\x00') ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000005c0)={'syztnl2\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x40, 0x7800, 0x1, 0x3, {{0x24, 0x4, 0x2, 0x3, 0x90, 0x64, 0x0, 0x1, 0x4, 0x0, @local, @broadcast, {[@timestamp_prespec={0x44, 0x1c, 0x6c, 0x3, 0xa, [{@dev={0xac, 0x14, 0x14, 0x33}, 0x9}, {@empty, 0x7f}, {@remote, 0x10001}]}, @timestamp={0x44, 0x14, 0xed, 0x0, 0x2, [0x1, 0x0, 0x3, 0x1000]}, @end, @end, @cipso={0x86, 0x37, 0xffffffffffffffff, [{0x2, 0x7, "cfe397691b"}, {0x1, 0x2}, {0x5, 0x4, "a74f"}, {0x5, 0x6, 'fmp}'}, {0x0, 0x2}, {0x6, 0xb, "0a575cab727bc8ce8e"}, {0x2, 0x11, "03eb55a25c19f0159d4b6646f2df49"}]}, @noop, @ssrr={0x89, 0xf, 0xb0, [@rand_addr=0x64010102, @remote, @private=0xa010102]}]}}}}}) ioctl$SIOCX25SENDCALLACCPT(r2, 0x89e9) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f00000003c0)={@multicast1, @multicast1, 0x0}, &(0x7f0000000400)=0xc) sendmsg$can_raw(r1, &(0x7f0000000380)={&(0x7f00000002c0)={0x1d, r4}, 0x10, &(0x7f0000000340)={&(0x7f0000000300)=@can={{0x2, 0x1}, 0x1, 0x2, 0x0, 0x0, "95b5a8bc6da7385e"}, 0x10}, 0x1, 0x0, 0x0, 0x400c000}, 0x9d00916555b56754) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000001c0)={'\x00', 0xffff638f, 0x1, 0xd2}) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000040)=0x10000000) (async) pipe(&(0x7f0000000140)) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) (async) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gretap0\x00', &(0x7f0000000440)=ANY=[@ANYBLOB="657273c28cabd1759f70616e785dab7d18ed298760021f30000000000000000000", @ANYRES32=0x0, @ANYBLOB="00010080000001ff0000000146170058006400000729907864010100e0000002440c6021ac1414aa00000006004434aa71ac1414aa00000005ac1e000100000008ffffffff00000000e000000100000009ac14141300000009e00000017fffffff000000"]}) (async) pipe(&(0x7f0000000140)) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) (async) syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_targets\x00') (async) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000005c0)={'syztnl2\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x40, 0x7800, 0x1, 0x3, {{0x24, 0x4, 0x2, 0x3, 0x90, 0x64, 0x0, 0x1, 0x4, 0x0, @local, @broadcast, {[@timestamp_prespec={0x44, 0x1c, 0x6c, 0x3, 0xa, [{@dev={0xac, 0x14, 0x14, 0x33}, 0x9}, {@empty, 0x7f}, {@remote, 0x10001}]}, @timestamp={0x44, 0x14, 0xed, 0x0, 0x2, [0x1, 0x0, 0x3, 0x1000]}, @end, @end, @cipso={0x86, 0x37, 0xffffffffffffffff, [{0x2, 0x7, "cfe397691b"}, {0x1, 0x2}, {0x5, 0x4, "a74f"}, {0x5, 0x6, 'fmp}'}, {0x0, 0x2}, {0x6, 0xb, "0a575cab727bc8ce8e"}, {0x2, 0x11, "03eb55a25c19f0159d4b6646f2df49"}]}, @noop, @ssrr={0x89, 0xf, 0xb0, [@rand_addr=0x64010102, @remote, @private=0xa010102]}]}}}}}) (async) ioctl$SIOCX25SENDCALLACCPT(r2, 0x89e9) (async) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f00000003c0)={@multicast1, @multicast1}, &(0x7f0000000400)=0xc) (async) sendmsg$can_raw(r1, &(0x7f0000000380)={&(0x7f00000002c0)={0x1d, r4}, 0x10, &(0x7f0000000340)={&(0x7f0000000300)=@can={{0x2, 0x1}, 0x1, 0x2, 0x0, 0x0, "95b5a8bc6da7385e"}, 0x10}, 0x1, 0x0, 0x0, 0x400c000}, 0x9d00916555b56754) (async) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000001c0)={'\x00', 0xffff638f, 0x1, 0xd2}) (async) 07:59:58 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') ptrace$ARCH_GET_FS(0x1e, 0xffffffffffffffff, &(0x7f0000000380), 0x1003) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000000)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8, &(0x7f0000000080)=[0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000000)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8, &(0x7f0000000080)=[0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) 07:59:58 executing program 1: ioctl$PTP_ENABLE_PPS(0xffffffffffffffff, 0x40043d04, 0x1) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) ioctl$PTP_ENABLE_PPS(0xffffffffffffffff, 0x40043d04, 0x1) (async) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) [ 1780.814115][ T1472] FAULT_INJECTION: forcing a failure. [ 1780.814115][ T1472] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1780.827463][ T1472] CPU: 1 PID: 1472 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1780.837853][ T1472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1780.847937][ T1472] Call Trace: [ 1780.851310][ T1472] [ 1780.854324][ T1472] dump_stack_lvl+0xda/0x130 [ 1780.859012][ T1472] dump_stack+0x15/0x20 07:59:58 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x0, 0xb582, 0x4}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:58 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x0, 0xb582, 0x4}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x0, 0xb582, 0x4}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) [ 1780.863195][ T1472] should_fail_ex+0x21f/0x230 [ 1780.867895][ T1472] __should_fail_alloc_page+0xfd/0x110 [ 1780.873394][ T1472] __alloc_pages+0x108/0x340 [ 1780.878081][ T1472] vma_alloc_folio+0x6a3/0x8c0 [ 1780.882898][ T1472] ? _raw_spin_unlock+0x26/0x40 [ 1780.887871][ T1472] shmem_get_folio_gfp+0x801/0x1200 [ 1780.893107][ T1472] shmem_write_begin+0xa6/0x1d0 [ 1780.897989][ T1472] generic_perform_write+0x1cf/0x410 [ 1780.903378][ T1472] ? shmem_write_begin+0x1d0/0x1d0 [ 1780.908538][ T1472] __generic_file_write_iter+0xa1/0x120 [ 1780.914272][ T1472] generic_file_write_iter+0x7d/0x1c0 [ 1780.919771][ T1472] vfs_write+0x4ab/0x7d0 [ 1780.924058][ T1472] ksys_write+0xeb/0x1a0 [ 1780.928439][ T1472] __x64_sys_write+0x42/0x50 [ 1780.933079][ T1472] do_syscall_64+0x41/0xc0 [ 1780.937581][ T1472] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1780.943508][ T1472] RIP: 0033:0x7f3d42967b29 [ 1780.947968][ T1472] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1780.967620][ T1472] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1780.976109][ T1472] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1780.984088][ T1472] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1780.992143][ T1472] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1781.000117][ T1472] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 07:59:59 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 65) 07:59:59 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x0, 0xb582, 0x4}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x0, 0xb582, 0x4}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:59 executing program 0: ioctl$PTP_EXTTS_REQUEST2(0xffffffffffffffff, 0x40103d0b, &(0x7f0000000080)={0xf10f}) r0 = syz_open_procfs(0x0, &(0x7f0000000340)='comm\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000640), 0x2, 0x4}}, 0x20) 07:59:59 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') ptrace$ARCH_GET_FS(0x1e, 0xffffffffffffffff, &(0x7f0000000380), 0x1003) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000000)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8, &(0x7f0000000080)=[0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') (async) ptrace$ARCH_GET_FS(0x1e, 0xffffffffffffffff, &(0x7f0000000380), 0x1003) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000000)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8, &(0x7f0000000080)=[0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) (async) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r0}, 0x4) (async) 07:59:59 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x400300}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:59 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001680), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @in6={0xa, 0x0, 0xfffffffd, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7b5}}}, 0xa0) ioctl$PIO_SCRNMAP(r0, 0x4b41, &(0x7f00000002c0)="c06f59c1f5901d1ec8e513a0e4d9a86d3846e6ac05b0fe368996113b4271f4b85e69bc92ea5ff787309fd0cb0da68918505d0aa54eaf1cdc2034a1a9d58b859ca4b226630fa441fc65e3f09bc0de7808279ad4c8fde9ddca0f52d08ac023971398c5d4e234454e78a8c9ec6fb895bdfdf5d9d5a9b38321d917dc707d65f6fbedf004c83a3859a7fa666afb8bf4dabb1e936a75bbe53bbe1ec19ac6859f0867b5e1c3db8279309b33844554eceb2af83047ee35b2fbad6e57ecd3d2b5e8170dd9ded2718aa5ffdb3051a0fac24f52f85d0c1cb1e3df53c5854b0817260958a36700") pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r3) accept4$vsock_stream(r3, &(0x7f0000000040)={0x28, 0x0, 0x2710, @local}, 0x10, 0x81000) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:59 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='ev/bt\x80\x13\xed\xacM\xaa?\xe3k\xc8\x19\xe7\xd0>\x83\xe4\xc36\xe1Lwh \n\xe0') setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000080)={0x5}, 0x4) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='ev/bt\x80\x13\xed\xacM\xaa?\xe3k\xc8\x19\xe7\xd0>\x83\xe4\xc36\xe1Lwh \n\xe0') [ 1781.008087][ T1472] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1781.016062][ T1472] [ 1781.048239][ T1518] FAULT_INJECTION: forcing a failure. [ 1781.048239][ T1518] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1781.061366][ T1518] CPU: 1 PID: 1518 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1781.071718][ T1518] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1781.081792][ T1518] Call Trace: [ 1781.085172][ T1518] [ 1781.088117][ T1518] dump_stack_lvl+0xda/0x130 [ 1781.092792][ T1518] dump_stack+0x15/0x20 07:59:59 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='comm\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000640), 0x2, 0x4}}, 0x20) 07:59:59 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='ev/bt\x80\x13\xed\xacM\xaa?\xe3k\xc8\x19\xe7\xd0>\x83\xe4\xc36\xe1Lwh \n\xe0') setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000080)={0x5}, 0x4) (async) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000080)={0x5}, 0x4) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='ev/bt\x80\x13\xed\xacM\xaa?\xe3k\xc8\x19\xe7\xd0>\x83\xe4\xc36\xe1Lwh \n\xe0') 07:59:59 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001680), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @in6={0xa, 0x0, 0xfffffffd, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7b5}}}, 0xa0) (async) ioctl$PIO_SCRNMAP(r0, 0x4b41, &(0x7f00000002c0)="c06f59c1f5901d1ec8e513a0e4d9a86d3846e6ac05b0fe368996113b4271f4b85e69bc92ea5ff787309fd0cb0da68918505d0aa54eaf1cdc2034a1a9d58b859ca4b226630fa441fc65e3f09bc0de7808279ad4c8fde9ddca0f52d08ac023971398c5d4e234454e78a8c9ec6fb895bdfdf5d9d5a9b38321d917dc707d65f6fbedf004c83a3859a7fa666afb8bf4dabb1e936a75bbe53bbe1ec19ac6859f0867b5e1c3db8279309b33844554eceb2af83047ee35b2fbad6e57ecd3d2b5e8170dd9ded2718aa5ffdb3051a0fac24f52f85d0c1cb1e3df53c5854b0817260958a36700") (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r3) accept4$vsock_stream(r3, &(0x7f0000000040)={0x28, 0x0, 0x2710, @local}, 0x10, 0x81000) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:59 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='ev/bt\x80\x13\xed\xacM\xaa?\xe3k\xc8\x19\xe7\xd0>\x83\xe4\xc36\xe1Lwh \n\xe0') (async) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000080)={0x5}, 0x4) (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='ev/bt\x80\x13\xed\xacM\xaa?\xe3k\xc8\x19\xe7\xd0>\x83\xe4\xc36\xe1Lwh \n\xe0') 07:59:59 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:59 executing program 4: ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, &(0x7f0000000040)={0xff, 0x2, 0x7f, 0xffff, 0x1ff}) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) sendmsg$DEVLINK_CMD_RATE_DEL(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd2c, 0x25dfdbfe, {}, [@DEVLINK_ATTR_PORT_INDEX={0x8, 0x3, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24040840}, 0x1000) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) [ 1781.096982][ T1518] should_fail_ex+0x21f/0x230 [ 1781.101825][ T1518] should_fail+0xb/0x10 [ 1781.106017][ T1518] should_fail_usercopy+0x1a/0x20 [ 1781.111199][ T1518] copy_page_from_iter_atomic+0x22d/0xcf0 [ 1781.117026][ T1518] ? folio_test_hugetlb+0x3a/0x70 [ 1781.122085][ T1518] ? shmem_write_begin+0x12a/0x1d0 [ 1781.127226][ T1518] generic_perform_write+0x212/0x410 [ 1781.132682][ T1518] ? shmem_write_begin+0x1d0/0x1d0 [ 1781.137831][ T1518] __generic_file_write_iter+0xa1/0x120 [ 1781.143405][ T1518] generic_file_write_iter+0x7d/0x1c0 [ 1781.148880][ T1518] vfs_write+0x4ab/0x7d0 [ 1781.153230][ T1518] ksys_write+0xeb/0x1a0 [ 1781.157528][ T1518] __x64_sys_write+0x42/0x50 [ 1781.162157][ T1518] do_syscall_64+0x41/0xc0 [ 1781.166669][ T1518] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1781.172666][ T1518] RIP: 0033:0x7f3d42967b29 [ 1781.177091][ T1518] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1781.196877][ T1518] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1781.205301][ T1518] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1781.213344][ T1518] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1781.221345][ T1518] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1781.229376][ T1518] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1781.237347][ T1518] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1781.245350][ T1518] 07:59:59 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 66) 07:59:59 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001680), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x0, @in6={0xa, 0x0, 0xfffffffd, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7b5}}}, 0xa0) (async, rerun: 64) ioctl$PIO_SCRNMAP(r0, 0x4b41, &(0x7f00000002c0)="c06f59c1f5901d1ec8e513a0e4d9a86d3846e6ac05b0fe368996113b4271f4b85e69bc92ea5ff787309fd0cb0da68918505d0aa54eaf1cdc2034a1a9d58b859ca4b226630fa441fc65e3f09bc0de7808279ad4c8fde9ddca0f52d08ac023971398c5d4e234454e78a8c9ec6fb895bdfdf5d9d5a9b38321d917dc707d65f6fbedf004c83a3859a7fa666afb8bf4dabb1e936a75bbe53bbe1ec19ac6859f0867b5e1c3db8279309b33844554eceb2af83047ee35b2fbad6e57ecd3d2b5e8170dd9ded2718aa5ffdb3051a0fac24f52f85d0c1cb1e3df53c5854b0817260958a36700") (rerun: 64) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r3) (async, rerun: 64) accept4$vsock_stream(r3, &(0x7f0000000040)={0x28, 0x0, 0x2710, @local}, 0x10, 0x81000) (rerun: 64) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:59 executing program 0: r0 = syz_open_procfs(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000640), 0x2, 0x4}}, 0x20) 07:59:59 executing program 4: ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, &(0x7f0000000040)={0xff, 0x2, 0x7f, 0xffff, 0x1ff}) (async) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) sendmsg$DEVLINK_CMD_RATE_DEL(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd2c, 0x25dfdbfe, {}, [@DEVLINK_ATTR_PORT_INDEX={0x8, 0x3, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24040840}, 0x1000) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:59 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r1, 0x100, 0x70bd25, 0x25dfdbfc, {{}, {}, {0x8, 0x11, 0x400}}, ["", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x20000001) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') 07:59:59 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x3000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:59 executing program 4: ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, &(0x7f0000000040)={0xff, 0x2, 0x7f, 0xffff, 0x1ff}) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) sendmsg$DEVLINK_CMD_RATE_DEL(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x300, 0x70bd2c, 0x25dfdbfe, {}, [@DEVLINK_ATTR_PORT_INDEX={0x8, 0x3, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24040840}, 0x1000) (async, rerun: 64) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (rerun: 64) 07:59:59 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x3, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xfffffffc}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:59 executing program 0: r0 = syz_open_procfs(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000640), 0x2, 0x4}}, 0x20) [ 1781.398844][ T1556] FAULT_INJECTION: forcing a failure. [ 1781.398844][ T1556] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1781.412226][ T1556] CPU: 0 PID: 1556 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1781.422576][ T1556] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1781.432734][ T1556] Call Trace: [ 1781.436039][ T1556] [ 1781.438993][ T1556] dump_stack_lvl+0xda/0x130 [ 1781.443645][ T1556] dump_stack+0x15/0x20 07:59:59 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r1, 0x100, 0x70bd25, 0x25dfdbfc, {{}, {}, {0x8, 0x11, 0x400}}, ["", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x20000001) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') 07:59:59 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x3, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:59 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x3, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xfffffffc}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) [ 1781.447834][ T1556] should_fail_ex+0x21f/0x230 [ 1781.452562][ T1556] __should_fail_alloc_page+0xfd/0x110 [ 1781.458196][ T1556] __alloc_pages+0x108/0x340 [ 1781.462854][ T1556] vma_alloc_folio+0x6a3/0x8c0 [ 1781.467757][ T1556] shmem_get_folio_gfp+0x801/0x1200 [ 1781.473000][ T1556] shmem_write_begin+0xa6/0x1d0 [ 1781.477925][ T1556] generic_perform_write+0x1cf/0x410 [ 1781.483270][ T1556] ? shmem_write_begin+0x1d0/0x1d0 [ 1781.488438][ T1556] __generic_file_write_iter+0xa1/0x120 [ 1781.494060][ T1556] generic_file_write_iter+0x7d/0x1c0 [ 1781.499536][ T1556] vfs_write+0x4ab/0x7d0 [ 1781.503885][ T1556] ksys_write+0xeb/0x1a0 [ 1781.508230][ T1556] __x64_sys_write+0x42/0x50 [ 1781.512869][ T1556] do_syscall_64+0x41/0xc0 [ 1781.517320][ T1556] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1781.523296][ T1556] RIP: 0033:0x7f3d42967b29 [ 1781.527784][ T1556] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 07:59:59 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 67) 07:59:59 executing program 0: r0 = syz_open_procfs(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000640), 0x2, 0x4}}, 0x20) 07:59:59 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x7000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:59 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x3, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x3, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) 07:59:59 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x3, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xfffffffc}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:59 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r1, 0x100, 0x70bd25, 0x25dfdbfc, {{}, {}, {0x8, 0x11, 0x400}}, ["", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x20000001) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') 07:59:59 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x3, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) [ 1781.547485][ T1556] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1781.555915][ T1556] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1781.563888][ T1556] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1781.571872][ T1556] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1781.579915][ T1556] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1781.587890][ T1556] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1781.596103][ T1556] 07:59:59 executing program 0: syz_open_procfs(0x0, &(0x7f0000000340)='comm\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000640), 0x2, 0x4}}, 0x20) 07:59:59 executing program 1: write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f0000000080)={0xffffffffffffffff}, 0x1, 0xffffffffffffffff, 0x1c, 0x1, @in6={0xa, 0x4e22, 0x10000, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x7fffffff}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x10, 0xfa00, {&(0x7f0000000040), r0}}, 0x18) 07:59:59 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x71b302, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) ioctl$PTP_PIN_SETFUNC2(r1, 0x40603d10, &(0x7f00000002c0)={'\x00', 0x8000, 0x0, 0xd4c9}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x4, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x4e21, @private=0xa010100}}}, 0xa0) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000080)={0x0, 0xfff, 0xffff5bc3, 0x5, 0x6, "439eeb9033340937a8b19abfc8f74faf874f62"}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:59 executing program 0: syz_open_procfs(0x0, &(0x7f0000000340)='comm\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000640), 0x2, 0x4}}, 0x20) [ 1781.640072][ T1587] FAULT_INJECTION: forcing a failure. [ 1781.640072][ T1587] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1781.653237][ T1587] CPU: 0 PID: 1587 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1781.663668][ T1587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1781.673745][ T1587] Call Trace: [ 1781.677156][ T1587] [ 1781.680111][ T1587] dump_stack_lvl+0xda/0x130 [ 1781.684732][ T1587] dump_stack+0x15/0x20 07:59:59 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000240)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x0e\x1ay]F\xe2\x84\x98B\xc2\xf0\xc2\x9c\xd8\xdb$\xa5\x82\x8aJS\xa1\x994\xc6d\xb4\x99\xba\t\x95x\xed7Xi\x06+:x\x12\xd5\xd7\x13qK\x93N\x8a6\xd8@B\x0e\x8f\x1f\xa6\xb0I\x9c\xbc\xab\xd1=T\x83\x1b\xaeSo\xfb\x04\xd5\xa9Cr+m\x0f\xea1\xcb\xefc\xfe\x8c\x9a\xfb\x10\x16\xba\xf7\xa3\xcf>!x\xbd\xe3\xc9XH\xac\xc8\x93HIZ\xcaC9\xd5\xfa\x1fT\xca\x97\xdai7\x10\x8aT\xdfGf7v.[\x961\xff\xbf,\"/\xff)\x0e\xcd\xad\x90\xa4\x06\x94\xfba\xe7') prctl$PR_SET_NAME(0xf, &(0x7f0000000180)='\xd9{\xf4{:#-\x00zg\xb5\xb8\xc8\xf7\x89wV\xd8!\xa2\xfc\xf5z;\xe6\x14\xb7\x83\xcej 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1781.790349][ T1587] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1781.798827][ T1587] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1781.806797][ T1587] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1781.814767][ T1587] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1781.822805][ T1587] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1781.830811][ T1587] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1781.838791][ T1587] 07:59:59 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 68) 07:59:59 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x71b302, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) ioctl$PTP_PIN_SETFUNC2(r1, 0x40603d10, &(0x7f00000002c0)={'\x00', 0x8000, 0x0, 0xd4c9}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) (async, rerun: 64) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x4, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x4e21, @private=0xa010100}}}, 0xa0) (async, rerun: 64) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000080)={0x0, 0xfff, 0xffff5bc3, 0x5, 0x6, "439eeb9033340937a8b19abfc8f74faf874f62"}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:59 executing program 0: syz_open_procfs(0x0, &(0x7f0000000340)='comm\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000640), 0x2, 0x4}}, 0x20) 07:59:59 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 07:59:59 executing program 1: write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f0000000080)={0xffffffffffffffff}, 0x1, 0xffffffffffffffff, 0x1c, 0x1, @in6={0xa, 0x4e22, 0x10000, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x7fffffff}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x10, 0xfa00, {&(0x7f0000000040), r0}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x1, 0xffffffffffffffff, 0x1c, 0x1, @in6={0xa, 0x4e22, 0x10000, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x7fffffff}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x10, 0xfa00, {&(0x7f0000000040), r0}}, 0x18) (async) 07:59:59 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000240)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x0e\x1ay]F\xe2\x84\x98B\xc2\xf0\xc2\x9c\xd8\xdb$\xa5\x82\x8aJS\xa1\x994\xc6d\xb4\x99\xba\t\x95x\xed7Xi\x06+:x\x12\xd5\xd7\x13qK\x93N\x8a6\xd8@B\x0e\x8f\x1f\xa6\xb0I\x9c\xbc\xab\xd1=T\x83\x1b\xaeSo\xfb\x04\xd5\xa9Cr+m\x0f\xea1\xcb\xefc\xfe\x8c\x9a\xfb\x10\x16\xba\xf7\xa3\xcf>!x\xbd\xe3\xc9XH\xac\xc8\x93HIZ\xcaC9\xd5\xfa\x1fT\xca\x97\xdai7\x10\x8aT\xdfGf7v.[\x961\xff\xbf,\"/\xff)\x0e\xcd\xad\x90\xa4\x06\x94\xfba\xe7') prctl$PR_SET_NAME(0xf, &(0x7f0000000180)='\xd9{\xf4{:#-\x00zg\xb5\xb8\xc8\xf7\x89wV\xd8!\xa2\xfc\xf5z;\xe6\x14\xb7\x83\xcej0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) (async) ioctl$PTP_PIN_SETFUNC2(r1, 0x40603d10, &(0x7f00000002c0)={'\x00', 0x8000, 0x0, 0xd4c9}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x4, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x4e21, @private=0xa010100}}}, 0xa0) (async) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000080)={0x0, 0xfff, 0xffff5bc3, 0x5, 0x6, "439eeb9033340937a8b19abfc8f74faf874f62"}) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 07:59:59 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='comm\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 07:59:59 executing program 1: write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x1, 0xffffffffffffffff, 0x1c, 0x1, @in6={0xa, 0x4e22, 0x10000, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x7fffffff}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f0000000080)={0xffffffffffffffff}, 0x1, 0xffffffffffffffff, 0x1c, 0x1, @in6={0xa, 0x4e22, 0x10000, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x7fffffff}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x10, 0xfa00, {&(0x7f0000000040), r0}}, 0x18) 08:00:00 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x1}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:00 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev\xff\x0fsg\x10') prctl$PR_SET_NAME(0xf, &(0x7f0000000280)='dW.\xc0\xd3\xde\xf4\x99^\xce\xc5\xb1\xbf\x9f\xf0\xb9b\x7fp\xdcd\xd2#\xba\xfc\xc78S\xc8\\\xf3\x9d\xc2{E\xfb\xca\xa4h\x17\x90\xd9\x83S\xa1]\xbdU\xcb3C\x1do\xc9v\xf0\xa5\x05*\xb9\xa5\xed\xee\xe8\xfb\xfcV\xa0\x94ue\x99X\x8c )*\xfd-H\'\xf7Z\xbf\\\xf2\xea^$\xa4\nc+|\x91&\xe6q\x16\x9d\xf8\xd2\xe8n2F\x05F\xe8\x16\x1f\xa9\xe1f/\xb1\xad\x1b\xd6\xfc\xb3P0p9|&GMf\xd6\xd8x\xc6\xf1\x8c0\x894R\xbe\xfd\x87G/\xaf\xbe\',_\xf5?}\xaeY\xeba\xeb?\xac\xe0\xab\x0e\xbfw\xa7\x89\xe7\x98\x1e\x97\xdcJ\xb0\x8e\xa3F-D+\xa0E\x9e6Tuq\\\xbb\xdb\xe13\x82\xc7:Eh\xcc\xd3o\xb1\b\'w\x06\x80QzZ\xe1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x86\xb1^\x89\xfedF\xf2\xfa\xbbO\x85\x94(|\xf5\xf0#8;^,\x1fj\x02\xb8;\xd9\x8b\xdeX=\xaa\xda\x80\x9c ,}\x81b\xd8e\x06h\x85\xfd\xd2\b\xe7i\xa9\x8f\x9dlXo\xf6(\x9dII\xaaA\x88\xc6}\x18\x9b\x04=\x02\xb4\x88\xe9\x1f2s\x99@2\x12\x1b\xaaa\x99\xbf%P\x7fqN\xe7\xe5a\x9d.=d\x9cVk=2Y\xc3J\"[~\x84Y5\xbb\xc4[\xceL\xcfH_/\xfafQ\x1b\x946\xc6\x8fO\xa1\xb3YY~\xdc\x85\x84{E\xf6?4\xc3\xdb\x84O\x00'/388) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) ioctl$SIOCX25SCALLUSERDATA(r0, 0x89e5, &(0x7f0000000080)={0x21, "c226ed05bde1ac353f0089fdbeb4fe9f8c660b7a35899019406a788549e2b32587b9d5faf119652ead9dcfec44fc645beb04a123c484c9375d4673158e0645f3a8cdef4be730e1448ba2d31a96ffd1cba1a4794526f1374e7ded47c8941ef655f6d78e893543b8caf557f42b9097f5ce63d3d6022e00ecfe372d97bd4f75eb12"}) [ 1781.989258][ T1617] FAULT_INJECTION: forcing a failure. [ 1781.989258][ T1617] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1782.002584][ T1617] CPU: 0 PID: 1617 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1782.012933][ T1617] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1782.023025][ T1617] Call Trace: [ 1782.026388][ T1617] [ 1782.029364][ T1617] dump_stack_lvl+0xda/0x130 [ 1782.033996][ T1617] dump_stack+0x15/0x20 [ 1782.038220][ T1617] should_fail_ex+0x21f/0x230 [ 1782.042940][ T1617] __should_fail_alloc_page+0xfd/0x110 [ 1782.048431][ T1617] __alloc_pages+0x108/0x340 [ 1782.053054][ T1617] vma_alloc_folio+0x6a3/0x8c0 [ 1782.057865][ T1617] shmem_get_folio_gfp+0x801/0x1200 [ 1782.063151][ T1617] shmem_write_begin+0xa6/0x1d0 [ 1782.068042][ T1617] generic_perform_write+0x1cf/0x410 [ 1782.073402][ T1617] ? shmem_write_begin+0x1d0/0x1d0 [ 1782.078674][ T1617] __generic_file_write_iter+0xa1/0x120 [ 1782.084350][ T1617] generic_file_write_iter+0x7d/0x1c0 [ 1782.090141][ T1617] vfs_write+0x4ab/0x7d0 [ 1782.094486][ T1617] ksys_write+0xeb/0x1a0 [ 1782.098834][ T1617] __x64_sys_write+0x42/0x50 [ 1782.103464][ T1617] do_syscall_64+0x41/0xc0 [ 1782.108015][ T1617] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1782.114074][ T1617] RIP: 0033:0x7f3d42967b29 [ 1782.118625][ T1617] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 08:00:00 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 69) 08:00:00 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x1}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:00 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 08:00:00 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev\xff\x0fsg\x10') prctl$PR_SET_NAME(0xf, &(0x7f0000000280)='dW.\xc0\xd3\xde\xf4\x99^\xce\xc5\xb1\xbf\x9f\xf0\xb9b\x7fp\xdcd\xd2#\xba\xfc\xc78S\xc8\\\xf3\x9d\xc2{E\xfb\xca\xa4h\x17\x90\xd9\x83S\xa1]\xbdU\xcb3C\x1do\xc9v\xf0\xa5\x05*\xb9\xa5\xed\xee\xe8\xfb\xfcV\xa0\x94ue\x99X\x8c )*\xfd-H\'\xf7Z\xbf\\\xf2\xea^$\xa4\nc+|\x91&\xe6q\x16\x9d\xf8\xd2\xe8n2F\x05F\xe8\x16\x1f\xa9\xe1f/\xb1\xad\x1b\xd6\xfc\xb3P0p9|&GMf\xd6\xd8x\xc6\xf1\x8c0\x894R\xbe\xfd\x87G/\xaf\xbe\',_\xf5?}\xaeY\xeba\xeb?\xac\xe0\xab\x0e\xbfw\xa7\x89\xe7\x98\x1e\x97\xdcJ\xb0\x8e\xa3F-D+\xa0E\x9e6Tuq\\\xbb\xdb\xe13\x82\xc7:Eh\xcc\xd3o\xb1\b\'w\x06\x80QzZ\xe1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x86\xb1^\x89\xfedF\xf2\xfa\xbbO\x85\x94(|\xf5\xf0#8;^,\x1fj\x02\xb8;\xd9\x8b\xdeX=\xaa\xda\x80\x9c ,}\x81b\xd8e\x06h\x85\xfd\xd2\b\xe7i\xa9\x8f\x9dlXo\xf6(\x9dII\xaaA\x88\xc6}\x18\x9b\x04=\x02\xb4\x88\xe9\x1f2s\x99@2\x12\x1b\xaaa\x99\xbf%P\x7fqN\xe7\xe5a\x9d.=d\x9cVk=2Y\xc3J\"[~\x84Y5\xbb\xc4[\xceL\xcfH_/\xfafQ\x1b\x946\xc6\x8fO\xa1\xb3YY~\xdc\x85\x84{E\xf6?4\xc3\xdb\x84O\x00'/388) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) ioctl$SIOCX25SCALLUSERDATA(r0, 0x89e5, &(0x7f0000000080)={0x21, "c226ed05bde1ac353f0089fdbeb4fe9f8c660b7a35899019406a788549e2b32587b9d5faf119652ead9dcfec44fc645beb04a123c484c9375d4673158e0645f3a8cdef4be730e1448ba2d31a96ffd1cba1a4794526f1374e7ded47c8941ef655f6d78e893543b8caf557f42b9097f5ce63d3d6022e00ecfe372d97bd4f75eb12"}) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev\xff\x0fsg\x10') (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000280)='dW.\xc0\xd3\xde\xf4\x99^\xce\xc5\xb1\xbf\x9f\xf0\xb9b\x7fp\xdcd\xd2#\xba\xfc\xc78S\xc8\\\xf3\x9d\xc2{E\xfb\xca\xa4h\x17\x90\xd9\x83S\xa1]\xbdU\xcb3C\x1do\xc9v\xf0\xa5\x05*\xb9\xa5\xed\xee\xe8\xfb\xfcV\xa0\x94ue\x99X\x8c )*\xfd-H\'\xf7Z\xbf\\\xf2\xea^$\xa4\nc+|\x91&\xe6q\x16\x9d\xf8\xd2\xe8n2F\x05F\xe8\x16\x1f\xa9\xe1f/\xb1\xad\x1b\xd6\xfc\xb3P0p9|&GMf\xd6\xd8x\xc6\xf1\x8c0\x894R\xbe\xfd\x87G/\xaf\xbe\',_\xf5?}\xaeY\xeba\xeb?\xac\xe0\xab\x0e\xbfw\xa7\x89\xe7\x98\x1e\x97\xdcJ\xb0\x8e\xa3F-D+\xa0E\x9e6Tuq\\\xbb\xdb\xe13\x82\xc7:Eh\xcc\xd3o\xb1\b\'w\x06\x80QzZ\xe1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x86\xb1^\x89\xfedF\xf2\xfa\xbbO\x85\x94(|\xf5\xf0#8;^,\x1fj\x02\xb8;\xd9\x8b\xdeX=\xaa\xda\x80\x9c ,}\x81b\xd8e\x06h\x85\xfd\xd2\b\xe7i\xa9\x8f\x9dlXo\xf6(\x9dII\xaaA\x88\xc6}\x18\x9b\x04=\x02\xb4\x88\xe9\x1f2s\x99@2\x12\x1b\xaaa\x99\xbf%P\x7fqN\xe7\xe5a\x9d.=d\x9cVk=2Y\xc3J\"[~\x84Y5\xbb\xc4[\xceL\xcfH_/\xfafQ\x1b\x946\xc6\x8fO\xa1\xb3YY~\xdc\x85\x84{E\xf6?4\xc3\xdb\x84O\x00'/388) (async) pipe(&(0x7f0000000140)) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) (async) ioctl$SIOCX25SCALLUSERDATA(r0, 0x89e5, &(0x7f0000000080)={0x21, "c226ed05bde1ac353f0089fdbeb4fe9f8c660b7a35899019406a788549e2b32587b9d5faf119652ead9dcfec44fc645beb04a123c484c9375d4673158e0645f3a8cdef4be730e1448ba2d31a96ffd1cba1a4794526f1374e7ded47c8941ef655f6d78e893543b8caf557f42b9097f5ce63d3d6022e00ecfe372d97bd4f75eb12"}) (async) 08:00:00 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) getsockopt$inet_mreqsrc(r0, 0x0, 0x25, &(0x7f0000000040)={@multicast1, @empty, @broadcast}, &(0x7f0000000080)=0xc) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/zoneinfo\x00', 0x0, 0x0) mq_timedsend(r1, &(0x7f0000000240)="e091e2e2d314455cbc2d725a2160995425c3b7f80700b5558689d0608b70054aa80e1c80a5ee87d28f26456786a4ea06276665446129f032beb12a2e256808e2e8990bb5b9dbd7291e74e41091510734aa86ab2623810598c3311c6d3b3cc68b5f9f376e25678cf4c7147314cbe7e45613bb1a83c92d7929b818a566d50d2b95e4b80cfb001abe29d1a0ba7cb38091dce6059d1e64cdc6b460c90eb5790ef60ebbcecdd22c4f2cf0", 0xa8, 0x799225c3, &(0x7f0000000300)={0x77359400}) read$watch_queue(r0, &(0x7f00000001c0)=""/91, 0x5b) 08:00:00 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='comm\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) [ 1782.138236][ T1617] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1782.146658][ T1617] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1782.154665][ T1617] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1782.162635][ T1617] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1782.170602][ T1617] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1782.178583][ T1617] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1782.186608][ T1617] 08:00:00 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x1}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x1}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:00 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev\xff\x0fsg\x10') prctl$PR_SET_NAME(0xf, &(0x7f0000000280)='dW.\xc0\xd3\xde\xf4\x99^\xce\xc5\xb1\xbf\x9f\xf0\xb9b\x7fp\xdcd\xd2#\xba\xfc\xc78S\xc8\\\xf3\x9d\xc2{E\xfb\xca\xa4h\x17\x90\xd9\x83S\xa1]\xbdU\xcb3C\x1do\xc9v\xf0\xa5\x05*\xb9\xa5\xed\xee\xe8\xfb\xfcV\xa0\x94ue\x99X\x8c )*\xfd-H\'\xf7Z\xbf\\\xf2\xea^$\xa4\nc+|\x91&\xe6q\x16\x9d\xf8\xd2\xe8n2F\x05F\xe8\x16\x1f\xa9\xe1f/\xb1\xad\x1b\xd6\xfc\xb3P0p9|&GMf\xd6\xd8x\xc6\xf1\x8c0\x894R\xbe\xfd\x87G/\xaf\xbe\',_\xf5?}\xaeY\xeba\xeb?\xac\xe0\xab\x0e\xbfw\xa7\x89\xe7\x98\x1e\x97\xdcJ\xb0\x8e\xa3F-D+\xa0E\x9e6Tuq\\\xbb\xdb\xe13\x82\xc7:Eh\xcc\xd3o\xb1\b\'w\x06\x80QzZ\xe1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x86\xb1^\x89\xfedF\xf2\xfa\xbbO\x85\x94(|\xf5\xf0#8;^,\x1fj\x02\xb8;\xd9\x8b\xdeX=\xaa\xda\x80\x9c ,}\x81b\xd8e\x06h\x85\xfd\xd2\b\xe7i\xa9\x8f\x9dlXo\xf6(\x9dII\xaaA\x88\xc6}\x18\x9b\x04=\x02\xb4\x88\xe9\x1f2s\x99@2\x12\x1b\xaaa\x99\xbf%P\x7fqN\xe7\xe5a\x9d.=d\x9cVk=2Y\xc3J\"[~\x84Y5\xbb\xc4[\xceL\xcfH_/\xfafQ\x1b\x946\xc6\x8fO\xa1\xb3YY~\xdc\x85\x84{E\xf6?4\xc3\xdb\x84O\x00'/388) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) ioctl$SIOCX25SCALLUSERDATA(r0, 0x89e5, &(0x7f0000000080)={0x21, "c226ed05bde1ac353f0089fdbeb4fe9f8c660b7a35899019406a788549e2b32587b9d5faf119652ead9dcfec44fc645beb04a123c484c9375d4673158e0645f3a8cdef4be730e1448ba2d31a96ffd1cba1a4794526f1374e7ded47c8941ef655f6d78e893543b8caf557f42b9097f5ce63d3d6022e00ecfe372d97bd4f75eb12"}) 08:00:00 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) getsockopt$inet_mreqsrc(r0, 0x0, 0x25, &(0x7f0000000040)={@multicast1, @empty, @broadcast}, &(0x7f0000000080)=0xc) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/zoneinfo\x00', 0x0, 0x0) (async) mq_timedsend(r1, &(0x7f0000000240)="e091e2e2d314455cbc2d725a2160995425c3b7f80700b5558689d0608b70054aa80e1c80a5ee87d28f26456786a4ea06276665446129f032beb12a2e256808e2e8990bb5b9dbd7291e74e41091510734aa86ab2623810598c3311c6d3b3cc68b5f9f376e25678cf4c7147314cbe7e45613bb1a83c92d7929b818a566d50d2b95e4b80cfb001abe29d1a0ba7cb38091dce6059d1e64cdc6b460c90eb5790ef60ebbcecdd22c4f2cf0", 0xa8, 0x799225c3, &(0x7f0000000300)={0x77359400}) (async, rerun: 32) read$watch_queue(r0, &(0x7f00000001c0)=""/91, 0x5b) (rerun: 32) 08:00:00 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) clock_gettime(0x0, &(0x7f0000000300)) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) accept4$llc(r1, &(0x7f00000003c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000400)=0x38, 0x800) mq_timedsend(r0, &(0x7f0000000100)="2e8b1c68f140f707c3c2c43b2b11ec4d0cab2ec9bc4cbe46081ec9757fd617088cff2fa61f186de8357c334d8359ce06a54d0c699965f97a22f84d4420560a7a7825962a9569f35b4785f983f0062d66f2a0eb4989a9eb8bd2d54ca072fadc12dabdefef6299ae04cfb135cc9cd4a51bbe2e37fc6ae0786ed9f8ed928b95e341d7175e1687476727bc6db21f81c5b0ea3c43fb8ed2944f23d1a866106edd863a5ca493749015156ac7028bd607d006b4466902149155a0b75bb144fb58ff7fc8a1499fde786120be3e754ebbcdf7d69032e025e834d4c928f7425120f3b52c0830", 0xe1, 0x81, &(0x7f0000000200)={r2, r3+60000000}) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x82200, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000380)='\xdb\xaa\x00') r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_mr_cache\x00') mq_getsetattr(r4, &(0x7f0000000080)={0x40, 0x40, 0x5, 0x10001}, &(0x7f00000000c0)) prctl$PR_SET_NAME(0xf, &(0x7f0000000240)='/dev/bsg\x00') [ 1782.224986][ T1651] FAULT_INJECTION: forcing a failure. [ 1782.224986][ T1651] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1782.238130][ T1651] CPU: 0 PID: 1651 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1782.248505][ T1651] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1782.258593][ T1651] Call Trace: [ 1782.261888][ T1651] [ 1782.264834][ T1651] dump_stack_lvl+0xda/0x130 [ 1782.269459][ T1651] dump_stack+0x15/0x20 08:00:00 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='comm\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 08:00:00 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x64000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) [ 1782.273667][ T1651] should_fail_ex+0x21f/0x230 [ 1782.278362][ T1651] should_fail+0xb/0x10 [ 1782.282535][ T1651] should_fail_usercopy+0x1a/0x20 [ 1782.287579][ T1651] copy_page_from_iter_atomic+0x22d/0xcf0 [ 1782.293395][ T1651] ? folio_test_hugetlb+0x3a/0x70 [ 1782.298543][ T1651] ? shmem_write_begin+0x12a/0x1d0 [ 1782.303690][ T1651] generic_perform_write+0x212/0x410 [ 1782.309019][ T1651] ? shmem_write_begin+0x1d0/0x1d0 [ 1782.314376][ T1651] __generic_file_write_iter+0xa1/0x120 [ 1782.319975][ T1651] generic_file_write_iter+0x7d/0x1c0 [ 1782.325467][ T1651] vfs_write+0x4ab/0x7d0 [ 1782.329816][ T1651] ksys_write+0xeb/0x1a0 [ 1782.334103][ T1651] __x64_sys_write+0x42/0x50 [ 1782.338733][ T1651] do_syscall_64+0x41/0xc0 [ 1782.343181][ T1651] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1782.349121][ T1651] RIP: 0033:0x7f3d42967b29 [ 1782.353554][ T1651] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1782.373185][ T1651] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1782.381620][ T1651] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1782.389626][ T1651] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1782.397604][ T1651] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1782.405687][ T1651] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1782.413652][ T1651] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1782.421630][ T1651] 08:00:00 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 70) 08:00:00 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) getsockopt$inet_mreqsrc(r0, 0x0, 0x25, &(0x7f0000000040)={@multicast1, @empty, @broadcast}, &(0x7f0000000080)=0xc) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) (async, rerun: 32) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/zoneinfo\x00', 0x0, 0x0) (async, rerun: 32) mq_timedsend(r1, &(0x7f0000000240)="e091e2e2d314455cbc2d725a2160995425c3b7f80700b5558689d0608b70054aa80e1c80a5ee87d28f26456786a4ea06276665446129f032beb12a2e256808e2e8990bb5b9dbd7291e74e41091510734aa86ab2623810598c3311c6d3b3cc68b5f9f376e25678cf4c7147314cbe7e45613bb1a83c92d7929b818a566d50d2b95e4b80cfb001abe29d1a0ba7cb38091dce6059d1e64cdc6b460c90eb5790ef60ebbcecdd22c4f2cf0", 0xa8, 0x799225c3, &(0x7f0000000300)={0x77359400}) read$watch_queue(r0, &(0x7f00000001c0)=""/91, 0x5b) 08:00:00 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) (async) clock_gettime(0x0, &(0x7f0000000300)) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) accept4$llc(r1, &(0x7f00000003c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000400)=0x38, 0x800) (async) mq_timedsend(r0, &(0x7f0000000100)="2e8b1c68f140f707c3c2c43b2b11ec4d0cab2ec9bc4cbe46081ec9757fd617088cff2fa61f186de8357c334d8359ce06a54d0c699965f97a22f84d4420560a7a7825962a9569f35b4785f983f0062d66f2a0eb4989a9eb8bd2d54ca072fadc12dabdefef6299ae04cfb135cc9cd4a51bbe2e37fc6ae0786ed9f8ed928b95e341d7175e1687476727bc6db21f81c5b0ea3c43fb8ed2944f23d1a866106edd863a5ca493749015156ac7028bd607d006b4466902149155a0b75bb144fb58ff7fc8a1499fde786120be3e754ebbcdf7d69032e025e834d4c928f7425120f3b52c0830", 0xe1, 0x81, &(0x7f0000000200)={r2, r3+60000000}) (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x82200, 0x0) (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000380)='\xdb\xaa\x00') r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_mr_cache\x00') mq_getsetattr(r4, &(0x7f0000000080)={0x40, 0x40, 0x5, 0x10001}, &(0x7f00000000c0)) prctl$PR_SET_NAME(0xf, &(0x7f0000000240)='/dev/bsg\x00') 08:00:00 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='comm\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000640), 0x2, 0x4}}, 0x20) 08:00:00 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) accept$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, &(0x7f0000000080)=0x10) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:00 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0xdb060000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 08:00:00 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) accept$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, &(0x7f0000000080)=0x10) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:00 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='comm\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2, 0x4}}, 0x20) 08:00:00 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x10, 0x0, @ib={0x1b, 0x0, 0x2, {"699aa3220ca08d1eea433001faffdde5"}, 0x0, 0x400}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCNOTTY(r1, 0x5422) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$TCSETS2(r2, 0x402c542b, &(0x7f00000001c0)={0x800, 0x901, 0x3ff, 0x80000001, 0xe8, "86bda3c5d318e03f137e43c22fe8831cdffb05", 0x1, 0x8}) 08:00:00 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) (async) clock_gettime(0x0, &(0x7f0000000300)) (async) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) accept4$llc(r1, &(0x7f00000003c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000400)=0x38, 0x800) (async) mq_timedsend(r0, &(0x7f0000000100)="2e8b1c68f140f707c3c2c43b2b11ec4d0cab2ec9bc4cbe46081ec9757fd617088cff2fa61f186de8357c334d8359ce06a54d0c699965f97a22f84d4420560a7a7825962a9569f35b4785f983f0062d66f2a0eb4989a9eb8bd2d54ca072fadc12dabdefef6299ae04cfb135cc9cd4a51bbe2e37fc6ae0786ed9f8ed928b95e341d7175e1687476727bc6db21f81c5b0ea3c43fb8ed2944f23d1a866106edd863a5ca493749015156ac7028bd607d006b4466902149155a0b75bb144fb58ff7fc8a1499fde786120be3e754ebbcdf7d69032e025e834d4c928f7425120f3b52c0830", 0xe1, 0x81, &(0x7f0000000200)={r2, r3+60000000}) (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x82200, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000380)='\xdb\xaa\x00') (async) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_mr_cache\x00') mq_getsetattr(r4, &(0x7f0000000080)={0x40, 0x40, 0x5, 0x10001}, &(0x7f00000000c0)) (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000240)='/dev/bsg\x00') [ 1782.582751][ T1689] FAULT_INJECTION: forcing a failure. [ 1782.582751][ T1689] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1782.596035][ T1689] CPU: 1 PID: 1689 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1782.606605][ T1689] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1782.616695][ T1689] Call Trace: [ 1782.619986][ T1689] [ 1782.622926][ T1689] dump_stack_lvl+0xda/0x130 [ 1782.627570][ T1689] dump_stack+0x15/0x20 08:00:00 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0xfefdffff}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 08:00:00 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x10, 0x0, @ib={0x1b, 0x0, 0x2, {"699aa3220ca08d1eea433001faffdde5"}, 0x0, 0x400}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCNOTTY(r1, 0x5422) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$TCSETS2(r2, 0x402c542b, &(0x7f00000001c0)={0x800, 0x901, 0x3ff, 0x80000001, 0xe8, "86bda3c5d318e03f137e43c22fe8831cdffb05", 0x1, 0x8}) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x10, 0x0, @ib={0x1b, 0x0, 0x2, {"699aa3220ca08d1eea433001faffdde5"}, 0x0, 0x400}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) ioctl$TIOCNOTTY(r1, 0x5422) (async) pipe2$watch_queue(&(0x7f0000000080), 0x80) (async) ioctl$TCSETS2(r2, 0x402c542b, &(0x7f00000001c0)={0x800, 0x901, 0x3ff, 0x80000001, 0xe8, "86bda3c5d318e03f137e43c22fe8831cdffb05", 0x1, 0x8}) (async) [ 1782.631758][ T1689] should_fail_ex+0x21f/0x230 [ 1782.636462][ T1689] __should_fail_alloc_page+0xfd/0x110 [ 1782.641950][ T1689] __alloc_pages+0x108/0x340 [ 1782.646624][ T1689] vma_alloc_folio+0x6a3/0x8c0 [ 1782.651599][ T1689] shmem_get_folio_gfp+0x801/0x1200 [ 1782.656913][ T1689] shmem_write_begin+0xa6/0x1d0 [ 1782.661900][ T1689] generic_perform_write+0x1cf/0x410 [ 1782.667290][ T1689] ? shmem_write_begin+0x1d0/0x1d0 [ 1782.672486][ T1689] __generic_file_write_iter+0xa1/0x120 [ 1782.678046][ T1689] generic_file_write_iter+0x7d/0x1c0 [ 1782.683430][ T1689] vfs_write+0x4ab/0x7d0 [ 1782.687768][ T1689] ksys_write+0xeb/0x1a0 [ 1782.692102][ T1689] __x64_sys_write+0x42/0x50 [ 1782.696752][ T1689] do_syscall_64+0x41/0xc0 [ 1782.701198][ T1689] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1782.707105][ T1689] RIP: 0033:0x7f3d42967b29 [ 1782.711631][ T1689] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 08:00:00 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 71) 08:00:00 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) accept$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, &(0x7f0000000080)=0x10) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:00 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='comm\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x0, 0x4}}, 0x20) 08:00:00 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x10, 0x0, @ib={0x1b, 0x0, 0x2, {"699aa3220ca08d1eea433001faffdde5"}, 0x0, 0x400}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCNOTTY(r1, 0x5422) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$TCSETS2(r2, 0x402c542b, &(0x7f00000001c0)={0x800, 0x901, 0x3ff, 0x80000001, 0xe8, "86bda3c5d318e03f137e43c22fe8831cdffb05", 0x1, 0x8}) 08:00:00 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f00000004c0)='\x00\x00\x00\x00\x00\xab\b\xe2=G\xe0\x13\x00\x00\xc8\x00Y\xd3\xb6C\tR\bL\xa8\xdf\xac)\xe9c\xd9O\x1d\x9f\xc8\xe5\xa9\xde\xc4\xce,r\xcf\x89\xf3\xd2UCH\x8av\xb7l\x86\xe3\xd7\xb2\x95\xe6!\x99=a\x9e=\x9a\xeeg\xbf^d|\x91\xb3l>h\x90\xfaU\xd6\x96\x86\x14c<\xa6!}\xac\xdf\x01\x00\xc2_kF\xb8P/\x80?I\x97\xe4\xf9\xbd\xb3\xbd\xc7\xcaf\xe6\x9b\x9fm,\xbc\x91@\xff\b`\xf2\xf6\x9c\x94\x0e\xd8\xd8\x06t\xcd\xf0\xcc7[\x97gt\x19T-\xe9\xeb\xad\xa5\xc3\x15\x81\xc4.\r\xa6k\xeb\x1d\xa5aP\xdb\xf3\xa9\xdc\xcb\x01\xf9\xbf\x15\x8d\x14\x90\xe1\xd3\x1a\x06\xea?z\x8dg\xd6\xd9\x14\xd8\x13\xb8\xfa\'\xa2\xa2\x99?\xd4RB\xc9\t\x00\x00\x00\x00\x00\x00\x15\xa1\"2\xdbV4\xce{\x04\x13]\xe7\xe9Y\xd2\xf5&\x88\f\xb3<\x9b\x1f\xf53*|DHM4\xf9T\n\x18\xf5\xb7\x13\xd7\xb3\v\xe9\xb85\xdf/[\xe9\xa3\xb5\x1aE\xe9\xad\v]\xa9\x8dk\x00\x06\xb8*\x94A\xe9,\x93\xcf\x12\xfa\xbbk\xfd\x95\x15\x82\x94\xbe:K\x91sYRQ\xb7m\xf4\xa3\x85&\x8fF\r\'\xde\xe6\x039\a<\x92z\xe2\xb7\xf9d\x8a\xd3u\x82\xcc\x1a=\\\xb1GJ\xb2\xbe\xb2\xa2-\xc4\xaei\xe0\xbeP\xdf\xe0\xc6\x92yv2>V\x83&\xa2\x1a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xac\xf8M\xaeh\x91\x92\x8b\x12\x98\xc5fz\x18\xd0]\xca\x14\x1b\xd7\x18Z|\xda\x1d\xc4\xe3\xdc\x129!\xe2w^\xe7J\x93\xdf\x00\x00\x00\xeer_I\xaf\xc4\x99c1\x01\x1a\xc2\aa\x89\xc7\x9f\xf9\x98\xd6d\x86\x93\xf94\x8f\x8e\xb0\xf6\x84\xd5\xd0y8Y\xbc\xc1!y\x16\xe7\xc5\xedF\xad%\xdf[_\x01\x93\xd1\xf2^(8\x04e\xcd4\x98Z.\xcdD\vE\xa73\xb1\x8c\x9ey\t\xb5,\x97\x01\bo\xb2w\x16\b)\x95b\xbc\x84\xdfp\"\x82\xf3\x84<\xa1^\xd2dC\xfd\xb30SX\x9e\xcf\x9d\xfe\xfe!\xd1\x15\x15KG\xff\xe0\xd1\x0f\xcf3\x1e\xbe\x8a\x1f\xf2\xcb\x15%\x17d\x05p+\xde\xf8\x1d\xb5(\xbdE\x98\xb6D\x02t\xe9\xb0\f\xab\xf1/4\xf6\xd3#\'1\xd0\x19\xc7g@-?1\xf5%\x9eGx\xe4\xd4\xdb\xa81|8\x0f<\x80\xe5\x00') prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='*([]{,,\x00') prctl$PR_SET_NAME(0xf, &(0x7f0000000200)='*%^/*]{\xe6*$\\)\\\x00') 08:00:00 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0xfffffdfe}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) [ 1782.731331][ T1689] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1782.739780][ T1689] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1782.747864][ T1689] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1782.755836][ T1689] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1782.763826][ T1689] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1782.771813][ T1689] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1782.779797][ T1689] 08:00:00 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='comm\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 08:00:00 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000080)={0xffffffffffffffff}, 0x3, 0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @empty}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000280)={0x11, 0x10, 0xfa00, {&(0x7f0000000040), r2}}, 0x18) 08:00:00 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f00000004c0)='\x00\x00\x00\x00\x00\xab\b\xe2=G\xe0\x13\x00\x00\xc8\x00Y\xd3\xb6C\tR\bL\xa8\xdf\xac)\xe9c\xd9O\x1d\x9f\xc8\xe5\xa9\xde\xc4\xce,r\xcf\x89\xf3\xd2UCH\x8av\xb7l\x86\xe3\xd7\xb2\x95\xe6!\x99=a\x9e=\x9a\xeeg\xbf^d|\x91\xb3l>h\x90\xfaU\xd6\x96\x86\x14c<\xa6!}\xac\xdf\x01\x00\xc2_kF\xb8P/\x80?I\x97\xe4\xf9\xbd\xb3\xbd\xc7\xcaf\xe6\x9b\x9fm,\xbc\x91@\xff\b`\xf2\xf6\x9c\x94\x0e\xd8\xd8\x06t\xcd\xf0\xcc7[\x97gt\x19T-\xe9\xeb\xad\xa5\xc3\x15\x81\xc4.\r\xa6k\xeb\x1d\xa5aP\xdb\xf3\xa9\xdc\xcb\x01\xf9\xbf\x15\x8d\x14\x90\xe1\xd3\x1a\x06\xea?z\x8dg\xd6\xd9\x14\xd8\x13\xb8\xfa\'\xa2\xa2\x99?\xd4RB\xc9\t\x00\x00\x00\x00\x00\x00\x15\xa1\"2\xdbV4\xce{\x04\x13]\xe7\xe9Y\xd2\xf5&\x88\f\xb3<\x9b\x1f\xf53*|DHM4\xf9T\n\x18\xf5\xb7\x13\xd7\xb3\v\xe9\xb85\xdf/[\xe9\xa3\xb5\x1aE\xe9\xad\v]\xa9\x8dk\x00\x06\xb8*\x94A\xe9,\x93\xcf\x12\xfa\xbbk\xfd\x95\x15\x82\x94\xbe:K\x91sYRQ\xb7m\xf4\xa3\x85&\x8fF\r\'\xde\xe6\x039\a<\x92z\xe2\xb7\xf9d\x8a\xd3u\x82\xcc\x1a=\\\xb1GJ\xb2\xbe\xb2\xa2-\xc4\xaei\xe0\xbeP\xdf\xe0\xc6\x92yv2>V\x83&\xa2\x1a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xac\xf8M\xaeh\x91\x92\x8b\x12\x98\xc5fz\x18\xd0]\xca\x14\x1b\xd7\x18Z|\xda\x1d\xc4\xe3\xdc\x129!\xe2w^\xe7J\x93\xdf\x00\x00\x00\xeer_I\xaf\xc4\x99c1\x01\x1a\xc2\aa\x89\xc7\x9f\xf9\x98\xd6d\x86\x93\xf94\x8f\x8e\xb0\xf6\x84\xd5\xd0y8Y\xbc\xc1!y\x16\xe7\xc5\xedF\xad%\xdf[_\x01\x93\xd1\xf2^(8\x04e\xcd4\x98Z.\xcdD\vE\xa73\xb1\x8c\x9ey\t\xb5,\x97\x01\bo\xb2w\x16\b)\x95b\xbc\x84\xdfp\"\x82\xf3\x84<\xa1^\xd2dC\xfd\xb30SX\x9e\xcf\x9d\xfe\xfe!\xd1\x15\x15KG\xff\xe0\xd1\x0f\xcf3\x1e\xbe\x8a\x1f\xf2\xcb\x15%\x17d\x05p+\xde\xf8\x1d\xb5(\xbdE\x98\xb6D\x02t\xe9\xb0\f\xab\xf1/4\xf6\xd3#\'1\xd0\x19\xc7g@-?1\xf5%\x9eGx\xe4\xd4\xdb\xa81|8\x0f<\x80\xe5\x00') prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='*([]{,,\x00') (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000200)='*%^/*]{\xe6*$\\)\\\x00') 08:00:00 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000080)={0xffffffffffffffff}, 0x3, 0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @empty}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000280)={0x11, 0x10, 0xfa00, {&(0x7f0000000040), r2}}, 0x18) 08:00:00 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) ioctl$SIOCX25GCALLUSERDATA(r0, 0x89e4, &(0x7f00000001c0)={0x65, "36ca74a92fc64934fc6caa93a87b5741a474c9e6a3a636d6251995ed670b533bcf19edf2f2c014d5288cd68af5d7062c45078c68b36941d3014a85a2443bcd79b40a08635e10e05f49805936cce8bd4c626faaf791b0ea86443eec641b81a44351ba3239dc3d093ff8a8c498bc82e4a5b74530cdc49be85a04b1b24c311fd9c8"}) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000040)={0x0, r0}, 0x10) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) setsockopt$CAN_RAW_ERR_FILTER(r1, 0x65, 0x2, &(0x7f0000000080)=0x7ff, 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x14, 0x1, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0xfe, 0x0}}}}, 0xa0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000400), 0x90000, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0), r2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000380)={0x11, 0x10, 0xfa00, {&(0x7f0000000340)}}, 0x18) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:00 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000080)={0xffffffffffffffff}, 0x3, 0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @empty}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000280)={0x11, 0x10, 0xfa00, {&(0x7f0000000040), r2}}, 0x18) [ 1782.853933][ T1728] FAULT_INJECTION: forcing a failure. [ 1782.853933][ T1728] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1782.867058][ T1728] CPU: 1 PID: 1728 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1782.877418][ T1728] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1782.887536][ T1728] Call Trace: [ 1782.890899][ T1728] [ 1782.893907][ T1728] dump_stack_lvl+0xda/0x130 [ 1782.898527][ T1728] dump_stack+0x15/0x20 [ 1782.902713][ T1728] should_fail_ex+0x21f/0x230 [ 1782.907422][ T1728] should_fail+0xb/0x10 [ 1782.911713][ T1728] should_fail_usercopy+0x1a/0x20 [ 1782.916845][ T1728] copy_page_from_iter_atomic+0x22d/0xcf0 [ 1782.922607][ T1728] ? folio_test_hugetlb+0x3a/0x70 [ 1782.927697][ T1728] ? shmem_write_begin+0x12a/0x1d0 [ 1782.932915][ T1728] generic_perform_write+0x212/0x410 [ 1782.938260][ T1728] ? shmem_write_begin+0x1d0/0x1d0 [ 1782.943466][ T1728] __generic_file_write_iter+0xa1/0x120 [ 1782.949104][ T1728] generic_file_write_iter+0x7d/0x1c0 [ 1782.954496][ T1728] vfs_write+0x4ab/0x7d0 [ 1782.958752][ T1728] ksys_write+0xeb/0x1a0 [ 1782.963012][ T1728] __x64_sys_write+0x42/0x50 [ 1782.967615][ T1728] do_syscall_64+0x41/0xc0 [ 1782.972046][ T1728] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1782.978001][ T1728] RIP: 0033:0x7f3d42967b29 [ 1782.982441][ T1728] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1783.002215][ T1728] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1783.010745][ T1728] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1783.018850][ T1728] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1783.026817][ T1728] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1783.034808][ T1728] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1783.042800][ T1728] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1783.050851][ T1728] 08:00:01 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 72) 08:00:01 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f00000004c0)='\x00\x00\x00\x00\x00\xab\b\xe2=G\xe0\x13\x00\x00\xc8\x00Y\xd3\xb6C\tR\bL\xa8\xdf\xac)\xe9c\xd9O\x1d\x9f\xc8\xe5\xa9\xde\xc4\xce,r\xcf\x89\xf3\xd2UCH\x8av\xb7l\x86\xe3\xd7\xb2\x95\xe6!\x99=a\x9e=\x9a\xeeg\xbf^d|\x91\xb3l>h\x90\xfaU\xd6\x96\x86\x14c<\xa6!}\xac\xdf\x01\x00\xc2_kF\xb8P/\x80?I\x97\xe4\xf9\xbd\xb3\xbd\xc7\xcaf\xe6\x9b\x9fm,\xbc\x91@\xff\b`\xf2\xf6\x9c\x94\x0e\xd8\xd8\x06t\xcd\xf0\xcc7[\x97gt\x19T-\xe9\xeb\xad\xa5\xc3\x15\x81\xc4.\r\xa6k\xeb\x1d\xa5aP\xdb\xf3\xa9\xdc\xcb\x01\xf9\xbf\x15\x8d\x14\x90\xe1\xd3\x1a\x06\xea?z\x8dg\xd6\xd9\x14\xd8\x13\xb8\xfa\'\xa2\xa2\x99?\xd4RB\xc9\t\x00\x00\x00\x00\x00\x00\x15\xa1\"2\xdbV4\xce{\x04\x13]\xe7\xe9Y\xd2\xf5&\x88\f\xb3<\x9b\x1f\xf53*|DHM4\xf9T\n\x18\xf5\xb7\x13\xd7\xb3\v\xe9\xb85\xdf/[\xe9\xa3\xb5\x1aE\xe9\xad\v]\xa9\x8dk\x00\x06\xb8*\x94A\xe9,\x93\xcf\x12\xfa\xbbk\xfd\x95\x15\x82\x94\xbe:K\x91sYRQ\xb7m\xf4\xa3\x85&\x8fF\r\'\xde\xe6\x039\a<\x92z\xe2\xb7\xf9d\x8a\xd3u\x82\xcc\x1a=\\\xb1GJ\xb2\xbe\xb2\xa2-\xc4\xaei\xe0\xbeP\xdf\xe0\xc6\x92yv2>V\x83&\xa2\x1a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xac\xf8M\xaeh\x91\x92\x8b\x12\x98\xc5fz\x18\xd0]\xca\x14\x1b\xd7\x18Z|\xda\x1d\xc4\xe3\xdc\x129!\xe2w^\xe7J\x93\xdf\x00\x00\x00\xeer_I\xaf\xc4\x99c1\x01\x1a\xc2\aa\x89\xc7\x9f\xf9\x98\xd6d\x86\x93\xf94\x8f\x8e\xb0\xf6\x84\xd5\xd0y8Y\xbc\xc1!y\x16\xe7\xc5\xedF\xad%\xdf[_\x01\x93\xd1\xf2^(8\x04e\xcd4\x98Z.\xcdD\vE\xa73\xb1\x8c\x9ey\t\xb5,\x97\x01\bo\xb2w\x16\b)\x95b\xbc\x84\xdfp\"\x82\xf3\x84<\xa1^\xd2dC\xfd\xb30SX\x9e\xcf\x9d\xfe\xfe!\xd1\x15\x15KG\xff\xe0\xd1\x0f\xcf3\x1e\xbe\x8a\x1f\xf2\xcb\x15%\x17d\x05p+\xde\xf8\x1d\xb5(\xbdE\x98\xb6D\x02t\xe9\xb0\f\xab\xf1/4\xf6\xd3#\'1\xd0\x19\xc7g@-?1\xf5%\x9eGx\xe4\xd4\xdb\xa81|8\x0f<\x80\xe5\x00') (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='*([]{,,\x00') (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000200)='*%^/*]{\xe6*$\\)\\\x00') 08:00:01 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200001}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x4, 0x70bd27, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x4000001) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f0000000740)={0x2, 0x9, 0x5, 0x0, 0x1f}) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f00000001c0)=""/214) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0xe01, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) ioctl$PTP_SYS_OFFSET(r1, 0x43403d05, &(0x7f0000000400)={0x1}) ioctl$TIOCMIWAIT(r1, 0x545c, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040), 0x106, 0x5}}, 0x20) 08:00:01 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) ioctl$SIOCX25GCALLUSERDATA(r0, 0x89e4, &(0x7f00000001c0)={0x65, "36ca74a92fc64934fc6caa93a87b5741a474c9e6a3a636d6251995ed670b533bcf19edf2f2c014d5288cd68af5d7062c45078c68b36941d3014a85a2443bcd79b40a08635e10e05f49805936cce8bd4c626faaf791b0ea86443eec641b81a44351ba3239dc3d093ff8a8c498bc82e4a5b74530cdc49be85a04b1b24c311fd9c8"}) (async) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000040)={0x0, r0}, 0x10) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) (async) setsockopt$CAN_RAW_ERR_FILTER(r1, 0x65, 0x2, &(0x7f0000000080)=0x7ff, 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x14, 0x1, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0xfe, 0x0}}}}, 0xa0) (async) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000400), 0x90000, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0), r2) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000380)={0x11, 0x10, 0xfa00, {&(0x7f0000000340)}}, 0x18) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:01 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='comm\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 08:00:01 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 08:00:01 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='comm\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 08:00:01 executing program 1: openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) ioctl$SIOCX25GCALLUSERDATA(r0, 0x89e4, &(0x7f00000001c0)={0x65, "36ca74a92fc64934fc6caa93a87b5741a474c9e6a3a636d6251995ed670b533bcf19edf2f2c014d5288cd68af5d7062c45078c68b36941d3014a85a2443bcd79b40a08635e10e05f49805936cce8bd4c626faaf791b0ea86443eec641b81a44351ba3239dc3d093ff8a8c498bc82e4a5b74530cdc49be85a04b1b24c311fd9c8"}) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000040)={0x0, r0}, 0x10) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) setsockopt$CAN_RAW_ERR_FILTER(r1, 0x65, 0x2, &(0x7f0000000080)=0x7ff, 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x14, 0x1, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0xfe, 0x0}}}}, 0xa0) openat$full(0xffffffffffffff9c, &(0x7f0000000400), 0x90000, 0x0) (async) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000400), 0x90000, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0), r2) (async) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0), r2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000380)={0x11, 0x10, 0xfa00, {&(0x7f0000000340)}}, 0x18) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000380)={0x11, 0x10, 0xfa00, {&(0x7f0000000340)}}, 0x18) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:01 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200001}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x4, 0x70bd27, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x4000001) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f0000000740)={0x2, 0x9, 0x5, 0x0, 0x1f}) (async) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f00000001c0)=""/214) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0xe01, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) ioctl$PTP_SYS_OFFSET(r1, 0x43403d05, &(0x7f0000000400)={0x1}) (async) ioctl$TIOCMIWAIT(r1, 0x545c, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040), 0x106, 0x5}}, 0x20) 08:00:01 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)={'tunl0\x00', &(0x7f0000000080)={'syztnl2\x00', 0x0, 0x1, 0x7, 0x3, 0x4, {{0x2f, 0x4, 0x0, 0x0, 0xbc, 0x64, 0x0, 0x3, 0x4, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, {[@rr={0x7, 0xb, 0xf0, [@empty, @multicast2]}, @cipso={0x86, 0x1f, 0x3, [{0x2, 0x11, "689c6e1e056038668a62808491e98e"}, {0x5, 0x8, "5b09348440de"}]}, @cipso={0x86, 0xd, 0x2, [{0x1, 0x7, "bed78d1f72"}]}, @timestamp_addr={0x44, 0x34, 0x12, 0x1, 0x9, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0xff}, {@rand_addr=0x64010102, 0x2}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8001}, {@local, 0x4fc4}, {@multicast2, 0x5}, {@private=0xa010102, 0x2}]}, @timestamp_prespec={0x44, 0x14, 0x5c, 0x3, 0x2, [{@rand_addr=0x64010101, 0x5}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}]}, @generic={0x94, 0xb, "639e49cb93b7bcb61d"}, @ra={0x94, 0x4}, @rr={0x7, 0x17, 0xef, [@multicast2, @local, @local, @multicast2, @multicast2]}]}}}}}) bind$can_raw(r0, &(0x7f0000000180)={0x1d, r1}, 0x10) 08:00:01 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='comm\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 08:00:01 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) [ 1783.202963][ T1757] FAULT_INJECTION: forcing a failure. [ 1783.202963][ T1757] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1783.216328][ T1757] CPU: 1 PID: 1757 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1783.226829][ T1757] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1783.236966][ T1757] Call Trace: [ 1783.240321][ T1757] [ 1783.243283][ T1757] dump_stack_lvl+0xda/0x130 [ 1783.247909][ T1757] dump_stack+0x15/0x20 [ 1783.252167][ T1757] should_fail_ex+0x21f/0x230 [ 1783.256869][ T1757] __should_fail_alloc_page+0xfd/0x110 [ 1783.262438][ T1757] __alloc_pages+0x108/0x340 [ 1783.267125][ T1757] vma_alloc_folio+0x6a3/0x8c0 [ 1783.271989][ T1757] shmem_get_folio_gfp+0x801/0x1200 [ 1783.277228][ T1757] shmem_write_begin+0xa6/0x1d0 [ 1783.282112][ T1757] generic_perform_write+0x1cf/0x410 [ 1783.287443][ T1757] ? shmem_write_begin+0x1d0/0x1d0 [ 1783.292655][ T1757] __generic_file_write_iter+0xa1/0x120 [ 1783.298317][ T1757] generic_file_write_iter+0x7d/0x1c0 [ 1783.303769][ T1757] vfs_write+0x4ab/0x7d0 [ 1783.308070][ T1757] ksys_write+0xeb/0x1a0 [ 1783.312406][ T1757] __x64_sys_write+0x42/0x50 [ 1783.317104][ T1757] do_syscall_64+0x41/0xc0 [ 1783.321594][ T1757] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1783.327526][ T1757] RIP: 0033:0x7f3d42967b29 [ 1783.331939][ T1757] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 08:00:01 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 73) 08:00:01 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) 08:00:01 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)={'tunl0\x00', &(0x7f0000000080)={'syztnl2\x00', 0x0, 0x1, 0x7, 0x3, 0x4, {{0x2f, 0x4, 0x0, 0x0, 0xbc, 0x64, 0x0, 0x3, 0x4, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, {[@rr={0x7, 0xb, 0xf0, [@empty, @multicast2]}, @cipso={0x86, 0x1f, 0x3, [{0x2, 0x11, "689c6e1e056038668a62808491e98e"}, {0x5, 0x8, "5b09348440de"}]}, @cipso={0x86, 0xd, 0x2, [{0x1, 0x7, "bed78d1f72"}]}, @timestamp_addr={0x44, 0x34, 0x12, 0x1, 0x9, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0xff}, {@rand_addr=0x64010102, 0x2}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8001}, {@local, 0x4fc4}, {@multicast2, 0x5}, {@private=0xa010102, 0x2}]}, @timestamp_prespec={0x44, 0x14, 0x5c, 0x3, 0x2, [{@rand_addr=0x64010101, 0x5}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}]}, @generic={0x94, 0xb, "639e49cb93b7bcb61d"}, @ra={0x94, 0x4}, @rr={0x7, 0x17, 0xef, [@multicast2, @local, @local, @multicast2, @multicast2]}]}}}}}) bind$can_raw(r0, &(0x7f0000000180)={0x1d, r1}, 0x10) 08:00:01 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) ioctl$TIOCNOTTY(r0, 0x5422) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x3, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) socket$phonet(0x23, 0x2, 0x1) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0xfe82, 0xfa00, {0x0}}, 0x18) 08:00:01 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200001}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x4, 0x70bd27, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x4000001) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f0000000740)={0x2, 0x9, 0x5, 0x0, 0x1f}) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) (async) ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f00000001c0)=""/214) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0xe01, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) ioctl$PTP_SYS_OFFSET(r1, 0x43403d05, &(0x7f0000000400)={0x1}) (async) ioctl$TIOCMIWAIT(r1, 0x545c, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040), 0x106, 0x5}}, 0x20) 08:00:01 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x40030000000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) [ 1783.351572][ T1757] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1783.360005][ T1757] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1783.367987][ T1757] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1783.375969][ T1757] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1783.383935][ T1757] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1783.391936][ T1757] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1783.399911][ T1757] 08:00:01 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) 08:00:01 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) ioctl$TIOCNOTTY(r0, 0x5422) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x3, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) socket$phonet(0x23, 0x2, 0x1) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0xfe82, 0xfa00, {0x0}}, 0x18) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) ioctl$TIOCNOTTY(r0, 0x5422) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x3, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) socket$phonet(0x23, 0x2, 0x1) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0xfe82, 0xfa00, {0x0}}, 0x18) (async) 08:00:01 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) (async) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)={'tunl0\x00', &(0x7f0000000080)={'syztnl2\x00', 0x0, 0x1, 0x7, 0x3, 0x4, {{0x2f, 0x4, 0x0, 0x0, 0xbc, 0x64, 0x0, 0x3, 0x4, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, {[@rr={0x7, 0xb, 0xf0, [@empty, @multicast2]}, @cipso={0x86, 0x1f, 0x3, [{0x2, 0x11, "689c6e1e056038668a62808491e98e"}, {0x5, 0x8, "5b09348440de"}]}, @cipso={0x86, 0xd, 0x2, [{0x1, 0x7, "bed78d1f72"}]}, @timestamp_addr={0x44, 0x34, 0x12, 0x1, 0x9, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0xff}, {@rand_addr=0x64010102, 0x2}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8001}, {@local, 0x4fc4}, {@multicast2, 0x5}, {@private=0xa010102, 0x2}]}, @timestamp_prespec={0x44, 0x14, 0x5c, 0x3, 0x2, [{@rand_addr=0x64010101, 0x5}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}]}, @generic={0x94, 0xb, "639e49cb93b7bcb61d"}, @ra={0x94, 0x4}, @rr={0x7, 0x17, 0xef, [@multicast2, @local, @local, @multicast2, @multicast2]}]}}}}}) bind$can_raw(r0, &(0x7f0000000180)={0x1d, r1}, 0x10) 08:00:01 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') syz_genetlink_get_family_id$smc(&(0x7f0000000000), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r1, 0x200, 0x70bd2c, 0x25dfdbfb, {{}, {}, {0xc, 0x14, 'syz1\x00'}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x20008000}, 0x50) 08:00:01 executing program 0: r0 = syz_open_procfs(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) [ 1783.443854][ T1784] FAULT_INJECTION: forcing a failure. [ 1783.443854][ T1784] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1783.457115][ T1784] CPU: 1 PID: 1784 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1783.467519][ T1784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1783.477869][ T1784] Call Trace: [ 1783.481166][ T1784] [ 1783.484114][ T1784] dump_stack_lvl+0xda/0x130 [ 1783.488806][ T1784] dump_stack+0x15/0x20 08:00:01 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) [ 1783.493041][ T1784] should_fail_ex+0x21f/0x230 [ 1783.497794][ T1784] should_fail+0xb/0x10 [ 1783.501988][ T1784] should_fail_usercopy+0x1a/0x20 [ 1783.507045][ T1784] copy_page_from_iter_atomic+0x22d/0xcf0 [ 1783.512870][ T1784] ? folio_test_hugetlb+0x3a/0x70 [ 1783.518026][ T1784] ? shmem_write_begin+0x12a/0x1d0 [ 1783.523192][ T1784] generic_perform_write+0x212/0x410 [ 1783.528601][ T1784] ? shmem_write_begin+0x1d0/0x1d0 [ 1783.533745][ T1784] __generic_file_write_iter+0xa1/0x120 [ 1783.539378][ T1784] generic_file_write_iter+0x7d/0x1c0 [ 1783.544803][ T1784] vfs_write+0x4ab/0x7d0 [ 1783.549179][ T1784] ksys_write+0xeb/0x1a0 [ 1783.553471][ T1784] __x64_sys_write+0x42/0x50 [ 1783.558101][ T1784] do_syscall_64+0x41/0xc0 [ 1783.562561][ T1784] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1783.568528][ T1784] RIP: 0033:0x7f3d42967b29 [ 1783.573029][ T1784] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1783.592678][ T1784] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1783.601171][ T1784] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1783.609404][ T1784] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1783.617516][ T1784] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1783.625516][ T1784] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1783.633568][ T1784] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1783.641640][ T1784] 08:00:01 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 74) 08:00:01 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') syz_genetlink_get_family_id$smc(&(0x7f0000000000), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r1, 0x200, 0x70bd2c, 0x25dfdbfb, {{}, {}, {0xc, 0x14, 'syz1\x00'}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x20008000}, 0x50) 08:00:01 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x2}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:01 executing program 0: r0 = syz_open_procfs(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 08:00:01 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x300000000000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 08:00:01 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) ioctl$TIOCNOTTY(r0, 0x5422) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x3, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) socket$phonet(0x23, 0x2, 0x1) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0xfe82, 0xfa00, {0x0}}, 0x18) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) ioctl$TIOCNOTTY(r0, 0x5422) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x3, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) socket$phonet(0x23, 0x2, 0x1) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0xfe82, 0xfa00, {0x0}}, 0x18) (async) 08:00:01 executing program 0: r0 = syz_open_procfs(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 08:00:01 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') (async) syz_genetlink_get_family_id$smc(&(0x7f0000000000), 0xffffffffffffffff) (async) r0 = socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r1, 0x200, 0x70bd2c, 0x25dfdbfb, {{}, {}, {0xc, 0x14, 'syz1\x00'}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x20008000}, 0x50) 08:00:01 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) (async) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) (async) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x2}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) [ 1783.789301][ T1827] FAULT_INJECTION: forcing a failure. [ 1783.789301][ T1827] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1783.802764][ T1827] CPU: 0 PID: 1827 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1783.813292][ T1827] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1783.823505][ T1827] Call Trace: [ 1783.826970][ T1827] [ 1783.829920][ T1827] dump_stack_lvl+0xda/0x130 [ 1783.834689][ T1827] dump_stack+0x15/0x20 08:00:01 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r0, 0xe0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x8, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000002c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000300), &(0x7f0000000340), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:01 executing program 0: syz_open_procfs(0x0, &(0x7f0000000340)='comm\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) 08:00:01 executing program 4: pipe(&(0x7f0000000140)) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x2}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) [ 1783.838916][ T1827] should_fail_ex+0x21f/0x230 [ 1783.843693][ T1827] __should_fail_alloc_page+0xfd/0x110 [ 1783.849354][ T1827] __alloc_pages+0x108/0x340 [ 1783.854015][ T1827] vma_alloc_folio+0x6a3/0x8c0 [ 1783.858821][ T1827] shmem_get_folio_gfp+0x801/0x1200 [ 1783.864102][ T1827] shmem_write_begin+0xa6/0x1d0 [ 1783.869024][ T1827] generic_perform_write+0x1cf/0x410 [ 1783.874379][ T1827] ? shmem_write_begin+0x1d0/0x1d0 [ 1783.879680][ T1827] __generic_file_write_iter+0xa1/0x120 [ 1783.885359][ T1827] generic_file_write_iter+0x7d/0x1c0 [ 1783.890940][ T1827] vfs_write+0x4ab/0x7d0 [ 1783.895260][ T1827] ksys_write+0xeb/0x1a0 [ 1783.899518][ T1827] __x64_sys_write+0x42/0x50 [ 1783.904122][ T1827] do_syscall_64+0x41/0xc0 [ 1783.908551][ T1827] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1783.914460][ T1827] RIP: 0033:0x7f3d42967b29 [ 1783.918961][ T1827] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1783.938860][ T1827] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1783.947546][ T1827] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1783.955603][ T1827] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1783.963591][ T1827] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1783.971622][ T1827] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1783.979594][ T1827] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 08:00:02 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 75) 08:00:02 executing program 5: ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000000000)={0x1c5, 0x8008, &(0x7f0000000080)="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"}) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000480), 0x84000, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) 08:00:02 executing program 4: ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f00000001c0)="a7b16d493f6ca4c5e3ce2655894e8393f83175a994c53f0d32c8892c287bd0a5f2ef1b1f4253c116053c5117b21a32a4055dc87f038a9d22b0e3ea2b1f72b516faceb779093f81ab66b451de95071d9af5e9338bcd2f9d9f2244c9bfbec13b05a4fd4a83099f8f0278eeff193aead5fc7450e71b394b1f8c1e52e196d98a0b4588808c91b1350a4a0e4a2a599fbf55b30c81180bad9d13c94de57d33b53b5fa0") r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x4, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xfffffea8) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:02 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r0, 0xe0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x8, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000002c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000300), &(0x7f0000000340), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:02 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x700000000000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 08:00:02 executing program 0: syz_open_procfs(0x0, &(0x7f0000000340)='comm\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) 08:00:02 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r0, 0xe0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x8, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000002c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000300), &(0x7f0000000340), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async, rerun: 32) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (rerun: 32) [ 1783.987569][ T1827] 08:00:02 executing program 0: syz_open_procfs(0x0, &(0x7f0000000340)='comm\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) 08:00:02 executing program 5: ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000000000)={0x1c5, 0x8008, &(0x7f0000000080)="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"}) (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') (async) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000480), 0x84000, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) 08:00:02 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) r1 = getpgid(0xffffffffffffffff) syz_open_procfs(r1, &(0x7f0000000280)='net/igmp\x00') pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$PTP_SYS_OFFSET_PRECISE(r2, 0xc0403d08, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:02 executing program 0: prctl$PR_SET_NAME(0x39, &(0x7f0000000040)='/dev/bsg\x00') [ 1784.043031][ T1858] FAULT_INJECTION: forcing a failure. [ 1784.043031][ T1858] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1784.056253][ T1858] CPU: 0 PID: 1858 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1784.066722][ T1858] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1784.076799][ T1858] Call Trace: [ 1784.080098][ T1858] [ 1784.083045][ T1858] dump_stack_lvl+0xda/0x130 [ 1784.087747][ T1858] dump_stack+0x15/0x20 08:00:02 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) [ 1784.091936][ T1858] should_fail_ex+0x21f/0x230 [ 1784.096643][ T1858] should_fail+0xb/0x10 [ 1784.100988][ T1858] should_fail_usercopy+0x1a/0x20 [ 1784.106102][ T1858] copy_page_from_iter_atomic+0x22d/0xcf0 [ 1784.111939][ T1858] ? folio_test_hugetlb+0x3a/0x70 [ 1784.117015][ T1858] ? shmem_write_begin+0x12a/0x1d0 [ 1784.122182][ T1858] generic_perform_write+0x212/0x410 [ 1784.128757][ T1858] ? shmem_write_begin+0x1d0/0x1d0 [ 1784.133958][ T1858] __generic_file_write_iter+0xa1/0x120 [ 1784.139601][ T1858] generic_file_write_iter+0x7d/0x1c0 [ 1784.145036][ T1858] vfs_write+0x4ab/0x7d0 [ 1784.149468][ T1858] ksys_write+0xeb/0x1a0 [ 1784.153763][ T1858] __x64_sys_write+0x42/0x50 [ 1784.158450][ T1858] do_syscall_64+0x41/0xc0 [ 1784.162899][ T1858] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1784.168844][ T1858] RIP: 0033:0x7f3d42967b29 [ 1784.173282][ T1858] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1784.192920][ T1858] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1784.201383][ T1858] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1784.209370][ T1858] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1784.217363][ T1858] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1784.225391][ T1858] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1784.233399][ T1858] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1784.241380][ T1858] 08:00:02 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 76) 08:00:02 executing program 0: prctl$PR_SET_NAME(0x39, &(0x7f0000000040)='/dev/bsg\x00') 08:00:02 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) r1 = getpgid(0xffffffffffffffff) syz_open_procfs(r1, &(0x7f0000000280)='net/igmp\x00') (async) syz_open_procfs(r1, &(0x7f0000000280)='net/igmp\x00') pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$PTP_SYS_OFFSET_PRECISE(r2, 0xc0403d08, &(0x7f0000000080)) (async) ioctl$PTP_SYS_OFFSET_PRECISE(r2, 0xc0403d08, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:02 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 08:00:02 executing program 5: ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000000000)={0x1c5, 0x8008, &(0x7f0000000080)="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"}) (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') (async) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000480), 0x84000, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) 08:00:02 executing program 4: ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f00000001c0)="a7b16d493f6ca4c5e3ce2655894e8393f83175a994c53f0d32c8892c287bd0a5f2ef1b1f4253c116053c5117b21a32a4055dc87f038a9d22b0e3ea2b1f72b516faceb779093f81ab66b451de95071d9af5e9338bcd2f9d9f2244c9bfbec13b05a4fd4a83099f8f0278eeff193aead5fc7450e71b394b1f8c1e52e196d98a0b4588808c91b1350a4a0e4a2a599fbf55b30c81180bad9d13c94de57d33b53b5fa0") (async) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x4, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xfffffea8) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:02 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/bsg\x00') 08:00:02 executing program 1: openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) r1 = getpgid(0xffffffffffffffff) syz_open_procfs(r1, &(0x7f0000000280)='net/igmp\x00') pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$PTP_SYS_OFFSET_PRECISE(r2, 0xc0403d08, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:02 executing program 0: prctl$PR_SET_NAME(0x39, &(0x7f0000000040)='/dev/bsg\x00') 08:00:02 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) ioctl$TIOCL_BLANKSCREEN(r1, 0x541c, &(0x7f0000000040)) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:02 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/bsg\x00') prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/bsg\x00') (async) [ 1784.396169][ T1887] FAULT_INJECTION: forcing a failure. [ 1784.396169][ T1887] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1784.409544][ T1887] CPU: 0 PID: 1887 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1784.419929][ T1887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1784.430005][ T1887] Call Trace: [ 1784.433303][ T1887] [ 1784.436260][ T1887] dump_stack_lvl+0xda/0x130 [ 1784.440895][ T1887] dump_stack+0x15/0x20 08:00:02 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/bsg\x00') [ 1784.445083][ T1887] should_fail_ex+0x21f/0x230 [ 1784.449845][ T1887] __should_fail_alloc_page+0xfd/0x110 [ 1784.455343][ T1887] __alloc_pages+0x108/0x340 [ 1784.459978][ T1887] vma_alloc_folio+0x6a3/0x8c0 [ 1784.464836][ T1887] shmem_get_folio_gfp+0x801/0x1200 [ 1784.470089][ T1887] shmem_write_begin+0xa6/0x1d0 [ 1784.475051][ T1887] generic_perform_write+0x1cf/0x410 [ 1784.480465][ T1887] ? shmem_write_begin+0x1d0/0x1d0 [ 1784.485616][ T1887] __generic_file_write_iter+0xa1/0x120 [ 1784.491268][ T1887] generic_file_write_iter+0x7d/0x1c0 [ 1784.496703][ T1887] vfs_write+0x4ab/0x7d0 [ 1784.501141][ T1887] ksys_write+0xeb/0x1a0 [ 1784.505431][ T1887] __x64_sys_write+0x42/0x50 [ 1784.510113][ T1887] do_syscall_64+0x41/0xc0 [ 1784.514562][ T1887] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1784.520659][ T1887] RIP: 0033:0x7f3d42967b29 [ 1784.525116][ T1887] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 08:00:02 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 77) 08:00:02 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async, rerun: 64) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 64) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) ioctl$TIOCL_BLANKSCREEN(r1, 0x541c, &(0x7f0000000040)) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:02 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x6400000000000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 08:00:02 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='\"D\xa0\xe9?\xbc\"U\x1dO\x04\x91\t\x800\x855/\r\xe5\xd3\xc6\x83e\xd2\xb0\xbbJ\x88 \x9d9^\xc7\xfb\xc2i\xb4h\xfck*\xa8_7G/\xa8,-\xe1v\x92.\xb1FH\x93;=\xd9\t\x13\xf6\x92H\x17\x8f\xfa\x16M\xb4X\x13\xbb\xc1\xa4\x0f\xcc\x82x `\xa6\x1b\x98') 08:00:02 executing program 0: prctl$PR_SET_NAME(0x39, 0x0) [ 1784.545156][ T1887] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1784.553600][ T1887] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1784.561591][ T1887] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1784.569587][ T1887] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1784.577680][ T1887] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1784.585756][ T1887] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1784.593764][ T1887] [ 1784.635667][ T1915] FAULT_INJECTION: forcing a failure. [ 1784.635667][ T1915] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1784.648981][ T1915] CPU: 0 PID: 1915 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1784.659348][ T1915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1784.669464][ T1915] Call Trace: [ 1784.672769][ T1915] [ 1784.675714][ T1915] dump_stack_lvl+0xda/0x130 [ 1784.680428][ T1915] dump_stack+0x15/0x20 08:00:02 executing program 4: ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f00000001c0)="a7b16d493f6ca4c5e3ce2655894e8393f83175a994c53f0d32c8892c287bd0a5f2ef1b1f4253c116053c5117b21a32a4055dc87f038a9d22b0e3ea2b1f72b516faceb779093f81ab66b451de95071d9af5e9338bcd2f9d9f2244c9bfbec13b05a4fd4a83099f8f0278eeff193aead5fc7450e71b394b1f8c1e52e196d98a0b4588808c91b1350a4a0e4a2a599fbf55b30c81180bad9d13c94de57d33b53b5fa0") r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x4, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xfffffea8) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:02 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='\"D\xa0\xe9?\xbc\"U\x1dO\x04\x91\t\x800\x855/\r\xe5\xd3\xc6\x83e\xd2\xb0\xbbJ\x88 \x9d9^\xc7\xfb\xc2i\xb4h\xfck*\xa8_7G/\xa8,-\xe1v\x92.\xb1FH\x93;=\xd9\t\x13\xf6\x92H\x17\x8f\xfa\x16M\xb4X\x13\xbb\xc1\xa4\x0f\xcc\x82x `\xa6\x1b\x98') 08:00:02 executing program 0: prctl$PR_SET_NAME(0x39, 0x0) 08:00:02 executing program 1: openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) ioctl$TIOCL_BLANKSCREEN(r1, 0x541c, &(0x7f0000000040)) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:02 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0xdb06000000000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) [ 1784.684627][ T1915] should_fail_ex+0x21f/0x230 [ 1784.689440][ T1915] should_fail+0xb/0x10 [ 1784.693615][ T1915] should_fail_usercopy+0x1a/0x20 [ 1784.698718][ T1915] copy_page_from_iter_atomic+0x22d/0xcf0 [ 1784.704553][ T1915] ? folio_test_hugetlb+0x3a/0x70 [ 1784.709615][ T1915] ? shmem_write_begin+0x12a/0x1d0 [ 1784.714837][ T1915] generic_perform_write+0x212/0x410 [ 1784.720233][ T1915] ? shmem_write_begin+0x1d0/0x1d0 [ 1784.725453][ T1915] __generic_file_write_iter+0xa1/0x120 08:00:02 executing program 0: prctl$PR_SET_NAME(0x39, 0x0) [ 1784.731044][ T1915] generic_file_write_iter+0x7d/0x1c0 [ 1784.736453][ T1915] vfs_write+0x4ab/0x7d0 [ 1784.741094][ T1915] ksys_write+0xeb/0x1a0 [ 1784.745454][ T1915] __x64_sys_write+0x42/0x50 [ 1784.750100][ T1915] do_syscall_64+0x41/0xc0 [ 1784.754547][ T1915] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1784.760475][ T1915] RIP: 0033:0x7f3d42967b29 [ 1784.764909][ T1915] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 08:00:02 executing program 0: prctl$PR_SET_NAME(0x39, 0x0) [ 1784.784797][ T1915] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1784.793312][ T1915] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1784.801341][ T1915] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1784.809394][ T1915] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1784.817434][ T1915] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1784.825444][ T1915] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1784.833446][ T1915] 08:00:02 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 78) 08:00:02 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0xfefdffff00000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 08:00:02 executing program 0: prctl$PR_SET_NAME(0x39, 0x0) 08:00:02 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='\"D\xa0\xe9?\xbc\"U\x1dO\x04\x91\t\x800\x855/\r\xe5\xd3\xc6\x83e\xd2\xb0\xbbJ\x88 \x9d9^\xc7\xfb\xc2i\xb4h\xfck*\xa8_7G/\xa8,-\xe1v\x92.\xb1FH\x93;=\xd9\t\x13\xf6\x92H\x17\x8f\xfa\x16M\xb4X\x13\xbb\xc1\xa4\x0f\xcc\x82x `\xa6\x1b\x98') 08:00:02 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x4e22, 0x4007, @mcast2, 0x8000}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) gettid() 08:00:02 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x551701, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x17, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x1, r2, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"698a8d1eea4330070011b53c00f60002"}, 0x0, 0xb8cb}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:03 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') ioctl$TIOCSIG(0xffffffffffffffff, 0x40045436, 0x11) 08:00:03 executing program 0: prctl$PR_SET_NAME(0x39, 0x0) [ 1785.013418][ T1945] FAULT_INJECTION: forcing a failure. [ 1785.013418][ T1945] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1785.026895][ T1945] CPU: 1 PID: 1945 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1785.037284][ T1945] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1785.047366][ T1945] Call Trace: [ 1785.050661][ T1945] [ 1785.053615][ T1945] dump_stack_lvl+0xda/0x130 [ 1785.058289][ T1945] dump_stack+0x15/0x20 08:00:03 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x4e22, 0x4007, @mcast2, 0x8000}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) gettid() 08:00:03 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x551701, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x17, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x1, r2, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"698a8d1eea4330070011b53c00f60002"}, 0x0, 0xb8cb}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:03 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') ioctl$TIOCSIG(0xffffffffffffffff, 0x40045436, 0x11) 08:00:03 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) [ 1785.062481][ T1945] should_fail_ex+0x21f/0x230 [ 1785.067241][ T1945] __should_fail_alloc_page+0xfd/0x110 [ 1785.072767][ T1945] __alloc_pages+0x108/0x340 [ 1785.077399][ T1945] vma_alloc_folio+0x6a3/0x8c0 [ 1785.082214][ T1945] shmem_get_folio_gfp+0x801/0x1200 [ 1785.087475][ T1945] shmem_write_begin+0xa6/0x1d0 [ 1785.092370][ T1945] generic_perform_write+0x1cf/0x410 [ 1785.097771][ T1945] ? shmem_write_begin+0x1d0/0x1d0 [ 1785.102993][ T1945] __generic_file_write_iter+0xa1/0x120 [ 1785.108579][ T1945] generic_file_write_iter+0x7d/0x1c0 [ 1785.114020][ T1945] vfs_write+0x4ab/0x7d0 [ 1785.118342][ T1945] ksys_write+0xeb/0x1a0 [ 1785.122657][ T1945] __x64_sys_write+0x42/0x50 [ 1785.127293][ T1945] do_syscall_64+0x41/0xc0 [ 1785.131794][ T1945] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1785.137723][ T1945] RIP: 0033:0x7f3d42967b29 [ 1785.142177][ T1945] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 08:00:03 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 79) 08:00:03 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (async) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x551701, 0x0) (async) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x551701, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x17, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x1, r2, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"698a8d1eea4330070011b53c00f60002"}, 0x0, 0xb8cb}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:03 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x4e22, 0x4007, @mcast2, 0x8000}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) gettid() (async) gettid() 08:00:03 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') ioctl$TIOCSIG(0xffffffffffffffff, 0x40045436, 0x11) 08:00:03 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 08:00:03 executing program 0: prctl$PR_SET_NAME(0x39, 0x0) 08:00:03 executing program 5: ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f0000000000)) 08:00:03 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000380), 0x80000, 0x0) ioctl$RNDGETENTCNT(r1, 0x80045200, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x3, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x4e22, @loopback}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x1, 0xffffffffffffffff, 0xc7528163b656d05e, 0x0, @in={0x2, 0x4e21, @local}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x16, 0x9b, 0xfa00, {&(0x7f0000000340)={0xffffffffffffffff}, 0x1, 0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x8, 0x100, {"6a289fb4624a2425d480a885e7015314"}, 0x3, 0x2b7b32c4, 0x10001}}}, 0xa0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r3) ioctl$RNDADDENTROPY(r3, 0x40085203, &(0x7f00000003c0)={0xffff, 0xd8, "75b39667c70ed021246fd9e04b0a18be10b6be4b1d52470c4f31ec29ad953278d76d3576f674e55deb102cea4bd83875c7439801ccb518a2d8e9781fa6a676d304799e4951567adc326b3193be3c499c38068c754fdad54944f45a6bb7721bb2f3921c609577b910bc7a1a8060505d5e4058f15c3fecfe5c6e537b3ab211a3330127c6389df4f509b7ee57c9ec7562716b928ca875b0978fc14f987874a6e1df0269d27735e6398a468ef955d6e8ea27f885e5ba91d70a2abd1535cd5eb0bd49f35352ab33d8eb8c1ac1ab5512f6335212a91453a7ad13ae"}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x7ac669cc432906d9, 0xfa00, {0x0, r2}}, 0x18) [ 1785.161858][ T1945] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1785.170425][ T1945] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1785.178433][ T1945] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1785.186428][ T1945] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1785.194429][ T1945] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1785.202603][ T1945] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1785.210664][ T1945] 08:00:03 executing program 0: prctl$PR_SET_NAME(0x39, 0x0) 08:00:03 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) read$ptp(r2, &(0x7f0000000040)=""/9, 0x9) sendmsg$DEVLINK_CMD_PORT_GET(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)={0xdc, r3, 0x100, 0x70bd25, 0x25dfdbff, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}}]}, 0xdc}}, 0x42a202c20f2dbb36) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r4, &(0x7f0000000440)={0x11, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:03 executing program 5: ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f0000000000)) [ 1785.246927][ T1973] FAULT_INJECTION: forcing a failure. [ 1785.246927][ T1973] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1785.260180][ T1973] CPU: 1 PID: 1973 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1785.270630][ T1973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1785.280706][ T1973] Call Trace: [ 1785.284059][ T1973] [ 1785.287046][ T1973] dump_stack_lvl+0xda/0x130 [ 1785.291664][ T1973] dump_stack+0x15/0x20 08:00:03 executing program 0: prctl$PR_SET_NAME(0x39, 0x0) [ 1785.296011][ T1973] should_fail_ex+0x21f/0x230 [ 1785.300721][ T1973] should_fail+0xb/0x10 [ 1785.304904][ T1973] should_fail_usercopy+0x1a/0x20 [ 1785.309977][ T1973] copy_page_from_iter_atomic+0x22d/0xcf0 [ 1785.315768][ T1973] ? folio_test_hugetlb+0x3a/0x70 [ 1785.320830][ T1973] ? shmem_write_begin+0x12a/0x1d0 [ 1785.325980][ T1973] generic_perform_write+0x212/0x410 [ 1785.331373][ T1973] ? shmem_write_begin+0x1d0/0x1d0 [ 1785.336518][ T1973] __generic_file_write_iter+0xa1/0x120 [ 1785.342131][ T1973] generic_file_write_iter+0x7d/0x1c0 [ 1785.347544][ T1973] vfs_write+0x4ab/0x7d0 [ 1785.351838][ T1973] ksys_write+0xeb/0x1a0 [ 1785.356175][ T1973] __x64_sys_write+0x42/0x50 [ 1785.360829][ T1973] do_syscall_64+0x41/0xc0 [ 1785.365294][ T1973] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1785.371269][ T1973] RIP: 0033:0x7f3d42967b29 [ 1785.375696][ T1973] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1785.395408][ T1973] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1785.403821][ T1973] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1785.411807][ T1973] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1785.419782][ T1973] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1785.427753][ T1973] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1785.435739][ T1973] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1785.443838][ T1973] 08:00:03 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 80) 08:00:03 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000380), 0x80000, 0x0) ioctl$RNDGETENTCNT(r1, 0x80045200, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x3, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x4e22, @loopback}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x1, 0xffffffffffffffff, 0xc7528163b656d05e, 0x0, @in={0x2, 0x4e21, @local}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x16, 0x9b, 0xfa00, {&(0x7f0000000340), 0x1, 0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x8, 0x100, {"6a289fb4624a2425d480a885e7015314"}, 0x3, 0x2b7b32c4, 0x10001}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x16, 0x9b, 0xfa00, {&(0x7f0000000340)={0xffffffffffffffff}, 0x1, 0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x8, 0x100, {"6a289fb4624a2425d480a885e7015314"}, 0x3, 0x2b7b32c4, 0x10001}}}, 0xa0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r3) ioctl$RNDADDENTROPY(r3, 0x40085203, &(0x7f00000003c0)={0xffff, 0xd8, "75b39667c70ed021246fd9e04b0a18be10b6be4b1d52470c4f31ec29ad953278d76d3576f674e55deb102cea4bd83875c7439801ccb518a2d8e9781fa6a676d304799e4951567adc326b3193be3c499c38068c754fdad54944f45a6bb7721bb2f3921c609577b910bc7a1a8060505d5e4058f15c3fecfe5c6e537b3ab211a3330127c6389df4f509b7ee57c9ec7562716b928ca875b0978fc14f987874a6e1df0269d27735e6398a468ef955d6e8ea27f885e5ba91d70a2abd1535cd5eb0bd49f35352ab33d8eb8c1ac1ab5512f6335212a91453a7ad13ae"}) (async) ioctl$RNDADDENTROPY(r3, 0x40085203, &(0x7f00000003c0)={0xffff, 0xd8, "75b39667c70ed021246fd9e04b0a18be10b6be4b1d52470c4f31ec29ad953278d76d3576f674e55deb102cea4bd83875c7439801ccb518a2d8e9781fa6a676d304799e4951567adc326b3193be3c499c38068c754fdad54944f45a6bb7721bb2f3921c609577b910bc7a1a8060505d5e4058f15c3fecfe5c6e537b3ab211a3330127c6389df4f509b7ee57c9ec7562716b928ca875b0978fc14f987874a6e1df0269d27735e6398a468ef955d6e8ea27f885e5ba91d70a2abd1535cd5eb0bd49f35352ab33d8eb8c1ac1ab5512f6335212a91453a7ad13ae"}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x7ac669cc432906d9, 0xfa00, {0x0, r2}}, 0x18) 08:00:03 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 08:00:03 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) read$ptp(r2, &(0x7f0000000040)=""/9, 0x9) sendmsg$DEVLINK_CMD_PORT_GET(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)={0xdc, r3, 0x100, 0x70bd25, 0x25dfdbff, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}}]}, 0xdc}}, 0x42a202c20f2dbb36) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r4) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r4, &(0x7f0000000440)={0x11, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:03 executing program 5: ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f0000000000)) 08:00:03 executing program 0: prctl$PR_SET_NAME(0x38, &(0x7f0000000040)='/dev/bsg\x00') 08:00:03 executing program 0: prctl$PR_SET_NAME(0x38, &(0x7f0000000040)='/dev/bsg\x00') 08:00:03 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000180)='/8%v/\x85sg\x00\xa5Y\xdb@\xd6J\xc7\x15\x00\x00\xfc\xc2Qbu\f\x9a\x19\xbb\v\x0e\xe6e\t\xd9\xaa\xb0\x1f`\xea\xe2\x98\xae\'9=\xb5]T\xd4e@\x8d\xfe)\x8c\xc3\x8ei\xdb\x17\xd2\xf7\x96\xc6\xda\xccs\xd7\xf4a\xe4]\f\x8a\x1eo\x80:\x00\x9b\x96\xf4\x9aO\x7f\xae\x91\x89t\xb6\x88I\x9f\x1f\xaf\xc6\xcdD\xfb\xae\x99\xefW/\x1c\x89\xc2\x0e\x01\"8\xbf\x8a\xddS\xfb\x15\xe1\x118?gU\xcd\xe4\x8c\'\xc5}\x8bZ\x87\x1f\xe4\xf0\xd9\x87\n\xa6\xda\xf5\x044>\xf5\x8a\xab\xd8\xce\xfa\xebCD\xebJ\x81\xb9la9\xe3\xfe>\xceU\x97\xb4l>\xcfA\xe8&f\xb3\xb7\"\x8f\xa9\xb99/-CG\xe1\\xE\x89\xd4\xd4\xdc\xcbK\xc0\xf0\x13\xe7kR\x8b\x11\x02@3C\x97\xb1\xb0\xd7\xbf\xe7F\xdewm\xd6\xda%\xe8\xe5\xa6\a\x0fg\xceQuJ>\xe4{i\xd0\x9c') 08:00:03 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) read$ptp(r2, &(0x7f0000000040)=""/9, 0x9) sendmsg$DEVLINK_CMD_PORT_GET(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)={0xdc, r3, 0x100, 0x70bd25, 0x25dfdbff, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}}]}, 0xdc}}, 0x42a202c20f2dbb36) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r4, &(0x7f0000000440)={0x11, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) pipe(&(0x7f0000000140)) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) (async) read$ptp(r2, &(0x7f0000000040)=""/9, 0x9) (async) sendmsg$DEVLINK_CMD_PORT_GET(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)={0xdc, r3, 0x100, 0x70bd25, 0x25dfdbff, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}}]}, 0xdc}}, 0x42a202c20f2dbb36) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) pipe(&(0x7f0000000140)) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r4) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r4, &(0x7f0000000440)={0x11, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) 08:00:03 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000380), 0x80000, 0x0) ioctl$RNDGETENTCNT(r1, 0x80045200, &(0x7f0000000080)) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x3, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x4e22, @loopback}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x1, 0xffffffffffffffff, 0xc7528163b656d05e, 0x0, @in={0x2, 0x4e21, @local}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x16, 0x9b, 0xfa00, {&(0x7f0000000340)={0xffffffffffffffff}, 0x1, 0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x8, 0x100, {"6a289fb4624a2425d480a885e7015314"}, 0x3, 0x2b7b32c4, 0x10001}}}, 0xa0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r3) ioctl$RNDADDENTROPY(r3, 0x40085203, &(0x7f00000003c0)={0xffff, 0xd8, "75b39667c70ed021246fd9e04b0a18be10b6be4b1d52470c4f31ec29ad953278d76d3576f674e55deb102cea4bd83875c7439801ccb518a2d8e9781fa6a676d304799e4951567adc326b3193be3c499c38068c754fdad54944f45a6bb7721bb2f3921c609577b910bc7a1a8060505d5e4058f15c3fecfe5c6e537b3ab211a3330127c6389df4f509b7ee57c9ec7562716b928ca875b0978fc14f987874a6e1df0269d27735e6398a468ef955d6e8ea27f885e5ba91d70a2abd1535cd5eb0bd49f35352ab33d8eb8c1ac1ab5512f6335212a91453a7ad13ae"}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x7ac669cc432906d9, 0xfa00, {0x0, r2}}, 0x18) 08:00:03 executing program 0: prctl$PR_SET_NAME(0x38, &(0x7f0000000040)='/dev/bsg\x00') 08:00:03 executing program 0: prctl$PR_SET_NAME(0x38, 0x0) [ 1785.610684][ T2007] FAULT_INJECTION: forcing a failure. [ 1785.610684][ T2007] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1785.624027][ T2007] CPU: 1 PID: 2007 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1785.634389][ T2007] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1785.644478][ T2007] Call Trace: [ 1785.647772][ T2007] [ 1785.650808][ T2007] dump_stack_lvl+0xda/0x130 [ 1785.655439][ T2007] dump_stack+0x15/0x20 [ 1785.659753][ T2007] should_fail_ex+0x21f/0x230 [ 1785.664560][ T2007] __should_fail_alloc_page+0xfd/0x110 [ 1785.670068][ T2007] __alloc_pages+0x108/0x340 [ 1785.674696][ T2007] vma_alloc_folio+0x6a3/0x8c0 [ 1785.679513][ T2007] shmem_get_folio_gfp+0x801/0x1200 [ 1785.684841][ T2007] shmem_write_begin+0xa6/0x1d0 [ 1785.689733][ T2007] generic_perform_write+0x1cf/0x410 [ 1785.695168][ T2007] ? shmem_write_begin+0x1d0/0x1d0 [ 1785.700308][ T2007] __generic_file_write_iter+0xa1/0x120 [ 1785.705888][ T2007] generic_file_write_iter+0x7d/0x1c0 [ 1785.711337][ T2007] vfs_write+0x4ab/0x7d0 [ 1785.715675][ T2007] ksys_write+0xeb/0x1a0 [ 1785.719998][ T2007] __x64_sys_write+0x42/0x50 [ 1785.724608][ T2007] do_syscall_64+0x41/0xc0 [ 1785.729052][ T2007] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1785.734993][ T2007] RIP: 0033:0x7f3d42967b29 [ 1785.739405][ T2007] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 08:00:03 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 81) 08:00:03 executing program 0: prctl$PR_SET_NAME(0x38, 0x0) 08:00:03 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/timer\x00', 0x0, 0x0) ioctl$PTP_ENABLE_PPS(r1, 0x40043d04, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000000380)=[{0x0}, {&(0x7f0000000080)=""/252, 0xfc}, {&(0x7f0000000180)=""/108, 0x6c}], 0x3, &(0x7f0000000600)=[{&(0x7f0000000400)=""/17, 0x11}, {&(0x7f0000000440)=""/246, 0xf6}], 0x2, 0x0) syz_open_procfs(r2, &(0x7f0000000080)='stack\x00') write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:03 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000180)='/8%v/\x85sg\x00\xa5Y\xdb@\xd6J\xc7\x15\x00\x00\xfc\xc2Qbu\f\x9a\x19\xbb\v\x0e\xe6e\t\xd9\xaa\xb0\x1f`\xea\xe2\x98\xae\'9=\xb5]T\xd4e@\x8d\xfe)\x8c\xc3\x8ei\xdb\x17\xd2\xf7\x96\xc6\xda\xccs\xd7\xf4a\xe4]\f\x8a\x1eo\x80:\x00\x9b\x96\xf4\x9aO\x7f\xae\x91\x89t\xb6\x88I\x9f\x1f\xaf\xc6\xcdD\xfb\xae\x99\xefW/\x1c\x89\xc2\x0e\x01\"8\xbf\x8a\xddS\xfb\x15\xe1\x118?gU\xcd\xe4\x8c\'\xc5}\x8bZ\x87\x1f\xe4\xf0\xd9\x87\n\xa6\xda\xf5\x044>\xf5\x8a\xab\xd8\xce\xfa\xebCD\xebJ\x81\xb9la9\xe3\xfe>\xceU\x97\xb4l>\xcfA\xe8&f\xb3\xb7\"\x8f\xa9\xb99/-CG\xe1\\xE\x89\xd4\xd4\xdc\xcbK\xc0\xf0\x13\xe7kR\x8b\x11\x02@3C\x97\xb1\xb0\xd7\xbf\xe7F\xdewm\xd6\xda%\xe8\xe5\xa6\a\x0fg\xceQuJ>\xe4{i\xd0\x9c') 08:00:03 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 08:00:03 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/cpuinfo\x00', 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000300), 0x111, 0x5}}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0)={0x0, r2}, 0x10) getsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000080)={@multicast1, @loopback}, &(0x7f0000000280)=0xc) 08:00:03 executing program 0: prctl$PR_SET_NAME(0x38, 0x0) [ 1785.759241][ T2007] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1785.767662][ T2007] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1785.775638][ T2007] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1785.783881][ T2007] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1785.791854][ T2007] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1785.799887][ T2007] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1785.807863][ T2007] 08:00:03 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/timer\x00', 0x0, 0x0) ioctl$PTP_ENABLE_PPS(r1, 0x40043d04, 0x0) (async) r2 = gettid() process_vm_writev(r2, &(0x7f0000000380)=[{0x0}, {&(0x7f0000000080)=""/252, 0xfc}, {&(0x7f0000000180)=""/108, 0x6c}], 0x3, &(0x7f0000000600)=[{&(0x7f0000000400)=""/17, 0x11}, {&(0x7f0000000440)=""/246, 0xf6}], 0x2, 0x0) (async) syz_open_procfs(r2, &(0x7f0000000080)='stack\x00') (async, rerun: 64) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (rerun: 64) 08:00:03 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000180)='/8%v/\x85sg\x00\xa5Y\xdb@\xd6J\xc7\x15\x00\x00\xfc\xc2Qbu\f\x9a\x19\xbb\v\x0e\xe6e\t\xd9\xaa\xb0\x1f`\xea\xe2\x98\xae\'9=\xb5]T\xd4e@\x8d\xfe)\x8c\xc3\x8ei\xdb\x17\xd2\xf7\x96\xc6\xda\xccs\xd7\xf4a\xe4]\f\x8a\x1eo\x80:\x00\x9b\x96\xf4\x9aO\x7f\xae\x91\x89t\xb6\x88I\x9f\x1f\xaf\xc6\xcdD\xfb\xae\x99\xefW/\x1c\x89\xc2\x0e\x01\"8\xbf\x8a\xddS\xfb\x15\xe1\x118?gU\xcd\xe4\x8c\'\xc5}\x8bZ\x87\x1f\xe4\xf0\xd9\x87\n\xa6\xda\xf5\x044>\xf5\x8a\xab\xd8\xce\xfa\xebCD\xebJ\x81\xb9la9\xe3\xfe>\xceU\x97\xb4l>\xcfA\xe8&f\xb3\xb7\"\x8f\xa9\xb99/-CG\xe1\\xE\x89\xd4\xd4\xdc\xcbK\xc0\xf0\x13\xe7kR\x8b\x11\x02@3C\x97\xb1\xb0\xd7\xbf\xe7F\xdewm\xd6\xda%\xe8\xe5\xa6\a\x0fg\xceQuJ>\xe4{i\xd0\x9c') 08:00:03 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000100)='/dev/bsg\x00\x051+\x01\xbf\x8c\x81\xef\x18\x1eQ{1\x9a\xa3O\xb14\xe6$&\x81\x84\x92\x94.\xae\x1d\x00\x93\x0f\x8fs\xe5\x8c]-\xc2 \x17\xeal\xea\xf8\xb7\b\xba\f\xad\xca8\xd0S\xae\xe3\x8f\x85!\x93\xeb\xa5\x9c') ioctl$PTP_EXTTS_REQUEST2(0xffffffffffffffff, 0x40103d0b, &(0x7f0000000040)={0xb145, 0x9}) modify_ldt$write2(0x11, &(0x7f0000000000)={0x7, 0xffffffffffffffff, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x1}, 0x10) [ 1785.843755][ T2039] FAULT_INJECTION: forcing a failure. [ 1785.843755][ T2039] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1785.856965][ T2039] CPU: 1 PID: 2039 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1785.867309][ T2039] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1785.877394][ T2039] Call Trace: [ 1785.880693][ T2039] [ 1785.883639][ T2039] dump_stack_lvl+0xda/0x130 [ 1785.888276][ T2039] dump_stack+0x15/0x20 08:00:03 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/timer\x00', 0x0, 0x0) ioctl$PTP_ENABLE_PPS(r1, 0x40043d04, 0x0) (async) r2 = gettid() process_vm_writev(r2, &(0x7f0000000380)=[{0x0}, {&(0x7f0000000080)=""/252, 0xfc}, {&(0x7f0000000180)=""/108, 0x6c}], 0x3, &(0x7f0000000600)=[{&(0x7f0000000400)=""/17, 0x11}, {&(0x7f0000000440)=""/246, 0xf6}], 0x2, 0x0) (async) syz_open_procfs(r2, &(0x7f0000000080)='stack\x00') (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:03 executing program 1: openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/cpuinfo\x00', 0x0, 0x0) pipe(&(0x7f0000000140)) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000300), 0x111, 0x5}}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0)={0x0, r2}, 0x10) getsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000080)={@multicast1, @loopback}, &(0x7f0000000280)=0xc) (async) getsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000080)={@multicast1, @loopback}, &(0x7f0000000280)=0xc) [ 1785.892481][ T2039] should_fail_ex+0x21f/0x230 [ 1785.897292][ T2039] should_fail+0xb/0x10 [ 1785.901679][ T2039] should_fail_usercopy+0x1a/0x20 [ 1785.906737][ T2039] copy_page_from_iter_atomic+0x22d/0xcf0 [ 1785.912540][ T2039] ? folio_test_hugetlb+0x3a/0x70 [ 1785.917641][ T2039] ? shmem_write_begin+0x12a/0x1d0 [ 1785.922788][ T2039] generic_perform_write+0x212/0x410 [ 1785.928213][ T2039] ? shmem_write_begin+0x1d0/0x1d0 [ 1785.933363][ T2039] __generic_file_write_iter+0xa1/0x120 [ 1785.938963][ T2039] generic_file_write_iter+0x7d/0x1c0 [ 1785.944420][ T2039] vfs_write+0x4ab/0x7d0 [ 1785.948710][ T2039] ksys_write+0xeb/0x1a0 [ 1785.953008][ T2039] __x64_sys_write+0x42/0x50 [ 1785.957696][ T2039] do_syscall_64+0x41/0xc0 [ 1785.962150][ T2039] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1785.968089][ T2039] RIP: 0033:0x7f3d42967b29 [ 1785.972553][ T2039] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1785.992245][ T2039] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1786.000682][ T2039] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1786.008697][ T2039] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1786.016669][ T2039] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1786.024726][ T2039] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1786.032878][ T2039] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1786.040923][ T2039] 08:00:04 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 82) 08:00:04 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/cpuinfo\x00', 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000300), 0x111, 0x5}}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0)={0x0, r2}, 0x10) getsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000080)={@multicast1, @loopback}, &(0x7f0000000280)=0xc) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/cpuinfo\x00', 0x0, 0x0) (async) pipe(&(0x7f0000000140)) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000300), 0x111, 0x5}}, 0x20) (async) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0)={0x0, r2}, 0x10) (async) getsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000080)={@multicast1, @loopback}, &(0x7f0000000280)=0xc) (async) 08:00:04 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x2, 0xffffffffffffffff, 0x0, 0x1, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f0000000680)={{0x2, 0x4e23, @multicast2}, {0x306, @local}, 0xc, {0x2, 0x4e24, @empty}, 'sit0\x00'}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) ioctl$PTP_SYS_OFFSET_EXTENDED(r2, 0xc4c03d09, &(0x7f00000001c0)={0x19}) 08:00:04 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 08:00:04 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000100)='/dev/bsg\x00\x051+\x01\xbf\x8c\x81\xef\x18\x1eQ{1\x9a\xa3O\xb14\xe6$&\x81\x84\x92\x94.\xae\x1d\x00\x93\x0f\x8fs\xe5\x8c]-\xc2 \x17\xeal\xea\xf8\xb7\b\xba\f\xad\xca8\xd0S\xae\xe3\x8f\x85!\x93\xeb\xa5\x9c') ioctl$PTP_EXTTS_REQUEST2(0xffffffffffffffff, 0x40103d0b, &(0x7f0000000040)={0xb145, 0x9}) modify_ldt$write2(0x11, &(0x7f0000000000)={0x7, 0xffffffffffffffff, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x1}, 0x10) prctl$PR_SET_NAME(0xf, &(0x7f0000000100)='/dev/bsg\x00\x051+\x01\xbf\x8c\x81\xef\x18\x1eQ{1\x9a\xa3O\xb14\xe6$&\x81\x84\x92\x94.\xae\x1d\x00\x93\x0f\x8fs\xe5\x8c]-\xc2 \x17\xeal\xea\xf8\xb7\b\xba\f\xad\xca8\xd0S\xae\xe3\x8f\x85!\x93\xeb\xa5\x9c') (async) ioctl$PTP_EXTTS_REQUEST2(0xffffffffffffffff, 0x40103d0b, &(0x7f0000000040)={0xb145, 0x9}) (async) modify_ldt$write2(0x11, &(0x7f0000000000)={0x7, 0xffffffffffffffff, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x1}, 0x10) (async) 08:00:04 executing program 0: prctl$PR_SET_NAME(0x38, 0x0) 08:00:04 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x2, 0xffffffffffffffff, 0x0, 0x1, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f0000000680)={{0x2, 0x4e23, @multicast2}, {0x306, @local}, 0xc, {0x2, 0x4e24, @empty}, 'sit0\x00'}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) pipe(&(0x7f0000000140)) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) ioctl$PTP_SYS_OFFSET_EXTENDED(r2, 0xc4c03d09, &(0x7f00000001c0)={0x19}) (async) ioctl$PTP_SYS_OFFSET_EXTENDED(r2, 0xc4c03d09, &(0x7f00000001c0)={0x19}) 08:00:04 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) read$watch_queue(r1, &(0x7f0000000340)=""/240, 0xf0) ioctl$SIOCX25SCALLUSERDATA(r0, 0x89e5, &(0x7f0000000280)={0x7d, "fd853e4fb889e899efc361ac6d54a22072333832df4a66e58e583592b90a9d17573e665e297a2142ef9afdb4eeb816151b445b03518bf60cdc5952ade8af03fb4f0eaea0b806f9f60cab50e50af1eb73eca8642957a70481903d8afa060eb9aace184a0d4966239265d238eeba87bc13f989696a48d5fe2955df778953d399e0"}) ioctl$sock_x25_SIOCADDRT(r0, 0x890b, &(0x7f0000000440)={@remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}, 0x8, 'veth0_to_hsr\x00'}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x30, 0x0, @in6={0xa, 0x4e24, 0x9, @local, 0x84f}}}, 0xa0) 08:00:04 executing program 0: prctl$PR_SET_NAME(0x38, 0x0) 08:00:04 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000100)='/dev/bsg\x00\x051+\x01\xbf\x8c\x81\xef\x18\x1eQ{1\x9a\xa3O\xb14\xe6$&\x81\x84\x92\x94.\xae\x1d\x00\x93\x0f\x8fs\xe5\x8c]-\xc2 \x17\xeal\xea\xf8\xb7\b\xba\f\xad\xca8\xd0S\xae\xe3\x8f\x85!\x93\xeb\xa5\x9c') ioctl$PTP_EXTTS_REQUEST2(0xffffffffffffffff, 0x40103d0b, &(0x7f0000000040)={0xb145, 0x9}) modify_ldt$write2(0x11, &(0x7f0000000000)={0x7, 0xffffffffffffffff, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x1}, 0x10) 08:00:04 executing program 0: prctl$PR_SET_NAME(0x38, 0x0) 08:00:04 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) read$watch_queue(r1, &(0x7f0000000340)=""/240, 0xf0) (async) ioctl$SIOCX25SCALLUSERDATA(r0, 0x89e5, &(0x7f0000000280)={0x7d, "fd853e4fb889e899efc361ac6d54a22072333832df4a66e58e583592b90a9d17573e665e297a2142ef9afdb4eeb816151b445b03518bf60cdc5952ade8af03fb4f0eaea0b806f9f60cab50e50af1eb73eca8642957a70481903d8afa060eb9aace184a0d4966239265d238eeba87bc13f989696a48d5fe2955df778953d399e0"}) ioctl$sock_x25_SIOCADDRT(r0, 0x890b, &(0x7f0000000440)={@remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}, 0x8, 'veth0_to_hsr\x00'}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x30, 0x0, @in6={0xa, 0x4e24, 0x9, @local, 0x84f}}}, 0xa0) [ 1786.213684][ T2091] FAULT_INJECTION: forcing a failure. [ 1786.213684][ T2091] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1786.227088][ T2091] CPU: 0 PID: 2091 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1786.237476][ T2091] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1786.247593][ T2091] Call Trace: [ 1786.250896][ T2091] [ 1786.253912][ T2091] dump_stack_lvl+0xda/0x130 [ 1786.258659][ T2091] dump_stack+0x15/0x20 [ 1786.262850][ T2091] should_fail_ex+0x21f/0x230 [ 1786.267618][ T2091] __should_fail_alloc_page+0xfd/0x110 [ 1786.273117][ T2091] __alloc_pages+0x108/0x340 [ 1786.277741][ T2091] vma_alloc_folio+0x6a3/0x8c0 [ 1786.282623][ T2091] shmem_get_folio_gfp+0x801/0x1200 [ 1786.287952][ T2091] shmem_write_begin+0xa6/0x1d0 [ 1786.292917][ T2091] generic_perform_write+0x1cf/0x410 [ 1786.298250][ T2091] ? shmem_write_begin+0x1d0/0x1d0 [ 1786.303415][ T2091] __generic_file_write_iter+0xa1/0x120 [ 1786.309030][ T2091] generic_file_write_iter+0x7d/0x1c0 [ 1786.314412][ T2091] vfs_write+0x4ab/0x7d0 [ 1786.318708][ T2091] ksys_write+0xeb/0x1a0 [ 1786.322962][ T2091] __x64_sys_write+0x42/0x50 [ 1786.327654][ T2091] do_syscall_64+0x41/0xc0 [ 1786.332077][ T2091] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1786.338043][ T2091] RIP: 0033:0x7f3d42967b29 [ 1786.342462][ T2091] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 08:00:04 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 83) 08:00:04 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 08:00:04 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x2, 0xffffffffffffffff, 0x0, 0x1, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f0000000680)={{0x2, 0x4e23, @multicast2}, {0x306, @local}, 0xc, {0x2, 0x4e24, @empty}, 'sit0\x00'}) (async) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f0000000680)={{0x2, 0x4e23, @multicast2}, {0x306, @local}, 0xc, {0x2, 0x4e24, @empty}, 'sit0\x00'}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) pipe(&(0x7f0000000140)) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) ioctl$PTP_SYS_OFFSET_EXTENDED(r2, 0xc4c03d09, &(0x7f00000001c0)={0x19}) 08:00:04 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000000)) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') 08:00:04 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async, rerun: 64) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (rerun: 64) read$watch_queue(r1, &(0x7f0000000340)=""/240, 0xf0) ioctl$SIOCX25SCALLUSERDATA(r0, 0x89e5, &(0x7f0000000280)={0x7d, "fd853e4fb889e899efc361ac6d54a22072333832df4a66e58e583592b90a9d17573e665e297a2142ef9afdb4eeb816151b445b03518bf60cdc5952ade8af03fb4f0eaea0b806f9f60cab50e50af1eb73eca8642957a70481903d8afa060eb9aace184a0d4966239265d238eeba87bc13f989696a48d5fe2955df778953d399e0"}) (async) ioctl$sock_x25_SIOCADDRT(r0, 0x890b, &(0x7f0000000440)={@remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}, 0x8, 'veth0_to_hsr\x00'}) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x30, 0x0, @in6={0xa, 0x4e24, 0x9, @local, 0x84f}}}, 0xa0) 08:00:04 executing program 0: prctl$PR_SET_NAME(0x37, &(0x7f0000000040)='/dev/bsg\x00') 08:00:04 executing program 0: prctl$PR_SET_NAME(0x37, &(0x7f0000000040)='/dev/bsg\x00') 08:00:04 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000000)) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') pipe(&(0x7f0000000140)) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) (async) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000000)) (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') (async) [ 1786.362088][ T2091] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1786.370693][ T2091] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1786.378743][ T2091] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1786.386786][ T2091] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1786.394821][ T2091] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1786.402790][ T2091] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1786.410864][ T2091] 08:00:04 executing program 1: ioctl$SIOCX25SCALLUSERDATA(0xffffffffffffffff, 0x89e5, &(0x7f0000000280)={0x20, "7781f8b84a6bc40a026fdac4558dc96cc2934d4317bb67c84bb9ed963330b57bbd09d4c798dde92b57317dec7f9a77c53e3a6ae9ee519625889838c6904f291abbd9f96bd5327f9a4590376297466be13ac20a090e1c2f3bd97e06cce13fcfb5a7cbdbb07245e61ecac452ecebff7985acaf73053211d349e5d45589eebebf1e"}) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:04 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) ioctl$SIOCX25CALLACCPTAPPRV(r0, 0x89e8) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000080)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), r0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001680), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r3, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000180), 0x4, r3, 0x30, 0x0, @in6={0xa, 0x4e24, 0x4b, @private2={0xfc, 0x2, '\x00', 0x1}, 0xc5}}}, 0xa0) 08:00:04 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) ioctl$SIOCX25CALLACCPTAPPRV(r0, 0x89e8) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000080)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), r0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001680), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r3, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000180), 0x4, r3, 0x30, 0x0, @in6={0xa, 0x4e24, 0x4b, @private2={0xfc, 0x2, '\x00', 0x1}, 0xc5}}}, 0xa0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) ioctl$SIOCX25CALLACCPTAPPRV(r0, 0x89e8) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000080)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), r0) (async) pipe(&(0x7f0000000140)) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001680), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r3, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000180), 0x4, r3, 0x30, 0x0, @in6={0xa, 0x4e24, 0x4b, @private2={0xfc, 0x2, '\x00', 0x1}, 0xc5}}}, 0xa0) (async) 08:00:04 executing program 1: ioctl$SIOCX25SCALLUSERDATA(0xffffffffffffffff, 0x89e5, &(0x7f0000000280)={0x20, "7781f8b84a6bc40a026fdac4558dc96cc2934d4317bb67c84bb9ed963330b57bbd09d4c798dde92b57317dec7f9a77c53e3a6ae9ee519625889838c6904f291abbd9f96bd5327f9a4590376297466be13ac20a090e1c2f3bd97e06cce13fcfb5a7cbdbb07245e61ecac452ecebff7985acaf73053211d349e5d45589eebebf1e"}) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) [ 1786.464127][ T2117] FAULT_INJECTION: forcing a failure. [ 1786.464127][ T2117] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1786.477236][ T2117] CPU: 0 PID: 2117 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1786.487579][ T2117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1786.497669][ T2117] Call Trace: [ 1786.500990][ T2117] [ 1786.503964][ T2117] dump_stack_lvl+0xda/0x130 [ 1786.508588][ T2117] dump_stack+0x15/0x20 [ 1786.512778][ T2117] should_fail_ex+0x21f/0x230 [ 1786.517492][ T2117] should_fail+0xb/0x10 [ 1786.521710][ T2117] should_fail_usercopy+0x1a/0x20 [ 1786.526795][ T2117] copy_page_from_iter_atomic+0x22d/0xcf0 [ 1786.532653][ T2117] ? folio_test_hugetlb+0x3a/0x70 [ 1786.537762][ T2117] ? shmem_write_begin+0x12a/0x1d0 [ 1786.542897][ T2117] generic_perform_write+0x212/0x410 [ 1786.548208][ T2117] ? shmem_write_begin+0x1d0/0x1d0 [ 1786.553386][ T2117] __generic_file_write_iter+0xa1/0x120 [ 1786.558990][ T2117] generic_file_write_iter+0x7d/0x1c0 [ 1786.564481][ T2117] vfs_write+0x4ab/0x7d0 [ 1786.568810][ T2117] ksys_write+0xeb/0x1a0 [ 1786.573105][ T2117] __x64_sys_write+0x42/0x50 [ 1786.577810][ T2117] do_syscall_64+0x41/0xc0 [ 1786.582242][ T2117] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1786.588232][ T2117] RIP: 0033:0x7f3d42967b29 [ 1786.592650][ T2117] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1786.612327][ T2117] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1786.620795][ T2117] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1786.628768][ T2117] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1786.636814][ T2117] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1786.644792][ T2117] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1786.652780][ T2117] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1786.660822][ T2117] 08:00:04 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 84) 08:00:04 executing program 1: ioctl$SIOCX25SCALLUSERDATA(0xffffffffffffffff, 0x89e5, &(0x7f0000000280)={0x20, "7781f8b84a6bc40a026fdac4558dc96cc2934d4317bb67c84bb9ed963330b57bbd09d4c798dde92b57317dec7f9a77c53e3a6ae9ee519625889838c6904f291abbd9f96bd5327f9a4590376297466be13ac20a090e1c2f3bd97e06cce13fcfb5a7cbdbb07245e61ecac452ecebff7985acaf73053211d349e5d45589eebebf1e"}) (async) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:04 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) ioctl$SIOCX25CALLACCPTAPPRV(r0, 0x89e8) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000080)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), r0) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001680), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r3, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000180), 0x4, r3, 0x30, 0x0, @in6={0xa, 0x4e24, 0x4b, @private2={0xfc, 0x2, '\x00', 0x1}, 0xc5}}}, 0xa0) 08:00:04 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) (async, rerun: 64) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000000)) (rerun: 64) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') 08:00:04 executing program 0: prctl$PR_SET_NAME(0x37, &(0x7f0000000040)='/dev/bsg\x00') 08:00:04 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 08:00:04 executing program 5: r0 = socket$phonet(0x23, 0x2, 0x1) ioctl$SIOCPNDELRESOURCE(r0, 0x89ef, &(0x7f0000000000)=0x80000001) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) ioctl$KDGKBMODE(r1, 0x4b44, &(0x7f0000000080)) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') 08:00:04 executing program 0: prctl$PR_SET_NAME(0x37, 0x0) 08:00:04 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) sendto$llc(r0, &(0x7f0000000040)="d21a785dbd369eb9723faa6c6bc7b08da99c6bfd97a411e81ace6c935e5c9833d1d3235f8284cf892c80b3c397cec987fe21875e6f12b815016623f27a799e332bafb1fca85eda81482e77ca9470d6b412dc4b5c1c1f34f89db1509a4c88ec52", 0x60, 0x40000, &(0x7f00000001c0)={0x1a, 0x337, 0xff, 0x2, 0x6, 0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x10) 08:00:04 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x3, 0xffffffffffffffff, 0x1c, 0x0, @in={0x2, 0x4e20, @remote}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:04 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x3, 0xffffffffffffffff, 0x1c, 0x0, @in={0x2, 0x4e20, @remote}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:04 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) sendto$llc(r0, &(0x7f0000000040)="d21a785dbd369eb9723faa6c6bc7b08da99c6bfd97a411e81ace6c935e5c9833d1d3235f8284cf892c80b3c397cec987fe21875e6f12b815016623f27a799e332bafb1fca85eda81482e77ca9470d6b412dc4b5c1c1f34f89db1509a4c88ec52", 0x60, 0x40000, &(0x7f00000001c0)={0x1a, 0x337, 0xff, 0x2, 0x6, 0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x10) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) sendto$llc(r0, &(0x7f0000000040)="d21a785dbd369eb9723faa6c6bc7b08da99c6bfd97a411e81ace6c935e5c9833d1d3235f8284cf892c80b3c397cec987fe21875e6f12b815016623f27a799e332bafb1fca85eda81482e77ca9470d6b412dc4b5c1c1f34f89db1509a4c88ec52", 0x60, 0x40000, &(0x7f00000001c0)={0x1a, 0x337, 0xff, 0x2, 0x6, 0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x10) (async) [ 1786.823289][ T2158] FAULT_INJECTION: forcing a failure. [ 1786.823289][ T2158] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1786.836663][ T2158] CPU: 1 PID: 2158 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1786.847227][ T2158] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1786.857298][ T2158] Call Trace: [ 1786.860692][ T2158] [ 1786.863651][ T2158] dump_stack_lvl+0xda/0x130 [ 1786.868328][ T2158] dump_stack+0x15/0x20 [ 1786.872605][ T2158] should_fail_ex+0x21f/0x230 [ 1786.877358][ T2158] __should_fail_alloc_page+0xfd/0x110 [ 1786.882849][ T2158] __alloc_pages+0x108/0x340 [ 1786.887482][ T2158] vma_alloc_folio+0x6a3/0x8c0 [ 1786.892357][ T2158] shmem_get_folio_gfp+0x801/0x1200 [ 1786.897661][ T2158] shmem_write_begin+0xa6/0x1d0 [ 1786.902552][ T2158] generic_perform_write+0x1cf/0x410 [ 1786.908016][ T2158] ? shmem_write_begin+0x1d0/0x1d0 [ 1786.913215][ T2158] __generic_file_write_iter+0xa1/0x120 [ 1786.918912][ T2158] generic_file_write_iter+0x7d/0x1c0 [ 1786.924295][ T2158] vfs_write+0x4ab/0x7d0 [ 1786.928595][ T2158] ksys_write+0xeb/0x1a0 [ 1786.932911][ T2158] __x64_sys_write+0x42/0x50 [ 1786.937553][ T2158] do_syscall_64+0x41/0xc0 [ 1786.941974][ T2158] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1786.947900][ T2158] RIP: 0033:0x7f3d42967b29 [ 1786.952323][ T2158] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 08:00:05 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 85) 08:00:05 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x3, 0xffffffffffffffff, 0x1c, 0x0, @in={0x2, 0x4e20, @remote}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x3, 0xffffffffffffffff, 0x1c, 0x0, @in={0x2, 0x4e20, @remote}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) 08:00:05 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) sendto$llc(r0, &(0x7f0000000040)="d21a785dbd369eb9723faa6c6bc7b08da99c6bfd97a411e81ace6c935e5c9833d1d3235f8284cf892c80b3c397cec987fe21875e6f12b815016623f27a799e332bafb1fca85eda81482e77ca9470d6b412dc4b5c1c1f34f89db1509a4c88ec52", 0x60, 0x40000, &(0x7f00000001c0)={0x1a, 0x337, 0xff, 0x2, 0x6, 0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x10) 08:00:05 executing program 0: prctl$PR_SET_NAME(0x36, &(0x7f0000000040)='/dev/bsg\x00') 08:00:05 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6db}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 08:00:05 executing program 5: r0 = socket$phonet(0x23, 0x2, 0x1) ioctl$SIOCPNDELRESOURCE(r0, 0x89ef, &(0x7f0000000000)=0x80000001) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) ioctl$KDGKBMODE(r1, 0x4b44, &(0x7f0000000080)) (async) ioctl$KDGKBMODE(r1, 0x4b44, &(0x7f0000000080)) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') 08:00:05 executing program 0: prctl$PR_SET_NAME(0x36, &(0x7f0000000040)='/dev/bsg\x00') [ 1786.971941][ T2158] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1786.980353][ T2158] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1786.988361][ T2158] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1786.996383][ T2158] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1787.004374][ T2158] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1787.012371][ T2158] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1787.020368][ T2158] 08:00:05 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x4e23, @loopback}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:05 executing program 5: r0 = socket$phonet(0x23, 0x2, 0x1) ioctl$SIOCPNDELRESOURCE(r0, 0x89ef, &(0x7f0000000000)=0x80000001) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) ioctl$KDGKBMODE(r1, 0x4b44, &(0x7f0000000080)) (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') 08:00:05 executing program 0: prctl$PR_SET_NAME(0x36, &(0x7f0000000040)='/dev/bsg\x00') [ 1787.068493][ T2188] FAULT_INJECTION: forcing a failure. [ 1787.068493][ T2188] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1787.081682][ T2188] CPU: 1 PID: 2188 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1787.092037][ T2188] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1787.102567][ T2188] Call Trace: [ 1787.105868][ T2188] [ 1787.108872][ T2188] dump_stack_lvl+0xda/0x130 [ 1787.113506][ T2188] dump_stack+0x15/0x20 08:00:05 executing program 0: prctl$PR_SET_NAME(0x36, 0x0) 08:00:05 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x3c1701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) [ 1787.117748][ T2188] should_fail_ex+0x21f/0x230 [ 1787.122527][ T2188] should_fail+0xb/0x10 [ 1787.126746][ T2188] should_fail_usercopy+0x1a/0x20 [ 1787.131792][ T2188] copy_page_from_iter_atomic+0x22d/0xcf0 [ 1787.137587][ T2188] ? folio_test_hugetlb+0x3a/0x70 [ 1787.142638][ T2188] ? shmem_write_begin+0x12a/0x1d0 [ 1787.147783][ T2188] generic_perform_write+0x212/0x410 [ 1787.153349][ T2188] ? shmem_write_begin+0x1d0/0x1d0 [ 1787.158514][ T2188] __generic_file_write_iter+0xa1/0x120 [ 1787.164170][ T2188] generic_file_write_iter+0x7d/0x1c0 [ 1787.169679][ T2188] vfs_write+0x4ab/0x7d0 [ 1787.174054][ T2188] ksys_write+0xeb/0x1a0 [ 1787.178370][ T2188] __x64_sys_write+0x42/0x50 [ 1787.182999][ T2188] do_syscall_64+0x41/0xc0 [ 1787.187479][ T2188] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1787.193389][ T2188] RIP: 0033:0x7f3d42967b29 [ 1787.197806][ T2188] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1787.217469][ T2188] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1787.225885][ T2188] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1787.233882][ T2188] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1787.242035][ T2188] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1787.250212][ T2188] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1787.258421][ T2188] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1787.266501][ T2188] 08:00:05 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 86) 08:00:05 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x4e23, @loopback}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x4e23, @loopback}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) 08:00:05 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x3c1701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:05 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 08:00:05 executing program 0: prctl$PR_SET_NAME(0x35, &(0x7f0000000040)='/dev/bsg\x00') 08:00:05 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) ioctl$TIOCMIWAIT(r0, 0x545c, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_matches\x00') ioctl$VT_SETMODE(r1, 0x5602, &(0x7f00000000c0)={0x1, 0x1, 0x108e, 0x456, 0x1}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100), r3) setsockopt$CAN_RAW_RECV_OWN_MSGS(r3, 0x65, 0x4, &(0x7f0000000080), 0x4) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') 08:00:05 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) ioctl$TIOCMIWAIT(r0, 0x545c, 0x0) (async) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_matches\x00') ioctl$VT_SETMODE(r1, 0x5602, &(0x7f00000000c0)={0x1, 0x1, 0x108e, 0x456, 0x1}) (async, rerun: 32) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 32) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100), r3) setsockopt$CAN_RAW_RECV_OWN_MSGS(r3, 0x65, 0x4, &(0x7f0000000080), 0x4) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') 08:00:05 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x4e23, @loopback}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x4e23, @loopback}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) 08:00:05 executing program 0: prctl$PR_SET_NAME(0x35, &(0x7f0000000040)='/dev/bsg\x00') 08:00:05 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x3c1701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) [ 1787.432566][ T2226] FAULT_INJECTION: forcing a failure. [ 1787.432566][ T2226] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1787.445999][ T2226] CPU: 0 PID: 2226 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1787.456485][ T2226] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1787.466567][ T2226] Call Trace: [ 1787.469859][ T2226] [ 1787.472814][ T2226] dump_stack_lvl+0xda/0x130 [ 1787.477494][ T2226] dump_stack+0x15/0x20 08:00:05 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) ioctl$TIOCMIWAIT(r0, 0x545c, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_matches\x00') ioctl$VT_SETMODE(r1, 0x5602, &(0x7f00000000c0)={0x1, 0x1, 0x108e, 0x456, 0x1}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000100), r3) setsockopt$CAN_RAW_RECV_OWN_MSGS(r3, 0x65, 0x4, &(0x7f0000000080), 0x4) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') pipe(&(0x7f0000000140)) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) (async) ioctl$TIOCMIWAIT(r0, 0x545c, 0x0) (async) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_matches\x00') (async) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f00000000c0)={0x1, 0x1, 0x108e, 0x456, 0x1}) (async) pipe(&(0x7f0000000140)) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) (async) pipe(&(0x7f0000000140)) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000100), r3) (async) setsockopt$CAN_RAW_RECV_OWN_MSGS(r3, 0x65, 0x4, &(0x7f0000000080), 0x4) (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') (async) 08:00:05 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6400}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) [ 1787.481725][ T2226] should_fail_ex+0x21f/0x230 [ 1787.486440][ T2226] __should_fail_alloc_page+0xfd/0x110 [ 1787.491947][ T2226] __alloc_pages+0x108/0x340 [ 1787.496586][ T2226] vma_alloc_folio+0x6a3/0x8c0 [ 1787.501472][ T2226] shmem_get_folio_gfp+0x801/0x1200 [ 1787.506808][ T2226] shmem_write_begin+0xa6/0x1d0 [ 1787.511705][ T2226] generic_perform_write+0x1cf/0x410 [ 1787.517033][ T2226] ? shmem_write_begin+0x1d0/0x1d0 [ 1787.522169][ T2226] __generic_file_write_iter+0xa1/0x120 [ 1787.527725][ T2226] generic_file_write_iter+0x7d/0x1c0 [ 1787.533109][ T2226] vfs_write+0x4ab/0x7d0 [ 1787.537363][ T2226] ksys_write+0xeb/0x1a0 [ 1787.541656][ T2226] __x64_sys_write+0x42/0x50 [ 1787.546273][ T2226] do_syscall_64+0x41/0xc0 [ 1787.550770][ T2226] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1787.556734][ T2226] RIP: 0033:0x7f3d42967b29 [ 1787.561145][ T2226] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 08:00:05 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 87) 08:00:05 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000040)={@empty, @initdev, 0x0}, &(0x7f0000000080)=0xc) bind$can_raw(r0, &(0x7f0000000280)={0x1d, r1}, 0x10) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) r3 = accept$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, &(0x7f0000000300)=0x10) getsockopt$inet_mreqsrc(r3, 0x0, 0x28, &(0x7f0000000340)={@loopback, @multicast2, @remote}, &(0x7f0000000380)=0xc) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:05 executing program 0: prctl$PR_SET_NAME(0x35, &(0x7f0000000040)='/dev/bsg\x00') 08:00:05 executing program 4: bind$can_raw(0xffffffffffffffff, &(0x7f0000000200), 0x10) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x541701, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000040), 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCX25GCALLUSERDATA(r1, 0x89e4, &(0x7f0000000380)={0x71, "b41302c37b85e507d4bb71bd29ea433f95792d7730faa72e2b836fbfc9247191a8d97a87b936f4fb1566902ce08b4ccd1ef06c0b4b853df143c3fdadc2ef9ab9e036ea65cf819d826bd900d19d4a4d02fa053729f83fcda3537a1474bd17648a23456db404c4143b21b4c3ee7c4f69f730cb8b8e1501f2184d430000c200"}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x4e24, 0x4, @rand_addr=' \x01\x00', 0x8}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x728102, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo\x00') openat$cgroup_procs(r2, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) inotify_rm_watch(r0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r3) syz_genetlink_get_family_id$smc(&(0x7f00000002c0), r3) 08:00:05 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), r0) r1 = syz_open_pts(r0, 0xbb240) ioctl$KDENABIO(r1, 0x4b36) ioctl$TIOCMIWAIT(r1, 0x545c, 0x0) pipe2$watch_queue(&(0x7f0000000080), 0x80) 08:00:05 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdb06}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 08:00:05 executing program 0: prctl$PR_SET_NAME(0x35, 0x0) [ 1787.580827][ T2226] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1787.589247][ T2226] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1787.597256][ T2226] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1787.605306][ T2226] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1787.613332][ T2226] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1787.621307][ T2226] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1787.629297][ T2226] 08:00:05 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)) (async) pipe(&(0x7f0000000000)) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), r0) r1 = syz_open_pts(r0, 0xbb240) ioctl$KDENABIO(r1, 0x4b36) ioctl$TIOCMIWAIT(r1, 0x545c, 0x0) pipe2$watch_queue(&(0x7f0000000080), 0x80) (async) pipe2$watch_queue(&(0x7f0000000080), 0x80) 08:00:05 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) (async, rerun: 32) pipe(&(0x7f0000000000)) (rerun: 32) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), r0) (async, rerun: 32) r1 = syz_open_pts(r0, 0xbb240) (rerun: 32) ioctl$KDENABIO(r1, 0x4b36) ioctl$TIOCMIWAIT(r1, 0x545c, 0x0) pipe2$watch_queue(&(0x7f0000000080), 0x80) 08:00:05 executing program 0: prctl$PR_SET_NAME(0x35, 0x0) [ 1787.664543][ T2256] FAULT_INJECTION: forcing a failure. [ 1787.664543][ T2256] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1787.677665][ T2256] CPU: 0 PID: 2256 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1787.688137][ T2256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1787.698311][ T2256] Call Trace: [ 1787.701631][ T2256] [ 1787.704605][ T2256] dump_stack_lvl+0xda/0x130 [ 1787.709246][ T2256] dump_stack+0x15/0x20 08:00:05 executing program 0: prctl$PR_SET_NAME(0x35, 0x0) 08:00:05 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000040)={@empty, @initdev, 0x0}, &(0x7f0000000080)=0xc) bind$can_raw(r0, &(0x7f0000000280)={0x1d, r1}, 0x10) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) r3 = accept$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, &(0x7f0000000300)=0x10) getsockopt$inet_mreqsrc(r3, 0x0, 0x28, &(0x7f0000000340)={@loopback, @multicast2, @remote}, &(0x7f0000000380)=0xc) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) pipe(&(0x7f0000000140)) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) (async) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000040)={@empty, @initdev}, &(0x7f0000000080)=0xc) (async) bind$can_raw(r0, &(0x7f0000000280)={0x1d, r1}, 0x10) (async) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) accept$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, &(0x7f0000000300)=0x10) (async) getsockopt$inet_mreqsrc(r3, 0x0, 0x28, &(0x7f0000000340)={@loopback, @multicast2, @remote}, &(0x7f0000000380)=0xc) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) [ 1787.713434][ T2256] should_fail_ex+0x21f/0x230 [ 1787.718177][ T2256] should_fail+0xb/0x10 [ 1787.722366][ T2256] should_fail_usercopy+0x1a/0x20 [ 1787.727487][ T2256] copy_page_from_iter_atomic+0x22d/0xcf0 [ 1787.733328][ T2256] ? folio_test_hugetlb+0x3a/0x70 [ 1787.738389][ T2256] ? shmem_write_begin+0x12a/0x1d0 [ 1787.743534][ T2256] generic_perform_write+0x212/0x410 [ 1787.748851][ T2256] ? shmem_write_begin+0x1d0/0x1d0 [ 1787.754037][ T2256] __generic_file_write_iter+0xa1/0x120 [ 1787.759630][ T2256] generic_file_write_iter+0x7d/0x1c0 [ 1787.765033][ T2256] vfs_write+0x4ab/0x7d0 [ 1787.769333][ T2256] ksys_write+0xeb/0x1a0 [ 1787.773690][ T2256] __x64_sys_write+0x42/0x50 [ 1787.778395][ T2256] do_syscall_64+0x41/0xc0 [ 1787.782849][ T2256] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1787.788816][ T2256] RIP: 0033:0x7f3d42967b29 [ 1787.793318][ T2256] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1787.813009][ T2256] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1787.821493][ T2256] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1787.829530][ T2256] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1787.837503][ T2256] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1787.845485][ T2256] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1787.853464][ T2256] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1787.861450][ T2256] 08:00:05 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 88) 08:00:05 executing program 4: bind$can_raw(0xffffffffffffffff, &(0x7f0000000200), 0x10) (async) bind$can_raw(0xffffffffffffffff, &(0x7f0000000200), 0x10) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x541701, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000040), 0x2, 0x0) (async) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000040), 0x2, 0x0) pipe(&(0x7f0000000140)) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCX25GCALLUSERDATA(r1, 0x89e4, &(0x7f0000000380)={0x71, "b41302c37b85e507d4bb71bd29ea433f95792d7730faa72e2b836fbfc9247191a8d97a87b936f4fb1566902ce08b4ccd1ef06c0b4b853df143c3fdadc2ef9ab9e036ea65cf819d826bd900d19d4a4d02fa053729f83fcda3537a1474bd17648a23456db404c4143b21b4c3ee7c4f69f730cb8b8e1501f2184d430000c200"}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x4e24, 0x4, @rand_addr=' \x01\x00', 0x8}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x4e24, 0x4, @rand_addr=' \x01\x00', 0x8}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x728102, 0x0) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x728102, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo\x00') openat$cgroup_procs(r2, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) inotify_rm_watch(r0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r3) syz_genetlink_get_family_id$smc(&(0x7f00000002c0), r3) 08:00:05 executing program 5: r0 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_DEL(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x38, r0, 0x20, 0x70bd29, 0x25dfdbfb, {}, [@DEVLINK_ATTR_PORT_INDEX={0x8, 0x3, 0x3}, @handle=@pci={{0x8}, {0x11}}]}, 0x38}, 0x1, 0x0, 0x0, 0x40080}, 0x4000000) 08:00:05 executing program 0: bind$can_raw(0xffffffffffffffff, &(0x7f0000000200), 0x10) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x541701, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000040), 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCX25GCALLUSERDATA(r1, 0x89e4, &(0x7f0000000380)={0x71, "b41302c37b85e507d4bb71bd29ea433f95792d7730faa72e2b836fbfc9247191a8d97a87b936f4fb1566902ce08b4ccd1ef06c0b4b853df143c3fdadc2ef9ab9e036ea65cf819d826bd900d19d4a4d02fa053729f83fcda3537a1474bd17648a23456db404c4143b21b4c3ee7c4f69f730cb8b8e1501f2184d430000c200"}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x4e24, 0x4, @rand_addr=' \x01\x00', 0x8}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x728102, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo\x00') openat$cgroup_procs(r2, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) inotify_rm_watch(r0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r3) syz_genetlink_get_family_id$smc(&(0x7f00000002c0), r3) 08:00:05 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000040)={@empty, @initdev, 0x0}, &(0x7f0000000080)=0xc) bind$can_raw(r0, &(0x7f0000000280)={0x1d, r1}, 0x10) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) r3 = accept$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, &(0x7f0000000300)=0x10) getsockopt$inet_mreqsrc(r3, 0x0, 0x28, &(0x7f0000000340)={@loopback, @multicast2, @remote}, &(0x7f0000000380)=0xc) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:05 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 08:00:06 executing program 4: bind$can_raw(0xffffffffffffffff, &(0x7f0000000200), 0x10) (async) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x541701, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000040), 0x2, 0x0) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCX25GCALLUSERDATA(r1, 0x89e4, &(0x7f0000000380)={0x71, "b41302c37b85e507d4bb71bd29ea433f95792d7730faa72e2b836fbfc9247191a8d97a87b936f4fb1566902ce08b4ccd1ef06c0b4b853df143c3fdadc2ef9ab9e036ea65cf819d826bd900d19d4a4d02fa053729f83fcda3537a1474bd17648a23456db404c4143b21b4c3ee7c4f69f730cb8b8e1501f2184d430000c200"}) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x4e24, 0x4, @rand_addr=' \x01\x00', 0x8}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x728102, 0x0) (async) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo\x00') openat$cgroup_procs(r2, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) (async) inotify_rm_watch(r0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r3) syz_genetlink_get_family_id$smc(&(0x7f00000002c0), r3) 08:00:06 executing program 5: r0 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_DEL(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x38, r0, 0x20, 0x70bd29, 0x25dfdbfb, {}, [@DEVLINK_ATTR_PORT_INDEX={0x8, 0x3, 0x3}, @handle=@pci={{0x8}, {0x11}}]}, 0x38}, 0x1, 0x0, 0x0, 0x40080}, 0x4000000) 08:00:06 executing program 0: bind$can_raw(0xffffffffffffffff, &(0x7f0000000200), 0x10) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x541701, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000040), 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCX25GCALLUSERDATA(r1, 0x89e4, &(0x7f0000000380)={0x71, "b41302c37b85e507d4bb71bd29ea433f95792d7730faa72e2b836fbfc9247191a8d97a87b936f4fb1566902ce08b4ccd1ef06c0b4b853df143c3fdadc2ef9ab9e036ea65cf819d826bd900d19d4a4d02fa053729f83fcda3537a1474bd17648a23456db404c4143b21b4c3ee7c4f69f730cb8b8e1501f2184d430000c200"}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x4e24, 0x4, @rand_addr=' \x01\x00', 0x8}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x728102, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo\x00') openat$cgroup_procs(r2, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) inotify_rm_watch(r0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r3) syz_genetlink_get_family_id$smc(&(0x7f00000002c0), r3) 08:00:06 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) sendto$llc(r1, &(0x7f0000000280)="c3a26d78a697088ac59a74b3c6dd2dd5911739b1e20b7f5d7ec602094e0c0d6379b9cd7a161f816ec057ba44fcda86cbd051cc2512981bf0590099b8bc59381d9cd284b4bc383ecb4936d32368fe7d2ca349a3f4e9d55a0ba884382645a19c0c02753adf661d69fbdcf732cb0339c607a835eaebf6b07ef22f9657301d7dfacde765f0eba5cfdc4e9b923a6610bc372d94f5f20450fcf53f5fbbb90cd40fd562c2c2d5cbe64a8cae730ca4f544918514cc57926673b14124c03697b1775013d1bf9359907a0b4e79b6e2b8ccfdcd44f6bb3ab000513373ad37dc998fe846ef542c73ea30fd87fa8e", 0xe8, 0x20004840, &(0x7f0000000080)={0x1a, 0x9, 0x1, 0x6, 0x8, 0x0, @broadcast}, 0x10) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000380)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x1, @mcast2}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) [ 1788.024336][ T2298] FAULT_INJECTION: forcing a failure. [ 1788.024336][ T2298] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1788.037732][ T2298] CPU: 1 PID: 2298 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1788.048173][ T2298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1788.058369][ T2298] Call Trace: [ 1788.061663][ T2298] [ 1788.064724][ T2298] dump_stack_lvl+0xda/0x130 [ 1788.069383][ T2298] dump_stack+0x15/0x20 08:00:06 executing program 0: bind$can_raw(0xffffffffffffffff, &(0x7f0000000200), 0x10) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x541701, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000040), 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCX25GCALLUSERDATA(r1, 0x89e4, &(0x7f0000000380)={0x71, "b41302c37b85e507d4bb71bd29ea433f95792d7730faa72e2b836fbfc9247191a8d97a87b936f4fb1566902ce08b4ccd1ef06c0b4b853df143c3fdadc2ef9ab9e036ea65cf819d826bd900d19d4a4d02fa053729f83fcda3537a1474bd17648a23456db404c4143b21b4c3ee7c4f69f730cb8b8e1501f2184d430000c200"}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x4e24, 0x4, @rand_addr=' \x01\x00', 0x8}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x728102, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo\x00') openat$cgroup_procs(r2, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) inotify_rm_watch(r0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r3) syz_genetlink_get_family_id$smc(&(0x7f00000002c0), r3) 08:00:06 executing program 5: r0 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_DEL(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x38, r0, 0x20, 0x70bd29, 0x25dfdbfb, {}, [@DEVLINK_ATTR_PORT_INDEX={0x8, 0x3, 0x3}, @handle=@pci={{0x8}, {0x11}}]}, 0x38}, 0x1, 0x0, 0x0, 0x40080}, 0x4000000) [ 1788.073591][ T2298] should_fail_ex+0x21f/0x230 [ 1788.078304][ T2298] __should_fail_alloc_page+0xfd/0x110 [ 1788.083957][ T2298] __alloc_pages+0x108/0x340 [ 1788.088583][ T2298] vma_alloc_folio+0x6a3/0x8c0 [ 1788.093447][ T2298] shmem_get_folio_gfp+0x801/0x1200 [ 1788.098777][ T2298] shmem_write_begin+0xa6/0x1d0 [ 1788.103695][ T2298] generic_perform_write+0x1cf/0x410 [ 1788.109027][ T2298] ? shmem_write_begin+0x1d0/0x1d0 [ 1788.114173][ T2298] __generic_file_write_iter+0xa1/0x120 [ 1788.119847][ T2298] generic_file_write_iter+0x7d/0x1c0 [ 1788.125279][ T2298] vfs_write+0x4ab/0x7d0 [ 1788.129542][ T2298] ksys_write+0xeb/0x1a0 [ 1788.133857][ T2298] __x64_sys_write+0x42/0x50 [ 1788.138551][ T2298] do_syscall_64+0x41/0xc0 [ 1788.143056][ T2298] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1788.149210][ T2298] RIP: 0033:0x7f3d42967b29 [ 1788.153623][ T2298] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 08:00:06 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 89) 08:00:06 executing program 5: prctl$PR_CAPBSET_READ(0x17, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/\x83Ev/bs\'\x00') 08:00:06 executing program 0: bind$can_raw(0xffffffffffffffff, &(0x7f0000000200), 0x10) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x541701, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000040), 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCX25GCALLUSERDATA(r1, 0x89e4, &(0x7f0000000380)={0x71, "b41302c37b85e507d4bb71bd29ea433f95792d7730faa72e2b836fbfc9247191a8d97a87b936f4fb1566902ce08b4ccd1ef06c0b4b853df143c3fdadc2ef9ab9e036ea65cf819d826bd900d19d4a4d02fa053729f83fcda3537a1474bd17648a23456db404c4143b21b4c3ee7c4f69f730cb8b8e1501f2184d430000c200"}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x4e24, 0x4, @rand_addr=' \x01\x00', 0x8}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x728102, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo\x00') openat$cgroup_procs(r2, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) inotify_rm_watch(r0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r3) 08:00:06 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) sendto$llc(r1, &(0x7f0000000280)="c3a26d78a697088ac59a74b3c6dd2dd5911739b1e20b7f5d7ec602094e0c0d6379b9cd7a161f816ec057ba44fcda86cbd051cc2512981bf0590099b8bc59381d9cd284b4bc383ecb4936d32368fe7d2ca349a3f4e9d55a0ba884382645a19c0c02753adf661d69fbdcf732cb0339c607a835eaebf6b07ef22f9657301d7dfacde765f0eba5cfdc4e9b923a6610bc372d94f5f20450fcf53f5fbbb90cd40fd562c2c2d5cbe64a8cae730ca4f544918514cc57926673b14124c03697b1775013d1bf9359907a0b4e79b6e2b8ccfdcd44f6bb3ab000513373ad37dc998fe846ef542c73ea30fd87fa8e", 0xe8, 0x20004840, &(0x7f0000000080)={0x1a, 0x9, 0x1, 0x6, 0x8, 0x0, @broadcast}, 0x10) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000380)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x1, @mcast2}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:06 executing program 4: prctl$PR_SET_NAME(0x35, 0x0) 08:00:06 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400300}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 08:00:06 executing program 0: bind$can_raw(0xffffffffffffffff, &(0x7f0000000200), 0x10) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x541701, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000040), 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCX25GCALLUSERDATA(r1, 0x89e4, &(0x7f0000000380)={0x71, "b41302c37b85e507d4bb71bd29ea433f95792d7730faa72e2b836fbfc9247191a8d97a87b936f4fb1566902ce08b4ccd1ef06c0b4b853df143c3fdadc2ef9ab9e036ea65cf819d826bd900d19d4a4d02fa053729f83fcda3537a1474bd17648a23456db404c4143b21b4c3ee7c4f69f730cb8b8e1501f2184d430000c200"}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x4e24, 0x4, @rand_addr=' \x01\x00', 0x8}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x728102, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo\x00') openat$cgroup_procs(r2, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) inotify_rm_watch(r0, 0x0) pipe(&(0x7f0000000140)) [ 1788.173235][ T2298] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1788.181686][ T2298] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1788.189787][ T2298] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1788.197760][ T2298] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1788.205832][ T2298] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1788.213853][ T2298] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1788.221870][ T2298] 08:00:06 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) sendto$llc(r1, &(0x7f0000000280)="c3a26d78a697088ac59a74b3c6dd2dd5911739b1e20b7f5d7ec602094e0c0d6379b9cd7a161f816ec057ba44fcda86cbd051cc2512981bf0590099b8bc59381d9cd284b4bc383ecb4936d32368fe7d2ca349a3f4e9d55a0ba884382645a19c0c02753adf661d69fbdcf732cb0339c607a835eaebf6b07ef22f9657301d7dfacde765f0eba5cfdc4e9b923a6610bc372d94f5f20450fcf53f5fbbb90cd40fd562c2c2d5cbe64a8cae730ca4f544918514cc57926673b14124c03697b1775013d1bf9359907a0b4e79b6e2b8ccfdcd44f6bb3ab000513373ad37dc998fe846ef542c73ea30fd87fa8e", 0xe8, 0x20004840, &(0x7f0000000080)={0x1a, 0x9, 0x1, 0x6, 0x8, 0x0, @broadcast}, 0x10) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000380)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x1, @mcast2}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) pipe2$watch_queue(&(0x7f0000000040), 0x80) (async) sendto$llc(r1, &(0x7f0000000280)="c3a26d78a697088ac59a74b3c6dd2dd5911739b1e20b7f5d7ec602094e0c0d6379b9cd7a161f816ec057ba44fcda86cbd051cc2512981bf0590099b8bc59381d9cd284b4bc383ecb4936d32368fe7d2ca349a3f4e9d55a0ba884382645a19c0c02753adf661d69fbdcf732cb0339c607a835eaebf6b07ef22f9657301d7dfacde765f0eba5cfdc4e9b923a6610bc372d94f5f20450fcf53f5fbbb90cd40fd562c2c2d5cbe64a8cae730ca4f544918514cc57926673b14124c03697b1775013d1bf9359907a0b4e79b6e2b8ccfdcd44f6bb3ab000513373ad37dc998fe846ef542c73ea30fd87fa8e", 0xe8, 0x20004840, &(0x7f0000000080)={0x1a, 0x9, 0x1, 0x6, 0x8, 0x0, @broadcast}, 0x10) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000380)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x1, @mcast2}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) 08:00:06 executing program 4: prctl$PR_SET_NAME(0x35, 0x0) 08:00:06 executing program 5: prctl$PR_CAPBSET_READ(0x17, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/\x83Ev/bs\'\x00') 08:00:06 executing program 4: prctl$PR_SET_NAME(0x35, 0x0) 08:00:06 executing program 5: prctl$PR_CAPBSET_READ(0x17, 0x0) (async) prctl$PR_CAPBSET_READ(0x17, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/\x83Ev/bs\'\x00') [ 1788.285855][ T2328] FAULT_INJECTION: forcing a failure. [ 1788.285855][ T2328] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1788.299067][ T2328] CPU: 0 PID: 2328 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1788.309462][ T2328] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1788.319550][ T2328] Call Trace: [ 1788.322939][ T2328] [ 1788.325887][ T2328] dump_stack_lvl+0xda/0x130 [ 1788.330520][ T2328] dump_stack+0x15/0x20 [ 1788.334745][ T2328] should_fail_ex+0x21f/0x230 [ 1788.339499][ T2328] should_fail+0xb/0x10 [ 1788.343723][ T2328] should_fail_usercopy+0x1a/0x20 [ 1788.348860][ T2328] copy_page_from_iter_atomic+0x22d/0xcf0 [ 1788.354629][ T2328] ? folio_test_hugetlb+0x3a/0x70 [ 1788.359693][ T2328] ? shmem_write_begin+0x12a/0x1d0 [ 1788.364935][ T2328] generic_perform_write+0x212/0x410 [ 1788.370258][ T2328] ? shmem_write_begin+0x1d0/0x1d0 [ 1788.375537][ T2328] __generic_file_write_iter+0xa1/0x120 [ 1788.381203][ T2328] generic_file_write_iter+0x7d/0x1c0 [ 1788.386612][ T2328] vfs_write+0x4ab/0x7d0 [ 1788.390873][ T2328] ksys_write+0xeb/0x1a0 [ 1788.395225][ T2328] __x64_sys_write+0x42/0x50 [ 1788.399894][ T2328] do_syscall_64+0x41/0xc0 [ 1788.404323][ T2328] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1788.410239][ T2328] RIP: 0033:0x7f3d42967b29 [ 1788.414688][ T2328] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1788.434327][ T2328] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1788.442741][ T2328] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1788.450747][ T2328] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1788.458775][ T2328] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1788.466827][ T2328] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1788.474862][ T2328] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1788.482847][ T2328] 08:00:06 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 90) 08:00:06 executing program 4: prctl$PR_SET_NAME(0x34, &(0x7f0000000040)='/dev/bsg\x00') 08:00:06 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 08:00:06 executing program 0: bind$can_raw(0xffffffffffffffff, &(0x7f0000000200), 0x10) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x541701, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000040), 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCX25GCALLUSERDATA(r1, 0x89e4, &(0x7f0000000380)={0x71, "b41302c37b85e507d4bb71bd29ea433f95792d7730faa72e2b836fbfc9247191a8d97a87b936f4fb1566902ce08b4ccd1ef06c0b4b853df143c3fdadc2ef9ab9e036ea65cf819d826bd900d19d4a4d02fa053729f83fcda3537a1474bd17648a23456db404c4143b21b4c3ee7c4f69f730cb8b8e1501f2184d430000c200"}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x4e24, 0x4, @rand_addr=' \x01\x00', 0x8}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x728102, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo\x00') openat$cgroup_procs(r2, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) inotify_rm_watch(r0, 0x0) 08:00:06 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x1, 0x9f, {"b8c6a74b2090419a2284e3d6a4aaeecd"}, 0xffffffffffff4f66, 0x5d4e2e5f, 0x4}}}, 0xa0) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/schedstat\x00', 0x0, 0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x90, 0x0, 0x400, 0x70bd27, 0x25dfdbfc, {}, [@NBD_ATTR_SOCKETS={0x44, 0x7, 0x0, 0x1, [{0x8, 0x1, r2}, {0x8, 0x1, r0}, {0x8, 0x1, r0}, {0x8, 0x1, r3}, {0x8, 0x1, r0}, {0x8, 0x1, r0}, {0x8, 0x1, r4}, {0x8, 0x1, r0}]}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x70fb22f8}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x8}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x401}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x8000000000000000}]}, 0x90}}, 0x4044805) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) openat$random(0xffffffffffffff9c, &(0x7f0000000480), 0x400, 0x0) 08:00:06 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000080)={'fscrypt:', @desc3}, &(0x7f00000000c0)={0x0, "eb30e4d62cacb01913980e0dde9de0e8d8137771879c968788bb4b8dd7a873ad5faae32a228afc555e3fa44d130162861d89833ab11a2edcc43fa4d0fcf50f84", 0x34}, 0x48, 0xfffffffffffffffb) 08:00:06 executing program 4: prctl$PR_SET_NAME(0x34, &(0x7f0000000040)='/dev/bsg\x00') 08:00:06 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x1, 0x9f, {"b8c6a74b2090419a2284e3d6a4aaeecd"}, 0xffffffffffff4f66, 0x5d4e2e5f, 0x4}}}, 0xa0) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/schedstat\x00', 0x0, 0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x90, 0x0, 0x400, 0x70bd27, 0x25dfdbfc, {}, [@NBD_ATTR_SOCKETS={0x44, 0x7, 0x0, 0x1, [{0x8, 0x1, r2}, {0x8, 0x1, r0}, {0x8, 0x1, r0}, {0x8, 0x1, r3}, {0x8, 0x1, r0}, {0x8, 0x1, r0}, {0x8, 0x1, r4}, {0x8, 0x1, r0}]}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x70fb22f8}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x8}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x401}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x8000000000000000}]}, 0x90}}, 0x4044805) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) openat$random(0xffffffffffffff9c, &(0x7f0000000480), 0x400, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x1, 0x9f, {"b8c6a74b2090419a2284e3d6a4aaeecd"}, 0xffffffffffff4f66, 0x5d4e2e5f, 0x4}}}, 0xa0) (async) pipe2$watch_queue(&(0x7f0000000080), 0x80) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)) (async) openat$procfs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/schedstat\x00', 0x0, 0x0) (async) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x90, 0x0, 0x400, 0x70bd27, 0x25dfdbfc, {}, [@NBD_ATTR_SOCKETS={0x44, 0x7, 0x0, 0x1, [{0x8, 0x1, r2}, {0x8, 0x1, r0}, {0x8, 0x1, r0}, {0x8, 0x1, r3}, {0x8, 0x1, r0}, {0x8, 0x1, r0}, {0x8, 0x1, r4}, {0x8, 0x1, r0}]}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x70fb22f8}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x8}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x401}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x8000000000000000}]}, 0x90}}, 0x4044805) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) openat$random(0xffffffffffffff9c, &(0x7f0000000480), 0x400, 0x0) (async) 08:00:06 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000080)={'fscrypt:', @desc3}, &(0x7f00000000c0)={0x0, "eb30e4d62cacb01913980e0dde9de0e8d8137771879c968788bb4b8dd7a873ad5faae32a228afc555e3fa44d130162861d89833ab11a2edcc43fa4d0fcf50f84", 0x34}, 0x48, 0xfffffffffffffffb) 08:00:06 executing program 0: bind$can_raw(0xffffffffffffffff, &(0x7f0000000200), 0x10) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x541701, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000040), 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCX25GCALLUSERDATA(r1, 0x89e4, &(0x7f0000000380)={0x71, "b41302c37b85e507d4bb71bd29ea433f95792d7730faa72e2b836fbfc9247191a8d97a87b936f4fb1566902ce08b4ccd1ef06c0b4b853df143c3fdadc2ef9ab9e036ea65cf819d826bd900d19d4a4d02fa053729f83fcda3537a1474bd17648a23456db404c4143b21b4c3ee7c4f69f730cb8b8e1501f2184d430000c200"}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x4e24, 0x4, @rand_addr=' \x01\x00', 0x8}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x728102, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo\x00') openat$cgroup_procs(r2, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) 08:00:06 executing program 0: bind$can_raw(0xffffffffffffffff, &(0x7f0000000200), 0x10) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x541701, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000040), 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCX25GCALLUSERDATA(r1, 0x89e4, &(0x7f0000000380)={0x71, "b41302c37b85e507d4bb71bd29ea433f95792d7730faa72e2b836fbfc9247191a8d97a87b936f4fb1566902ce08b4ccd1ef06c0b4b853df143c3fdadc2ef9ab9e036ea65cf819d826bd900d19d4a4d02fa053729f83fcda3537a1474bd17648a23456db404c4143b21b4c3ee7c4f69f730cb8b8e1501f2184d430000c200"}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x4e24, 0x4, @rand_addr=' \x01\x00', 0x8}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x728102, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) 08:00:06 executing program 4: prctl$PR_SET_NAME(0x34, &(0x7f0000000040)='/dev/bsg\x00') [ 1788.632024][ T2357] FAULT_INJECTION: forcing a failure. [ 1788.632024][ T2357] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1788.645407][ T2357] CPU: 0 PID: 2357 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1788.656120][ T2357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1788.666266][ T2357] Call Trace: [ 1788.669571][ T2357] [ 1788.672529][ T2357] dump_stack_lvl+0xda/0x130 [ 1788.677261][ T2357] dump_stack+0x15/0x20 [ 1788.681640][ T2357] should_fail_ex+0x21f/0x230 [ 1788.686344][ T2357] __should_fail_alloc_page+0xfd/0x110 [ 1788.691941][ T2357] __alloc_pages+0x108/0x340 [ 1788.696649][ T2357] vma_alloc_folio+0x6a3/0x8c0 [ 1788.701448][ T2357] shmem_get_folio_gfp+0x801/0x1200 [ 1788.706682][ T2357] shmem_write_begin+0xa6/0x1d0 [ 1788.711566][ T2357] generic_perform_write+0x1cf/0x410 [ 1788.716944][ T2357] ? shmem_write_begin+0x1d0/0x1d0 [ 1788.722083][ T2357] __generic_file_write_iter+0xa1/0x120 [ 1788.727671][ T2357] generic_file_write_iter+0x7d/0x1c0 [ 1788.733119][ T2357] vfs_write+0x4ab/0x7d0 [ 1788.737406][ T2357] ksys_write+0xeb/0x1a0 [ 1788.741689][ T2357] __x64_sys_write+0x42/0x50 [ 1788.746449][ T2357] do_syscall_64+0x41/0xc0 [ 1788.750904][ T2357] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1788.756889][ T2357] RIP: 0033:0x7f3d42967b29 [ 1788.761357][ T2357] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 08:00:06 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 91) 08:00:06 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 08:00:06 executing program 4: prctl$PR_SET_NAME(0x34, 0x0) 08:00:06 executing program 0: bind$can_raw(0xffffffffffffffff, &(0x7f0000000200), 0x10) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x541701, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000040), 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCX25GCALLUSERDATA(r1, 0x89e4, &(0x7f0000000380)={0x71, "b41302c37b85e507d4bb71bd29ea433f95792d7730faa72e2b836fbfc9247191a8d97a87b936f4fb1566902ce08b4ccd1ef06c0b4b853df143c3fdadc2ef9ab9e036ea65cf819d826bd900d19d4a4d02fa053729f83fcda3537a1474bd17648a23456db404c4143b21b4c3ee7c4f69f730cb8b8e1501f2184d430000c200"}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x4e24, 0x4, @rand_addr=' \x01\x00', 0x8}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x728102, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) 08:00:06 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x1, 0x9f, {"b8c6a74b2090419a2284e3d6a4aaeecd"}, 0xffffffffffff4f66, 0x5d4e2e5f, 0x4}}}, 0xa0) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/schedstat\x00', 0x0, 0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x90, 0x0, 0x400, 0x70bd27, 0x25dfdbfc, {}, [@NBD_ATTR_SOCKETS={0x44, 0x7, 0x0, 0x1, [{0x8, 0x1, r2}, {0x8, 0x1, r0}, {0x8, 0x1, r0}, {0x8, 0x1, r3}, {0x8, 0x1, r0}, {0x8, 0x1, r0}, {0x8, 0x1, r4}, {0x8, 0x1, r0}]}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x70fb22f8}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x8}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x401}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x8000000000000000}]}, 0x90}}, 0x4044805) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) openat$random(0xffffffffffffff9c, &(0x7f0000000480), 0x400, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x1, 0x9f, {"b8c6a74b2090419a2284e3d6a4aaeecd"}, 0xffffffffffff4f66, 0x5d4e2e5f, 0x4}}}, 0xa0) (async) pipe2$watch_queue(&(0x7f0000000080), 0x80) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)) (async) openat$procfs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/schedstat\x00', 0x0, 0x0) (async) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x90, 0x0, 0x400, 0x70bd27, 0x25dfdbfc, {}, [@NBD_ATTR_SOCKETS={0x44, 0x7, 0x0, 0x1, [{0x8, 0x1, r2}, {0x8, 0x1, r0}, {0x8, 0x1, r0}, {0x8, 0x1, r3}, {0x8, 0x1, r0}, {0x8, 0x1, r0}, {0x8, 0x1, r4}, {0x8, 0x1, r0}]}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x70fb22f8}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x8}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x401}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x8000000000000000}]}, 0x90}}, 0x4044805) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) openat$random(0xffffffffffffff9c, &(0x7f0000000480), 0x400, 0x0) (async) 08:00:06 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000080)={'fscrypt:', @desc3}, &(0x7f00000000c0)={0x0, "eb30e4d62cacb01913980e0dde9de0e8d8137771879c968788bb4b8dd7a873ad5faae32a228afc555e3fa44d130162861d89833ab11a2edcc43fa4d0fcf50f84", 0x34}, 0x48, 0xfffffffffffffffb) 08:00:06 executing program 4: prctl$PR_SET_NAME(0x34, 0x0) [ 1788.780969][ T2357] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1788.789381][ T2357] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1788.797370][ T2357] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1788.805401][ T2357] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1788.813427][ T2357] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1788.821402][ T2357] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1788.829414][ T2357] 08:00:06 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x1c, 0x0, @in={0x2, 0x4e22, @loopback}}}, 0xa0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280), r0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r2, 0x200, 0x70bd28, 0x25dfdbfe, {{}, {}, {0x8, 0x11, 0x81}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x8810}, 0x41) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:06 executing program 0: bind$can_raw(0xffffffffffffffff, &(0x7f0000000200), 0x10) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x541701, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000040), 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCX25GCALLUSERDATA(r1, 0x89e4, &(0x7f0000000380)={0x71, "b41302c37b85e507d4bb71bd29ea433f95792d7730faa72e2b836fbfc9247191a8d97a87b936f4fb1566902ce08b4ccd1ef06c0b4b853df143c3fdadc2ef9ab9e036ea65cf819d826bd900d19d4a4d02fa053729f83fcda3537a1474bd17648a23456db404c4143b21b4c3ee7c4f69f730cb8b8e1501f2184d430000c200"}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x4e24, 0x4, @rand_addr=' \x01\x00', 0x8}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x728102, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) 08:00:06 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) getsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000000)=[{}, {}], &(0x7f0000000080)=0x10) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') 08:00:06 executing program 4: prctl$PR_SET_NAME(0x34, 0x0) 08:00:06 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x1c, 0x0, @in={0x2, 0x4e22, @loopback}}}, 0xa0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280), r0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r2, 0x200, 0x70bd28, 0x25dfdbfe, {{}, {}, {0x8, 0x11, 0x81}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x8810}, 0x41) (async) sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r2, 0x200, 0x70bd28, 0x25dfdbfe, {{}, {}, {0x8, 0x11, 0x81}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x8810}, 0x41) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) [ 1788.882567][ T2399] FAULT_INJECTION: forcing a failure. [ 1788.882567][ T2399] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1788.895685][ T2399] CPU: 0 PID: 2399 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1788.906075][ T2399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1788.916164][ T2399] Call Trace: [ 1788.919475][ T2399] [ 1788.922424][ T2399] dump_stack_lvl+0xda/0x130 [ 1788.927122][ T2399] dump_stack+0x15/0x20 [ 1788.931315][ T2399] should_fail_ex+0x21f/0x230 [ 1788.936029][ T2399] should_fail+0xb/0x10 [ 1788.940212][ T2399] should_fail_usercopy+0x1a/0x20 [ 1788.945272][ T2399] copy_page_from_iter_atomic+0x22d/0xcf0 [ 1788.951075][ T2399] ? folio_test_hugetlb+0x3a/0x70 [ 1788.956223][ T2399] ? shmem_write_begin+0x12a/0x1d0 [ 1788.961439][ T2399] generic_perform_write+0x212/0x410 [ 1788.966964][ T2399] ? shmem_write_begin+0x1d0/0x1d0 [ 1788.972104][ T2399] __generic_file_write_iter+0xa1/0x120 [ 1788.977757][ T2399] generic_file_write_iter+0x7d/0x1c0 [ 1788.983154][ T2399] vfs_write+0x4ab/0x7d0 [ 1788.987499][ T2399] ksys_write+0xeb/0x1a0 [ 1788.991823][ T2399] __x64_sys_write+0x42/0x50 [ 1788.996430][ T2399] do_syscall_64+0x41/0xc0 [ 1789.000851][ T2399] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1789.006780][ T2399] RIP: 0033:0x7f3d42967b29 [ 1789.011213][ T2399] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1789.030846][ T2399] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1789.039264][ T2399] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1789.047247][ T2399] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1789.055227][ T2399] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1789.063338][ T2399] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1789.071307][ T2399] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1789.079365][ T2399] 08:00:07 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 92) 08:00:07 executing program 4: prctl$PR_SET_NAME(0x34, 0x0) 08:00:07 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x1c, 0x0, @in={0x2, 0x4e22, @loopback}}}, 0xa0) (async) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280), r0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r2, 0x200, 0x70bd28, 0x25dfdbfe, {{}, {}, {0x8, 0x11, 0x81}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x8810}, 0x41) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:07 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) getsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000000)=[{}, {}], &(0x7f0000000080)=0x10) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') pipe(&(0x7f0000000140)) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) (async) getsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000000)=[{}, {}], &(0x7f0000000080)=0x10) (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') (async) 08:00:07 executing program 0: bind$can_raw(0xffffffffffffffff, &(0x7f0000000200), 0x10) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x541701, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000040), 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCX25GCALLUSERDATA(r1, 0x89e4, &(0x7f0000000380)={0x71, "b41302c37b85e507d4bb71bd29ea433f95792d7730faa72e2b836fbfc9247191a8d97a87b936f4fb1566902ce08b4ccd1ef06c0b4b853df143c3fdadc2ef9ab9e036ea65cf819d826bd900d19d4a4d02fa053729f83fcda3537a1474bd17648a23456db404c4143b21b4c3ee7c4f69f730cb8b8e1501f2184d430000c200"}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x4e24, 0x4, @rand_addr=' \x01\x00', 0x8}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo\x00') openat$cgroup_procs(r2, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) 08:00:07 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 08:00:07 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001680), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x1, @ib={0x1b, 0x0, 0x1000, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r3) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x1, @private2}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:07 executing program 0: bind$can_raw(0xffffffffffffffff, &(0x7f0000000200), 0x10) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x541701, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000040), 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCX25GCALLUSERDATA(r1, 0x89e4, &(0x7f0000000380)={0x71, "b41302c37b85e507d4bb71bd29ea433f95792d7730faa72e2b836fbfc9247191a8d97a87b936f4fb1566902ce08b4ccd1ef06c0b4b853df143c3fdadc2ef9ab9e036ea65cf819d826bd900d19d4a4d02fa053729f83fcda3537a1474bd17648a23456db404c4143b21b4c3ee7c4f69f730cb8b8e1501f2184d430000c200"}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x4e24, 0x4, @rand_addr=' \x01\x00', 0x8}}}, 0xa0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo\x00') openat$cgroup_procs(r2, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) 08:00:07 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) getsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000000)=[{}, {}], &(0x7f0000000080)=0x10) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') 08:00:07 executing program 0: bind$can_raw(0xffffffffffffffff, &(0x7f0000000200), 0x10) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x541701, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000040), 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCX25GCALLUSERDATA(r1, 0x89e4, &(0x7f0000000380)={0x71, "b41302c37b85e507d4bb71bd29ea433f95792d7730faa72e2b836fbfc9247191a8d97a87b936f4fb1566902ce08b4ccd1ef06c0b4b853df143c3fdadc2ef9ab9e036ea65cf819d826bd900d19d4a4d02fa053729f83fcda3537a1474bd17648a23456db404c4143b21b4c3ee7c4f69f730cb8b8e1501f2184d430000c200"}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo\x00') openat$cgroup_procs(r2, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) [ 1789.230163][ T2429] FAULT_INJECTION: forcing a failure. [ 1789.230163][ T2429] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1789.243573][ T2429] CPU: 0 PID: 2429 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1789.253954][ T2429] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1789.264110][ T2429] Call Trace: [ 1789.267403][ T2429] [ 1789.270343][ T2429] dump_stack_lvl+0xda/0x130 [ 1789.274958][ T2429] dump_stack+0x15/0x20 08:00:07 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001680), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x1, @ib={0x1b, 0x0, 0x1000, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r3) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x1, @private2}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:07 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000080)='/\x00ev\xff\x7f\x00S>\x92f\xabC\xc0\xfa\x0f\x02\xeb\xb6E`+~\xd7\x86\x01\x96\xc1\xd7\xca\xb4\xda\xf2rHR|\x9d\x06\xb2`\xf9\xd4H!\x13\x89@SZ\xcfV3\xcd\x9bB\xca\x04+\xb4\xa2\xb1=\xe9iA\x10D\xa3\x8f\xe7\x7f\xd9X\xc3&\x81\xf4\\\xf4\x80$z\x19[\xd3\xaa\xa2\x12Ue\x1b\xb3*`=(3F\xa7Wf\xe7>l\xc1wqc\xfb\xff\xd6\xcb\x81\xda\xb03\x99E') [ 1789.279137][ T2429] should_fail_ex+0x21f/0x230 [ 1789.283850][ T2429] __should_fail_alloc_page+0xfd/0x110 [ 1789.289408][ T2429] __alloc_pages+0x108/0x340 [ 1789.294035][ T2429] vma_alloc_folio+0x6a3/0x8c0 [ 1789.298946][ T2429] shmem_get_folio_gfp+0x801/0x1200 [ 1789.304192][ T2429] shmem_write_begin+0xa6/0x1d0 [ 1789.309087][ T2429] generic_perform_write+0x1cf/0x410 [ 1789.314420][ T2429] ? shmem_write_begin+0x1d0/0x1d0 [ 1789.319607][ T2429] __generic_file_write_iter+0xa1/0x120 [ 1789.325263][ T2429] generic_file_write_iter+0x7d/0x1c0 [ 1789.330727][ T2429] vfs_write+0x4ab/0x7d0 [ 1789.335071][ T2429] ksys_write+0xeb/0x1a0 [ 1789.339357][ T2429] __x64_sys_write+0x42/0x50 [ 1789.344153][ T2429] do_syscall_64+0x41/0xc0 [ 1789.348608][ T2429] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1789.354614][ T2429] RIP: 0033:0x7f3d42967b29 [ 1789.359154][ T2429] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 08:00:07 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 93) 08:00:07 executing program 1: openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001680), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x0, 0x1, @ib={0x1b, 0x0, 0x1000, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) pipe(&(0x7f0000000140)) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r3) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r3) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x1, @private2}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:07 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000080)='/\x00ev\xff\x7f\x00S>\x92f\xabC\xc0\xfa\x0f\x02\xeb\xb6E`+~\xd7\x86\x01\x96\xc1\xd7\xca\xb4\xda\xf2rHR|\x9d\x06\xb2`\xf9\xd4H!\x13\x89@SZ\xcfV3\xcd\x9bB\xca\x04+\xb4\xa2\xb1=\xe9iA\x10D\xa3\x8f\xe7\x7f\xd9X\xc3&\x81\xf4\\\xf4\x80$z\x19[\xd3\xaa\xa2\x12Ue\x1b\xb3*`=(3F\xa7Wf\xe7>l\xc1wqc\xfb\xff\xd6\xcb\x81\xda\xb03\x99E') 08:00:07 executing program 4: prctl$PR_SET_NAME(0x34, 0x0) 08:00:07 executing program 0: bind$can_raw(0xffffffffffffffff, &(0x7f0000000200), 0x10) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x541701, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000040), 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCX25GCALLUSERDATA(r1, 0x89e4, &(0x7f0000000380)={0x71, "b41302c37b85e507d4bb71bd29ea433f95792d7730faa72e2b836fbfc9247191a8d97a87b936f4fb1566902ce08b4ccd1ef06c0b4b853df143c3fdadc2ef9ab9e036ea65cf819d826bd900d19d4a4d02fa053729f83fcda3537a1474bd17648a23456db404c4143b21b4c3ee7c4f69f730cb8b8e1501f2184d430000c200"}) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo\x00') openat$cgroup_procs(r2, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) 08:00:07 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 08:00:07 executing program 4: prctl$PR_SET_NAME(0x34, 0x0) [ 1789.378785][ T2429] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1789.387205][ T2429] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1789.395187][ T2429] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1789.403223][ T2429] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1789.411193][ T2429] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1789.419285][ T2429] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1789.427349][ T2429] 08:00:07 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) accept4$vsock_stream(r0, &(0x7f00000006c0)={0x28, 0x0, 0xffffffff}, 0x10, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x4e20, @local}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) openat$full(0xffffffffffffff9c, &(0x7f0000000700), 0x416700, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000740)='/proc/meminfo\x00', 0x0, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r3) r4 = socket$phonet(0x23, 0x2, 0x1) ioctl$SIOCPNDELRESOURCE(r4, 0x89ef, &(0x7f0000000680)) ioctl$PIO_FONTX(r2, 0x4b6c, &(0x7f0000000080)={0x4e, 0x18, &(0x7f0000000280)="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"}) ioctl$VT_SETMODE(r2, 0x5602, &(0x7f0000000800)={0x6, 0xff, 0x1, 0xc8, 0x3}) getsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x4, &(0x7f0000000780), &(0x7f00000007c0)=0x4) 08:00:07 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000080)='/\x00ev\xff\x7f\x00S>\x92f\xabC\xc0\xfa\x0f\x02\xeb\xb6E`+~\xd7\x86\x01\x96\xc1\xd7\xca\xb4\xda\xf2rHR|\x9d\x06\xb2`\xf9\xd4H!\x13\x89@SZ\xcfV3\xcd\x9bB\xca\x04+\xb4\xa2\xb1=\xe9iA\x10D\xa3\x8f\xe7\x7f\xd9X\xc3&\x81\xf4\\\xf4\x80$z\x19[\xd3\xaa\xa2\x12Ue\x1b\xb3*`=(3F\xa7Wf\xe7>l\xc1wqc\xfb\xff\xd6\xcb\x81\xda\xb03\x99E') 08:00:07 executing program 5: setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, &(0x7f0000000080)=0x9, 0x8) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/bsI\x00') pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) accept4$vsock_stream(r0, &(0x7f0000000100)={0x28, 0x0, 0x2710, @hyper}, 0x10, 0x800) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsI\x00') 08:00:07 executing program 4: prctl$PR_SET_NAME(0x2f, &(0x7f0000000040)='/dev/bsg\x00') [ 1789.470533][ T2455] FAULT_INJECTION: forcing a failure. [ 1789.470533][ T2455] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1789.483680][ T2455] CPU: 0 PID: 2455 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1789.494057][ T2455] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1789.504127][ T2455] Call Trace: [ 1789.507414][ T2455] [ 1789.510357][ T2455] dump_stack_lvl+0xda/0x130 [ 1789.515032][ T2455] dump_stack+0x15/0x20 08:00:07 executing program 5: setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, &(0x7f0000000080)=0x9, 0x8) (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/bsI\x00') pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) accept4$vsock_stream(r0, &(0x7f0000000100)={0x28, 0x0, 0x2710, @hyper}, 0x10, 0x800) (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsI\x00') [ 1789.519283][ T2455] should_fail_ex+0x21f/0x230 [ 1789.523991][ T2455] should_fail+0xb/0x10 [ 1789.528166][ T2455] should_fail_usercopy+0x1a/0x20 [ 1789.533219][ T2455] copy_page_from_iter_atomic+0x22d/0xcf0 [ 1789.539051][ T2455] ? folio_test_hugetlb+0x3a/0x70 [ 1789.544171][ T2455] ? shmem_write_begin+0x12a/0x1d0 [ 1789.549379][ T2455] generic_perform_write+0x212/0x410 [ 1789.554700][ T2455] ? shmem_write_begin+0x1d0/0x1d0 [ 1789.559842][ T2455] __generic_file_write_iter+0xa1/0x120 [ 1789.565415][ T2455] generic_file_write_iter+0x7d/0x1c0 [ 1789.570959][ T2455] vfs_write+0x4ab/0x7d0 [ 1789.575247][ T2455] ksys_write+0xeb/0x1a0 [ 1789.579542][ T2455] __x64_sys_write+0x42/0x50 [ 1789.584168][ T2455] do_syscall_64+0x41/0xc0 [ 1789.588616][ T2455] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1789.594543][ T2455] RIP: 0033:0x7f3d42967b29 [ 1789.598960][ T2455] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1789.618584][ T2455] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1789.627011][ T2455] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1789.634988][ T2455] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1789.643034][ T2455] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1789.651010][ T2455] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1789.659131][ T2455] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1789.667482][ T2455] 08:00:07 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 94) 08:00:07 executing program 0: bind$can_raw(0xffffffffffffffff, &(0x7f0000000200), 0x10) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x541701, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000040), 0x2, 0x0) pipe(&(0x7f0000000140)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo\x00') openat$cgroup_procs(r1, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) 08:00:07 executing program 5: setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, &(0x7f0000000080)=0x9, 0x8) (async, rerun: 64) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/bsI\x00') (rerun: 64) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) (async) accept4$vsock_stream(r0, &(0x7f0000000100)={0x28, 0x0, 0x2710, @hyper}, 0x10, 0x800) (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsI\x00') 08:00:07 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 08:00:07 executing program 4: prctl$PR_SET_NAME(0x2f, &(0x7f0000000040)='/dev/bsg\x00') 08:00:07 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) (async) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) accept4$vsock_stream(r0, &(0x7f00000006c0)={0x28, 0x0, 0xffffffff}, 0x10, 0x0) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x4e20, @local}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000700), 0x416700, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000740)='/proc/meminfo\x00', 0x0, 0x0) (async) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r3) (async) r4 = socket$phonet(0x23, 0x2, 0x1) ioctl$SIOCPNDELRESOURCE(r4, 0x89ef, &(0x7f0000000680)) ioctl$PIO_FONTX(r2, 0x4b6c, &(0x7f0000000080)={0x4e, 0x18, &(0x7f0000000280)="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"}) ioctl$VT_SETMODE(r2, 0x5602, &(0x7f0000000800)={0x6, 0xff, 0x1, 0xc8, 0x3}) (async) getsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x4, &(0x7f0000000780), &(0x7f00000007c0)=0x4) 08:00:07 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='\'Hev/bsg\x00X\xad\x84--mE\xfbl\xee\xda\xcbZ\x8fH\xcf\x124\xfeJ\x92\x86\xc5b\xea\xf6\x026M\x00\"\x95\xcam\x93\xaf\t\xe3\x10\x00\x01?-\x8b\xc1\xd71\xf6\x1fk\xea7\xb9\xc8\'5\xb0\x8bF\x03\xb5?8\x8c\x8dy\xa6\x96g\xa3\x9e~\x85\xf1\x05\xdb\xcc\xd2\xfe\xcd\x8c\x9bl\x84\xdeqp\n\xb1\t\x9b\xd0\x8f\x7f\xcc\x0e@\x04}g\xee\xe9\x9c\xa4\xc8\xad\xe5Z]h\x17\xa5V\xe2G') pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f0000000000)) 08:00:07 executing program 4: prctl$PR_SET_NAME(0x2f, &(0x7f0000000040)='/dev/bsg\x00') 08:00:07 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 64) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (rerun: 64) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) accept4$vsock_stream(r0, &(0x7f00000006c0)={0x28, 0x0, 0xffffffff}, 0x10, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x4e20, @local}}}, 0xa0) (async, rerun: 64) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async, rerun: 64) openat$full(0xffffffffffffff9c, &(0x7f0000000700), 0x416700, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000740)='/proc/meminfo\x00', 0x0, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) (async, rerun: 32) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 32) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r3) r4 = socket$phonet(0x23, 0x2, 0x1) ioctl$SIOCPNDELRESOURCE(r4, 0x89ef, &(0x7f0000000680)) (async) ioctl$PIO_FONTX(r2, 0x4b6c, &(0x7f0000000080)={0x4e, 0x18, &(0x7f0000000280)="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"}) (async) ioctl$VT_SETMODE(r2, 0x5602, &(0x7f0000000800)={0x6, 0xff, 0x1, 0xc8, 0x3}) getsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x4, &(0x7f0000000780), &(0x7f00000007c0)=0x4) 08:00:07 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='\'Hev/bsg\x00X\xad\x84--mE\xfbl\xee\xda\xcbZ\x8fH\xcf\x124\xfeJ\x92\x86\xc5b\xea\xf6\x026M\x00\"\x95\xcam\x93\xaf\t\xe3\x10\x00\x01?-\x8b\xc1\xd71\xf6\x1fk\xea7\xb9\xc8\'5\xb0\x8bF\x03\xb5?8\x8c\x8dy\xa6\x96g\xa3\x9e~\x85\xf1\x05\xdb\xcc\xd2\xfe\xcd\x8c\x9bl\x84\xdeqp\n\xb1\t\x9b\xd0\x8f\x7f\xcc\x0e@\x04}g\xee\xe9\x9c\xa4\xc8\xad\xe5Z]h\x17\xa5V\xe2G') (async, rerun: 64) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 64) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f0000000000)) [ 1789.812816][ T2489] FAULT_INJECTION: forcing a failure. [ 1789.812816][ T2489] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1789.826186][ T2489] CPU: 0 PID: 2489 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1789.836545][ T2489] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1789.846646][ T2489] Call Trace: [ 1789.849939][ T2489] [ 1789.852887][ T2489] dump_stack_lvl+0xda/0x130 [ 1789.857527][ T2489] dump_stack+0x15/0x20 08:00:07 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) [ 1789.861725][ T2489] should_fail_ex+0x21f/0x230 [ 1789.866430][ T2489] __should_fail_alloc_page+0xfd/0x110 [ 1789.871939][ T2489] __alloc_pages+0x108/0x340 [ 1789.876593][ T2489] vma_alloc_folio+0x6a3/0x8c0 [ 1789.881453][ T2489] shmem_get_folio_gfp+0x801/0x1200 [ 1789.886701][ T2489] shmem_write_begin+0xa6/0x1d0 [ 1789.891614][ T2489] generic_perform_write+0x1cf/0x410 [ 1789.896988][ T2489] ? shmem_write_begin+0x1d0/0x1d0 [ 1789.902133][ T2489] __generic_file_write_iter+0xa1/0x120 [ 1789.907781][ T2489] generic_file_write_iter+0x7d/0x1c0 08:00:07 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='\'Hev/bsg\x00X\xad\x84--mE\xfbl\xee\xda\xcbZ\x8fH\xcf\x124\xfeJ\x92\x86\xc5b\xea\xf6\x026M\x00\"\x95\xcam\x93\xaf\t\xe3\x10\x00\x01?-\x8b\xc1\xd71\xf6\x1fk\xea7\xb9\xc8\'5\xb0\x8bF\x03\xb5?8\x8c\x8dy\xa6\x96g\xa3\x9e~\x85\xf1\x05\xdb\xcc\xd2\xfe\xcd\x8c\x9bl\x84\xdeqp\n\xb1\t\x9b\xd0\x8f\x7f\xcc\x0e@\x04}g\xee\xe9\x9c\xa4\xc8\xad\xe5Z]h\x17\xa5V\xe2G') pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) (async) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f0000000000)) [ 1789.913259][ T2489] vfs_write+0x4ab/0x7d0 [ 1789.917741][ T2489] ksys_write+0xeb/0x1a0 [ 1789.922031][ T2489] __x64_sys_write+0x42/0x50 [ 1789.926664][ T2489] do_syscall_64+0x41/0xc0 [ 1789.931134][ T2489] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1789.937067][ T2489] RIP: 0033:0x7f3d42967b29 [ 1789.941541][ T2489] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 08:00:08 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 95) 08:00:08 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdb060000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 08:00:08 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') socket$xdp(0x2c, 0x3, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000080)='\x00') prctl$PR_SET_NAME(0xf, &(0x7f0000000000)=',[}]^\x00') 08:00:08 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000400)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='syztnl1\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="7800800000000001000001984100008400682773e0000002ffffffffac141424ac1414aa7f000001ac1e0001ac1414bbffff7f0000019404000044448b1100000000000000020a01010200000000000024ac1e0001000000040000000000000006e000000200000800ac1414aa0000d381ffffffff00000007000000000000"]}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000540)={'sit0\x00', &(0x7f0000000480)={'ip_vti0\x00', 0x0, 0x1, 0x8000, 0x4, 0x40, {{0x1f, 0x4, 0x0, 0x6, 0x7c, 0x64, 0x0, 0xff, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@timestamp={0x44, 0x1c, 0x90, 0x0, 0x4, [0x0, 0x4, 0x0, 0x5, 0x0, 0x1f]}, @timestamp_addr={0x44, 0x4c, 0xe7, 0x1, 0x5, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x6}, {@empty, 0xfffffffd}, {@local, 0xffffffff}, {@remote, 0x7}, {@multicast2, 0x1}, {@empty, 0x1000}, {@dev={0xac, 0x14, 0x14, 0x32}, 0x7fffffff}, {@multicast2, 0x8a19}, {@multicast1, 0x8000}]}]}}}}}) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@bloom_filter={0x1e, 0x6, 0x7, 0x9, 0x1c0, r0, 0x400, '\x00', r1, 0xffffffffffffffff, 0x4, 0x0, 0x1, 0x3}, 0x48) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000040)=0x2, 0x8) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r3) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r3, &(0x7f0000000440)={0x11, 0x10, 0xfa00, {&(0x7f0000000300)}}, 0x18) pipe2$watch_queue(&(0x7f0000000080), 0x80) 08:00:08 executing program 0: bind$can_raw(0xffffffffffffffff, &(0x7f0000000200), 0x10) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x541701, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000040), 0x2, 0x0) pipe(&(0x7f0000000140)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo\x00') openat$cgroup_procs(r1, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) 08:00:08 executing program 4: prctl$PR_SET_NAME(0x2f, 0x0) [ 1789.961241][ T2489] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1789.969820][ T2489] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1789.977927][ T2489] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1789.986077][ T2489] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1789.994160][ T2489] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1790.002217][ T2489] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1790.010273][ T2489] 08:00:08 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') (async) socket$xdp(0x2c, 0x3, 0x0) (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000080)='\x00') (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)=',[}]^\x00') 08:00:08 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async, rerun: 64) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async, rerun: 64) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000400)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='syztnl1\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="7800800000000001000001984100008400682773e0000002ffffffffac141424ac1414aa7f000001ac1e0001ac1414bbffff7f0000019404000044448b1100000000000000020a01010200000000000024ac1e0001000000040000000000000006e000000200000800ac1414aa0000d381ffffffff00000007000000000000"]}) (async, rerun: 32) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 32) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) (async) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000540)={'sit0\x00', &(0x7f0000000480)={'ip_vti0\x00', 0x0, 0x1, 0x8000, 0x4, 0x40, {{0x1f, 0x4, 0x0, 0x6, 0x7c, 0x64, 0x0, 0xff, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@timestamp={0x44, 0x1c, 0x90, 0x0, 0x4, [0x0, 0x4, 0x0, 0x5, 0x0, 0x1f]}, @timestamp_addr={0x44, 0x4c, 0xe7, 0x1, 0x5, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x6}, {@empty, 0xfffffffd}, {@local, 0xffffffff}, {@remote, 0x7}, {@multicast2, 0x1}, {@empty, 0x1000}, {@dev={0xac, 0x14, 0x14, 0x32}, 0x7fffffff}, {@multicast2, 0x8a19}, {@multicast1, 0x8000}]}]}}}}}) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@bloom_filter={0x1e, 0x6, 0x7, 0x9, 0x1c0, r0, 0x400, '\x00', r1, 0xffffffffffffffff, 0x4, 0x0, 0x1, 0x3}, 0x48) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000040)=0x2, 0x8) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r3) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r3, &(0x7f0000000440)={0x11, 0x10, 0xfa00, {&(0x7f0000000300)}}, 0x18) (async, rerun: 32) pipe2$watch_queue(&(0x7f0000000080), 0x80) (rerun: 32) 08:00:08 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000400)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='syztnl1\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="7800800000000001000001984100008400682773e0000002ffffffffac141424ac1414aa7f000001ac1e0001ac1414bbffff7f0000019404000044448b1100000000000000020a01010200000000000024ac1e0001000000040000000000000006e000000200000800ac1414aa0000d381ffffffff00000007000000000000"]}) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) (async, rerun: 64) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000540)={'sit0\x00', &(0x7f0000000480)={'ip_vti0\x00', 0x0, 0x1, 0x8000, 0x4, 0x40, {{0x1f, 0x4, 0x0, 0x6, 0x7c, 0x64, 0x0, 0xff, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@timestamp={0x44, 0x1c, 0x90, 0x0, 0x4, [0x0, 0x4, 0x0, 0x5, 0x0, 0x1f]}, @timestamp_addr={0x44, 0x4c, 0xe7, 0x1, 0x5, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x6}, {@empty, 0xfffffffd}, {@local, 0xffffffff}, {@remote, 0x7}, {@multicast2, 0x1}, {@empty, 0x1000}, {@dev={0xac, 0x14, 0x14, 0x32}, 0x7fffffff}, {@multicast2, 0x8a19}, {@multicast1, 0x8000}]}]}}}}}) (async, rerun: 64) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@bloom_filter={0x1e, 0x6, 0x7, 0x9, 0x1c0, r0, 0x400, '\x00', r1, 0xffffffffffffffff, 0x4, 0x0, 0x1, 0x3}, 0x48) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000040)=0x2, 0x8) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r3) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r3, &(0x7f0000000440)={0x11, 0x10, 0xfa00, {&(0x7f0000000300)}}, 0x18) (async) pipe2$watch_queue(&(0x7f0000000080), 0x80) 08:00:08 executing program 0: bind$can_raw(0xffffffffffffffff, &(0x7f0000000200), 0x10) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x541701, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000040), 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo\x00') openat$cgroup_procs(r1, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) [ 1790.063358][ T2517] FAULT_INJECTION: forcing a failure. [ 1790.063358][ T2517] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1790.076654][ T2517] CPU: 1 PID: 2517 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1790.087012][ T2517] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1790.097178][ T2517] Call Trace: [ 1790.100483][ T2517] [ 1790.103514][ T2517] dump_stack_lvl+0xda/0x130 [ 1790.108199][ T2517] dump_stack+0x15/0x20 08:00:08 executing program 0: bind$can_raw(0xffffffffffffffff, &(0x7f0000000200), 0x10) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x541701, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo\x00') openat$cgroup_procs(r0, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) 08:00:08 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') (async) socket$xdp(0x2c, 0x3, 0x0) (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000080)='\x00') (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)=',[}]^\x00') [ 1790.112513][ T2517] should_fail_ex+0x21f/0x230 [ 1790.117216][ T2517] should_fail+0xb/0x10 [ 1790.121397][ T2517] should_fail_usercopy+0x1a/0x20 [ 1790.126540][ T2517] copy_page_from_iter_atomic+0x22d/0xcf0 [ 1790.132518][ T2517] ? folio_test_hugetlb+0x3a/0x70 [ 1790.137580][ T2517] ? shmem_write_begin+0x12a/0x1d0 [ 1790.142758][ T2517] generic_perform_write+0x212/0x410 [ 1790.148097][ T2517] ? shmem_write_begin+0x1d0/0x1d0 [ 1790.153295][ T2517] __generic_file_write_iter+0xa1/0x120 [ 1790.158886][ T2517] generic_file_write_iter+0x7d/0x1c0 [ 1790.164411][ T2517] vfs_write+0x4ab/0x7d0 [ 1790.168767][ T2517] ksys_write+0xeb/0x1a0 [ 1790.173091][ T2517] __x64_sys_write+0x42/0x50 [ 1790.177794][ T2517] do_syscall_64+0x41/0xc0 [ 1790.182437][ T2517] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1790.188385][ T2517] RIP: 0033:0x7f3d42967b29 [ 1790.192822][ T2517] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1790.212454][ T2517] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1790.220875][ T2517] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1790.228918][ T2517] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1790.236892][ T2517] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1790.244886][ T2517] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1790.252857][ T2517] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1790.260935][ T2517] 08:00:08 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 96) 08:00:08 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x541583, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r0, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x6, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x2, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r3) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r4) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r5) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000700)=@bpf_lsm={0x1d, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @map_idx={0x18, 0x6, 0x5, 0x0, 0xc}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @alu={0x7, 0x1, 0xd, 0x0, 0x2, 0x100, 0x4}, @exit], &(0x7f0000000000)='syzkaller\x00', 0x40, 0xcc, &(0x7f0000000240)=""/204, 0x0, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x1, 0xd, 0x101, 0x6b74}, 0x10, r1, 0x0, 0x0, &(0x7f00000006c0)=[r2, r3, r4, r5]}, 0x80) 08:00:08 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$llc(r0, &(0x7f0000000080), &(0x7f0000000100)=0x10, 0x80800) 08:00:08 executing program 0: bind$can_raw(0xffffffffffffffff, &(0x7f0000000200), 0x10) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo\x00') openat$cgroup_procs(r0, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) 08:00:08 executing program 4: prctl$PR_SET_NAME(0x2b, &(0x7f0000000040)='/dev/bsg\x00') 08:00:08 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfefdffff}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 08:00:08 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$llc(r0, &(0x7f0000000080), &(0x7f0000000100)=0x10, 0x80800) 08:00:08 executing program 4: prctl$PR_SET_NAME(0x2b, &(0x7f0000000040)='/dev/bsg\x00') 08:00:08 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$llc(r0, &(0x7f0000000080), &(0x7f0000000100)=0x10, 0x80800) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') (async) pipe(&(0x7f0000000000)) (async) accept4$llc(r0, &(0x7f0000000080), &(0x7f0000000100)=0x10, 0x80800) (async) [ 1790.409002][ T2554] FAULT_INJECTION: forcing a failure. [ 1790.409002][ T2554] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1790.422314][ T2554] CPU: 1 PID: 2554 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1790.432669][ T2554] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1790.442832][ T2554] Call Trace: [ 1790.446134][ T2554] [ 1790.449126][ T2554] dump_stack_lvl+0xda/0x130 [ 1790.453775][ T2554] dump_stack+0x15/0x20 08:00:08 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo\x00') openat$cgroup_procs(r0, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) 08:00:08 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x541583, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r0, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x6, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x2, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r3) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r4) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r5) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000700)=@bpf_lsm={0x1d, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @map_idx={0x18, 0x6, 0x5, 0x0, 0xc}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @alu={0x7, 0x1, 0xd, 0x0, 0x2, 0x100, 0x4}, @exit], &(0x7f0000000000)='syzkaller\x00', 0x40, 0xcc, &(0x7f0000000240)=""/204, 0x0, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x1, 0xd, 0x101, 0x6b74}, 0x10, r1, 0x0, 0x0, &(0x7f00000006c0)=[r2, r3, r4, r5]}, 0x80) 08:00:08 executing program 4: prctl$PR_SET_NAME(0x2b, &(0x7f0000000040)='/dev/bsg\x00') [ 1790.457966][ T2554] should_fail_ex+0x21f/0x230 [ 1790.462789][ T2554] __should_fail_alloc_page+0xfd/0x110 [ 1790.468289][ T2554] __alloc_pages+0x108/0x340 [ 1790.473149][ T2554] vma_alloc_folio+0x6a3/0x8c0 [ 1790.478067][ T2554] shmem_get_folio_gfp+0x801/0x1200 [ 1790.483345][ T2554] shmem_write_begin+0xa6/0x1d0 [ 1790.488336][ T2554] generic_perform_write+0x1cf/0x410 [ 1790.493661][ T2554] ? shmem_write_begin+0x1d0/0x1d0 [ 1790.498941][ T2554] __generic_file_write_iter+0xa1/0x120 [ 1790.504575][ T2554] generic_file_write_iter+0x7d/0x1c0 [ 1790.509994][ T2554] vfs_write+0x4ab/0x7d0 [ 1790.514397][ T2554] ksys_write+0xeb/0x1a0 [ 1790.518870][ T2554] __x64_sys_write+0x42/0x50 [ 1790.523537][ T2554] do_syscall_64+0x41/0xc0 [ 1790.527991][ T2554] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1790.534051][ T2554] RIP: 0033:0x7f3d42967b29 [ 1790.538562][ T2554] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 08:00:08 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 97) 08:00:08 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='\x00\x00\xef\xff\xff\x01\x00^\xf7\x9f\xe8\x1a\x01\xbb') 08:00:08 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfe}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 08:00:08 executing program 0: r0 = syz_open_procfs(0x0, 0x0) openat$cgroup_procs(r0, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) 08:00:08 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x541583, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r0, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x6, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x2, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) pipe(&(0x7f0000000140)) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r3) pipe(&(0x7f0000000140)) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r4) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r5) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000700)=@bpf_lsm={0x1d, 0xb, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0xb, 0x5, 0x0, 0x5}, @map_idx={0x18, 0x6, 0x5, 0x0, 0xc}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @alu={0x7, 0x1, 0xd, 0x0, 0x2, 0x100, 0x4}, @exit], &(0x7f0000000000)='syzkaller\x00', 0x40, 0xcc, &(0x7f0000000240)=""/204, 0x0, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x1, 0xd, 0x101, 0x6b74}, 0x10, r1, 0x0, 0x0, &(0x7f00000006c0)=[r2, r3, r4, r5]}, 0x80) 08:00:08 executing program 4: prctl$PR_SET_NAME(0x2b, 0x0) 08:00:08 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='\x00\x00\xef\xff\xff\x01\x00^\xf7\x9f\xe8\x1a\x01\xbb') [ 1790.558353][ T2554] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1790.566821][ T2554] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1790.574790][ T2554] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1790.582849][ T2554] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1790.590822][ T2554] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1790.598804][ T2554] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1790.606778][ T2554] 08:00:08 executing program 0: r0 = syz_open_procfs(0x0, 0x0) openat$cgroup_procs(r0, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) 08:00:08 executing program 4: prctl$PR_SET_NAME(0x24, 0x0) 08:00:08 executing program 4: prctl$PR_SET_NAME(0x24, 0x0) 08:00:08 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000080), r0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000000440)={0x11, 0x10, 0xfa00, {&(0x7f0000000400)}}, 0x18) sendmsg$SMC_PNETID_GET(r0, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00012cbd7000001400020077673200000000000000000000000000140002007663616e3000000000000000000000000900030073797a30000000000900010073797a32000000000900010073797a32000000000900010073797a3000000000050004000200"/110], 0x74}, 0x1, 0x0, 0x0, 0x6040800}, 0x20000811) 08:00:08 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async, rerun: 32) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (rerun: 32) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000080), r0) (async) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000000440)={0x11, 0x10, 0xfa00, {&(0x7f0000000400)}}, 0x18) sendmsg$SMC_PNETID_GET(r0, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00012cbd7000001400020077673200000000000000000000000000140002007663616e3000000000000000000000000900030073797a30000000000900010073797a32000000000900010073797a32000000000900010073797a3000000000050004000200"/110], 0x74}, 0x1, 0x0, 0x0, 0x6040800}, 0x20000811) [ 1790.662000][ T2587] FAULT_INJECTION: forcing a failure. [ 1790.662000][ T2587] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1790.675216][ T2587] CPU: 1 PID: 2587 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1790.685571][ T2587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1790.695702][ T2587] Call Trace: [ 1790.699024][ T2587] [ 1790.702073][ T2587] dump_stack_lvl+0xda/0x130 [ 1790.706698][ T2587] dump_stack+0x15/0x20 [ 1790.710897][ T2587] should_fail_ex+0x21f/0x230 [ 1790.715605][ T2587] should_fail+0xb/0x10 [ 1790.719889][ T2587] should_fail_usercopy+0x1a/0x20 [ 1790.724937][ T2587] copy_page_from_iter_atomic+0x22d/0xcf0 [ 1790.730747][ T2587] ? folio_test_hugetlb+0x3a/0x70 [ 1790.735836][ T2587] ? shmem_write_begin+0x12a/0x1d0 [ 1790.740976][ T2587] generic_perform_write+0x212/0x410 [ 1790.746350][ T2587] ? shmem_write_begin+0x1d0/0x1d0 [ 1790.751542][ T2587] __generic_file_write_iter+0xa1/0x120 [ 1790.757160][ T2587] generic_file_write_iter+0x7d/0x1c0 [ 1790.762650][ T2587] vfs_write+0x4ab/0x7d0 [ 1790.766907][ T2587] ksys_write+0xeb/0x1a0 [ 1790.771371][ T2587] __x64_sys_write+0x42/0x50 [ 1790.775976][ T2587] do_syscall_64+0x41/0xc0 [ 1790.780552][ T2587] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1790.786568][ T2587] RIP: 0033:0x7f3d42967b29 [ 1790.791025][ T2587] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1790.810703][ T2587] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1790.819189][ T2587] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1790.827215][ T2587] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1790.835282][ T2587] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1790.843361][ T2587] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1790.851351][ T2587] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1790.859355][ T2587] 08:00:08 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 98) 08:00:08 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000080), r0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000000440)={0x11, 0x10, 0xfa00, {&(0x7f0000000400)}}, 0x18) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000000440)={0x11, 0x10, 0xfa00, {&(0x7f0000000400)}}, 0x18) sendmsg$SMC_PNETID_GET(r0, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00012cbd7000001400020077673200000000000000000000000000140002007663616e3000000000000000000000000900030073797a30000000000900010073797a32000000000900010073797a32000000000900010073797a3000000000050004000200"/110], 0x74}, 0x1, 0x0, 0x0, 0x6040800}, 0x20000811) 08:00:08 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='\x00\x00\xef\xff\xff\x01\x00^\xf7\x9f\xe8\x1a\x01\xbb') 08:00:08 executing program 0: r0 = syz_open_procfs(0x0, 0x0) openat$cgroup_procs(r0, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) 08:00:08 executing program 4: prctl$PR_SET_NAME(0x24, 0x0) 08:00:08 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 08:00:09 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_generic(0x10, 0x3, 0x10) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) syz_genetlink_get_family_id$devlink(&(0x7f0000000080), r0) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000040)) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='0\n\x10J\x03\x94\xfb') 08:00:09 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$TCSETS2(r1, 0x402c542b, &(0x7f0000000080)={0x7, 0x9, 0x9, 0x3ff, 0xf8, "e4f401a3da925f0f082187b19335ddcae7c381", 0x4, 0x3}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:09 executing program 4: prctl$PR_SET_NAME(0x2a, &(0x7f0000000040)='/dev/bsg\x00') 08:00:09 executing program 0: syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo\x00') openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) [ 1791.026714][ T2615] FAULT_INJECTION: forcing a failure. [ 1791.026714][ T2615] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1791.040075][ T2615] CPU: 0 PID: 2615 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1791.050452][ T2615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1791.060535][ T2615] Call Trace: [ 1791.063858][ T2615] [ 1791.066805][ T2615] dump_stack_lvl+0xda/0x130 [ 1791.071453][ T2615] dump_stack+0x15/0x20 08:00:09 executing program 4: prctl$PR_SET_NAME(0x2a, &(0x7f0000000040)='/dev/bsg\x00') 08:00:09 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40030000000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) [ 1791.075684][ T2615] should_fail_ex+0x21f/0x230 [ 1791.080426][ T2615] __should_fail_alloc_page+0xfd/0x110 [ 1791.085921][ T2615] __alloc_pages+0x108/0x340 [ 1791.090548][ T2615] vma_alloc_folio+0x6a3/0x8c0 [ 1791.095397][ T2615] shmem_get_folio_gfp+0x801/0x1200 [ 1791.100688][ T2615] shmem_write_begin+0xa6/0x1d0 [ 1791.105610][ T2615] generic_perform_write+0x1cf/0x410 [ 1791.110985][ T2615] ? shmem_write_begin+0x1d0/0x1d0 [ 1791.116220][ T2615] __generic_file_write_iter+0xa1/0x120 [ 1791.121805][ T2615] generic_file_write_iter+0x7d/0x1c0 [ 1791.127189][ T2615] vfs_write+0x4ab/0x7d0 [ 1791.131538][ T2615] ksys_write+0xeb/0x1a0 [ 1791.135898][ T2615] __x64_sys_write+0x42/0x50 [ 1791.140876][ T2615] do_syscall_64+0x41/0xc0 [ 1791.145334][ T2615] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1791.151343][ T2615] RIP: 0033:0x7f3d42967b29 [ 1791.155813][ T2615] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 08:00:09 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 99) 08:00:09 executing program 4: prctl$PR_SET_NAME(0x2a, &(0x7f0000000040)='/dev/bsg\x00') 08:00:09 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) syz_genetlink_get_family_id$devlink(&(0x7f0000000080), r0) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000040)) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='0\n\x10J\x03\x94\xfb') 08:00:09 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$TCSETS2(r1, 0x402c542b, &(0x7f0000000080)={0x7, 0x9, 0x9, 0x3ff, 0xf8, "e4f401a3da925f0f082187b19335ddcae7c381", 0x4, 0x3}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) pipe(&(0x7f0000000040)) (async) ioctl$TCSETS2(r1, 0x402c542b, &(0x7f0000000080)={0x7, 0x9, 0x9, 0x3ff, 0xf8, "e4f401a3da925f0f082187b19335ddcae7c381", 0x4, 0x3}) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) 08:00:09 executing program 0: syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo\x00') openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) 08:00:09 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 08:00:09 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_generic(0x10, 0x3, 0x10) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) syz_genetlink_get_family_id$devlink(&(0x7f0000000080), r0) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000040)) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='0\n\x10J\x03\x94\xfb') pipe(&(0x7f0000000140)) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) pipe(&(0x7f0000000140)) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000080), r0) (async) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000040)) (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='0\n\x10J\x03\x94\xfb') (async) [ 1791.175424][ T2615] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1791.183861][ T2615] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1791.191831][ T2615] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1791.199829][ T2615] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1791.207835][ T2615] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1791.215889][ T2615] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1791.223884][ T2615] 08:00:09 executing program 4: prctl$PR_SET_NAME(0x2a, 0x0) 08:00:09 executing program 0: syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo\x00') openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) 08:00:09 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo\x00') openat$cgroup_procs(r0, 0x0, 0x2, 0x0) 08:00:09 executing program 5: r0 = inotify_init1(0x80000) inotify_add_watch(r0, &(0x7f00000000c0)='./file0\x00', 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='\xf0\xddb\xaf_\xa8\x97>O\xa4\xe92\xd2\xc8\xc96\xd1\f\n\x15\xc9\xaa\t\x172\x93S\a\"\x18Ck\x81\x88_\xaa\xa4\x9a\x15*r\xcf\xbe\x86|\'Nsxq\xddhyOc|8S9E\xd7xK\xb1\xccw\xbdR\xf0?\xacjc\xb1a9\xd8\x9d,E\xb6j,\v\xc4P6E[\xbdz\x10\xa1X\x16\xc0\x00\x00\x00\x00\xa2\xe0\xb9G\x1f,\xa5qj\xbb\xf4\x11\xcbY\xd5L\xbc\xeat1d\x8b\x13\xdcX\xf2\xf3\xe4h\xb7\xce\x113\x13U!/#\x93\xb2\xe7\x8b\xed`\xc3Gv\xc0\xd7\xa0\xc3\ak\x90\x8c\x14\xda\x87\vA\x06R8\xaa\xed\x13I\xab') prctl$PR_SET_NAME(0xf, &(0x7f0000000100)='+/*\x00') [ 1791.261733][ T2636] FAULT_INJECTION: forcing a failure. [ 1791.261733][ T2636] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1791.274942][ T2636] CPU: 0 PID: 2636 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1791.285315][ T2636] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1791.295400][ T2636] Call Trace: [ 1791.298705][ T2636] [ 1791.301668][ T2636] dump_stack_lvl+0xda/0x130 [ 1791.306389][ T2636] dump_stack+0x15/0x20 08:00:09 executing program 5: r0 = inotify_init1(0x80000) inotify_add_watch(r0, &(0x7f00000000c0)='./file0\x00', 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='\xf0\xddb\xaf_\xa8\x97>O\xa4\xe92\xd2\xc8\xc96\xd1\f\n\x15\xc9\xaa\t\x172\x93S\a\"\x18Ck\x81\x88_\xaa\xa4\x9a\x15*r\xcf\xbe\x86|\'Nsxq\xddhyOc|8S9E\xd7xK\xb1\xccw\xbdR\xf0?\xacjc\xb1a9\xd8\x9d,E\xb6j,\v\xc4P6E[\xbdz\x10\xa1X\x16\xc0\x00\x00\x00\x00\xa2\xe0\xb9G\x1f,\xa5qj\xbb\xf4\x11\xcbY\xd5L\xbc\xeat1d\x8b\x13\xdcX\xf2\xf3\xe4h\xb7\xce\x113\x13U!/#\x93\xb2\xe7\x8b\xed`\xc3Gv\xc0\xd7\xa0\xc3\ak\x90\x8c\x14\xda\x87\vA\x06R8\xaa\xed\x13I\xab') prctl$PR_SET_NAME(0xf, &(0x7f0000000100)='+/*\x00') (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000100)='+/*\x00') [ 1791.310803][ T2636] should_fail_ex+0x21f/0x230 [ 1791.315498][ T2636] should_fail+0xb/0x10 [ 1791.319756][ T2636] should_fail_usercopy+0x1a/0x20 [ 1791.324868][ T2636] copy_page_from_iter_atomic+0x22d/0xcf0 [ 1791.330633][ T2636] ? folio_test_hugetlb+0x3a/0x70 [ 1791.335689][ T2636] ? shmem_write_begin+0x12a/0x1d0 [ 1791.340845][ T2636] generic_perform_write+0x212/0x410 [ 1791.346233][ T2636] ? shmem_write_begin+0x1d0/0x1d0 [ 1791.351442][ T2636] __generic_file_write_iter+0xa1/0x120 [ 1791.357039][ T2636] generic_file_write_iter+0x7d/0x1c0 [ 1791.362545][ T2636] vfs_write+0x4ab/0x7d0 [ 1791.366985][ T2636] ksys_write+0xeb/0x1a0 [ 1791.371266][ T2636] __x64_sys_write+0x42/0x50 [ 1791.375991][ T2636] do_syscall_64+0x41/0xc0 [ 1791.380431][ T2636] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1791.386467][ T2636] RIP: 0033:0x7f3d42967b29 [ 1791.390957][ T2636] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1791.410568][ T2636] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1791.419039][ T2636] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1791.427028][ T2636] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1791.435069][ T2636] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1791.443086][ T2636] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1791.451065][ T2636] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1791.459127][ T2636] 08:00:09 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) (fail_nth: 100) 08:00:09 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 08:00:09 executing program 4: prctl$PR_SET_NAME(0x2a, 0x0) 08:00:09 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$TCSETS2(r1, 0x402c542b, &(0x7f0000000080)={0x7, 0x9, 0x9, 0x3ff, 0xf8, "e4f401a3da925f0f082187b19335ddcae7c381", 0x4, 0x3}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) pipe(&(0x7f0000000040)) (async) ioctl$TCSETS2(r1, 0x402c542b, &(0x7f0000000080)={0x7, 0x9, 0x9, 0x3ff, 0xf8, "e4f401a3da925f0f082187b19335ddcae7c381", 0x4, 0x3}) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) 08:00:09 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo\x00') openat$cgroup_procs(r0, 0x0, 0x2, 0x0) 08:00:09 executing program 5: r0 = inotify_init1(0x80000) inotify_add_watch(r0, &(0x7f00000000c0)='./file0\x00', 0x0) (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='\xf0\xddb\xaf_\xa8\x97>O\xa4\xe92\xd2\xc8\xc96\xd1\f\n\x15\xc9\xaa\t\x172\x93S\a\"\x18Ck\x81\x88_\xaa\xa4\x9a\x15*r\xcf\xbe\x86|\'Nsxq\xddhyOc|8S9E\xd7xK\xb1\xccw\xbdR\xf0?\xacjc\xb1a9\xd8\x9d,E\xb6j,\v\xc4P6E[\xbdz\x10\xa1X\x16\xc0\x00\x00\x00\x00\xa2\xe0\xb9G\x1f,\xa5qj\xbb\xf4\x11\xcbY\xd5L\xbc\xeat1d\x8b\x13\xdcX\xf2\xf3\xe4h\xb7\xce\x113\x13U!/#\x93\xb2\xe7\x8b\xed`\xc3Gv\xc0\xd7\xa0\xc3\ak\x90\x8c\x14\xda\x87\vA\x06R8\xaa\xed\x13I\xab') (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000100)='+/*\x00') 08:00:09 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000440), 0x38000, 0x0) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280), 0xffffffffffffffff) ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f0000000040)={0x18, 0x0, {0x0, @multicast, 'veth1_to_bond\x00'}}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001680), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r3, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="ac00ff00", @ANYRES16=r1, @ANYBLOB="000029bd7000fddbdf2505000000080001007063690011000200303030303a30303a31302e300000000008000300020000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000300020000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000800030000000000080001007063690011000200303030303a30303a31302e30000000000800030003000000"], 0xac}, 0x1, 0x0, 0x0, 0x4000}, 0x1) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r4) ioctl$SIOCX25SDTEFACILITIES(r4, 0x89eb, &(0x7f00000004c0)={0x7, 0x200, 0x0, 0x2, 0x17, 0x1f, 0x16, "1a539c3fbe60424cbdde9f6e444ab609945e01c6", "6639ef8ef39adee8f3e4e3483af4c522ac963174"}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r3, 0x0, 0x0, @in6={0xa, 0x4, 0x0, @private2, 0x80000000}}}, 0xa0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000480)) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:09 executing program 4: prctl$PR_SET_NAME(0x2a, 0x0) 08:00:09 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo\x00') openat$cgroup_procs(r0, 0x0, 0x2, 0x0) 08:00:09 executing program 4: prctl$PR_SET_NAME(0x2a, 0x0) [ 1791.597184][ T2677] FAULT_INJECTION: forcing a failure. [ 1791.597184][ T2677] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1791.610488][ T2677] CPU: 0 PID: 2677 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1791.620969][ T2677] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1791.631053][ T2677] Call Trace: [ 1791.634399][ T2677] [ 1791.637346][ T2677] dump_stack_lvl+0xda/0x130 [ 1791.641992][ T2677] dump_stack+0x15/0x20 08:00:09 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/bsg\x00') 08:00:09 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r1, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r1, 0x0, 0x1, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x0, 0x4}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280), 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/ip_tables_targets\x00') pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r3) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT_OLD(r3, 0x28, 0x6, &(0x7f0000000340), 0x10) inotify_rm_watch(r2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) [ 1791.646178][ T2677] should_fail_ex+0x21f/0x230 [ 1791.650881][ T2677] __should_fail_alloc_page+0xfd/0x110 [ 1791.656461][ T2677] __alloc_pages+0x108/0x340 [ 1791.661202][ T2677] vma_alloc_folio+0x6a3/0x8c0 [ 1791.666021][ T2677] shmem_get_folio_gfp+0x801/0x1200 [ 1791.671242][ T2677] shmem_write_begin+0xa6/0x1d0 [ 1791.676121][ T2677] generic_perform_write+0x1cf/0x410 [ 1791.681514][ T2677] ? shmem_write_begin+0x1d0/0x1d0 [ 1791.686662][ T2677] __generic_file_write_iter+0xa1/0x120 [ 1791.692308][ T2677] generic_file_write_iter+0x7d/0x1c0 [ 1791.697729][ T2677] vfs_write+0x4ab/0x7d0 [ 1791.702052][ T2677] ksys_write+0xeb/0x1a0 [ 1791.706337][ T2677] __x64_sys_write+0x42/0x50 [ 1791.711124][ T2677] do_syscall_64+0x41/0xc0 [ 1791.715570][ T2677] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1791.721524][ T2677] RIP: 0033:0x7f3d42967b29 [ 1791.725955][ T2677] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 08:00:09 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) 08:00:09 executing program 4: prctl$PR_SET_NAME(0x2a, 0x0) 08:00:09 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r1, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r1, 0x0, 0x1, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x0, 0x4}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280), 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/ip_tables_targets\x00') pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r3) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT_OLD(r3, 0x28, 0x6, &(0x7f0000000340), 0x10) inotify_rm_watch(r2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:09 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 08:00:09 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000440), 0x38000, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280), 0xffffffffffffffff) ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f0000000040)={0x18, 0x0, {0x0, @multicast, 'veth1_to_bond\x00'}}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001680), 0x2, 0x0) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001680), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r3, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="ac00ff00", @ANYRES16=r1, @ANYBLOB="000029bd7000fddbdf2505000000080001007063690011000200303030303a30303a31302e300000000008000300020000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000300020000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000800030000000000080001007063690011000200303030303a30303a31302e30000000000800030003000000"], 0xac}, 0x1, 0x0, 0x0, 0x4000}, 0x1) pipe(&(0x7f0000000140)) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r4) ioctl$SIOCX25SDTEFACILITIES(r4, 0x89eb, &(0x7f00000004c0)={0x7, 0x200, 0x0, 0x2, 0x17, 0x1f, 0x16, "1a539c3fbe60424cbdde9f6e444ab609945e01c6", "6639ef8ef39adee8f3e4e3483af4c522ac963174"}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r3, 0x0, 0x0, @in6={0xa, 0x4, 0x0, @private2, 0x80000000}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r3, 0x0, 0x0, @in6={0xa, 0x4, 0x0, @private2, 0x80000000}}}, 0xa0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000480)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000480)) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:09 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/bsg\x00') (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/bsg\x00') 08:00:09 executing program 4: prctl$PR_SET_NAME(0x2a, 0x0) [ 1791.745591][ T2677] RSP: 002b:00007f3d41cea0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1791.754022][ T2677] RAX: ffffffffffffffda RBX: 00007f3d42a86f80 RCX: 00007f3d42967b29 [ 1791.762067][ T2677] RDX: 00000000fffffdef RSI: 0000000020000180 RDI: 0000000000000003 [ 1791.770042][ T2677] RBP: 00007f3d41cea120 R08: 0000000000000000 R09: 0000000000000000 [ 1791.778011][ T2677] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1791.785978][ T2677] R13: 000000000000000b R14: 00007f3d42a86f80 R15: 00007ffc626329e8 [ 1791.794019][ T2677] 08:00:09 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000440), 0x38000, 0x0) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async, rerun: 32) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280), 0xffffffffffffffff) (rerun: 32) ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f0000000040)={0x18, 0x0, {0x0, @multicast, 'veth1_to_bond\x00'}}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async, rerun: 64) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001680), 0x2, 0x0) (rerun: 64) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r3, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) (async) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="ac00ff00", @ANYRES16=r1, @ANYBLOB="000029bd7000fddbdf2505000000080001007063690011000200303030303a30303a31302e300000000008000300020000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000300020000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000800030000000000080001007063690011000200303030303a30303a31302e30000000000800030003000000"], 0xac}, 0x1, 0x0, 0x0, 0x4000}, 0x1) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r4) (async) ioctl$SIOCX25SDTEFACILITIES(r4, 0x89eb, &(0x7f00000004c0)={0x7, 0x200, 0x0, 0x2, 0x17, 0x1f, 0x16, "1a539c3fbe60424cbdde9f6e444ab609945e01c6", "6639ef8ef39adee8f3e4e3483af4c522ac963174"}) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r3, 0x0, 0x0, @in6={0xa, 0x4, 0x0, @private2, 0x80000000}}}, 0xa0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000480)) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:09 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r1, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r1, 0x0, 0x1, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x0, 0x4}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280), 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/ip_tables_targets\x00') pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r3) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT_OLD(r3, 0x28, 0x6, &(0x7f0000000340), 0x10) inotify_rm_watch(r2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:09 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/bsg\x00') openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/bsg\x00') (async) 08:00:09 executing program 4: prctl$PR_SET_NAME(0x27, &(0x7f0000000040)='/dev/bsg\x00') 08:00:09 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r1, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r1, 0x0, 0x1, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x0, 0x4}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280), 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) syz_open_procfs(0x0, &(0x7f0000000300)='net/ip_tables_targets\x00') pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT_OLD(r2, 0x28, 0x6, &(0x7f0000000340), 0x10) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:10 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 08:00:10 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='($#\x00') 08:00:10 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r1, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r1, 0x0, 0x1, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x0, 0x4}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280), 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) syz_open_procfs(0x0, &(0x7f0000000300)='net/ip_tables_targets\x00') pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT_OLD(r2, 0x28, 0x6, &(0x7f0000000340), 0x10) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:10 executing program 4: prctl$PR_SET_NAME(0x27, &(0x7f0000000040)='/dev/bsg\x00') 08:00:10 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x110, 0xfa00, {0x0}}, 0xfffffdef) 08:00:10 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) ioctl$SIOCX25SENDCALLACCPT(r1, 0x89e9) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080), 0xffffffffffffffff) ioctl$SIOCX25SCALLUSERDATA(r1, 0x89e5, &(0x7f00000003c0)={0x36, "5597b1900d76389ea9c12072f1d29d1ca8aac963165f40d2088ccb4b54abe07a0e92cd3c9540ced321508ff8f5facb752cb64f469eff486012113b1e55c6d6e584400dce6ccf46ce07abc592180ef4b6f5a583f102dfd1d3588def4d60a3c804dbcc5d55092f49dfaa075d39323ddb5e3c34623c3e237aff3e4e2025d6e48b8b"}) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x54, r3, 0x10, 0x70bd29, 0x25dfdbfb, {}, [@NBD_ATTR_BACKEND_IDENTIFIER={0x5, 0xa, '\x00'}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x5}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x5}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x6}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x40000) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) ioctl$KDENABIO(r2, 0x4b36) 08:00:10 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r1, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r1, 0x0, 0x1, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x0, 0x4}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280), 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) syz_open_procfs(0x0, &(0x7f0000000300)='net/ip_tables_targets\x00') pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:10 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='($#\x00') 08:00:10 executing program 4: prctl$PR_SET_NAME(0x27, &(0x7f0000000040)='/dev/bsg\x00') 08:00:10 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) ioctl$SIOCX25SENDCALLACCPT(r1, 0x89e9) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080), 0xffffffffffffffff) ioctl$SIOCX25SCALLUSERDATA(r1, 0x89e5, &(0x7f00000003c0)={0x36, "5597b1900d76389ea9c12072f1d29d1ca8aac963165f40d2088ccb4b54abe07a0e92cd3c9540ced321508ff8f5facb752cb64f469eff486012113b1e55c6d6e584400dce6ccf46ce07abc592180ef4b6f5a583f102dfd1d3588def4d60a3c804dbcc5d55092f49dfaa075d39323ddb5e3c34623c3e237aff3e4e2025d6e48b8b"}) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x54, r3, 0x10, 0x70bd29, 0x25dfdbfb, {}, [@NBD_ATTR_BACKEND_IDENTIFIER={0x5, 0xa, '\x00'}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x5}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x5}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x6}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x40000) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) ioctl$KDENABIO(r2, 0x4b36) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) pipe(&(0x7f0000000140)) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) (async) ioctl$SIOCX25SENDCALLACCPT(r1, 0x89e9) (async) pipe(&(0x7f0000000140)) (async) syz_genetlink_get_family_id$nbd(&(0x7f0000000080), 0xffffffffffffffff) (async) ioctl$SIOCX25SCALLUSERDATA(r1, 0x89e5, &(0x7f00000003c0)={0x36, "5597b1900d76389ea9c12072f1d29d1ca8aac963165f40d2088ccb4b54abe07a0e92cd3c9540ced321508ff8f5facb752cb64f469eff486012113b1e55c6d6e584400dce6ccf46ce07abc592180ef4b6f5a583f102dfd1d3588def4d60a3c804dbcc5d55092f49dfaa075d39323ddb5e3c34623c3e237aff3e4e2025d6e48b8b"}) (async) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x54, r3, 0x10, 0x70bd29, 0x25dfdbfb, {}, [@NBD_ATTR_BACKEND_IDENTIFIER={0x5, 0xa, '\x00'}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x5}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x5}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x6}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x40000) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) (async) ioctl$KDENABIO(r2, 0x4b36) (async) 08:00:10 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='($#\x00') prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='($#\x00') (async) 08:00:10 executing program 4: prctl$PR_SET_NAME(0x27, 0x0) 08:00:10 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 08:00:10 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r1, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r1, 0x0, 0x1, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x0, 0x4}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280), 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) syz_open_procfs(0x0, &(0x7f0000000300)='net/ip_tables_targets\x00') pipe(&(0x7f0000000140)) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:10 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) ioctl$SIOCX25SENDCALLACCPT(r1, 0x89e9) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r3 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080), 0xffffffffffffffff) (async) ioctl$SIOCX25SCALLUSERDATA(r1, 0x89e5, &(0x7f00000003c0)={0x36, "5597b1900d76389ea9c12072f1d29d1ca8aac963165f40d2088ccb4b54abe07a0e92cd3c9540ced321508ff8f5facb752cb64f469eff486012113b1e55c6d6e584400dce6ccf46ce07abc592180ef4b6f5a583f102dfd1d3588def4d60a3c804dbcc5d55092f49dfaa075d39323ddb5e3c34623c3e237aff3e4e2025d6e48b8b"}) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x54, r3, 0x10, 0x70bd29, 0x25dfdbfb, {}, [@NBD_ATTR_BACKEND_IDENTIFIER={0x5, 0xa, '\x00'}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x5}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x5}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x6}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x40000) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) (async) ioctl$KDENABIO(r2, 0x4b36) 08:00:10 executing program 5: pipe2$watch_queue(&(0x7f0000000080), 0x80) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/bsg\x00') 08:00:10 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa02, {0x0}}, 0xfffffdef) 08:00:10 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r1, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r1, 0x0, 0x1, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x0, 0x4}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280), 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) syz_open_procfs(0x0, &(0x7f0000000300)='net/ip_tables_targets\x00') write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:10 executing program 4: prctl$PR_SET_NAME(0x27, 0x0) 08:00:10 executing program 1: setsockopt$CAN_RAW_LOOPBACK(0xffffffffffffffff, 0x65, 0x3, &(0x7f0000000040)=0x1, 0x4) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:10 executing program 5: pipe2$watch_queue(&(0x7f0000000080), 0x80) (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/bsg\x00') 08:00:10 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6400000000000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 08:00:10 executing program 5: pipe2$watch_queue(&(0x7f0000000080), 0x80) (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/bsg\x00') 08:00:10 executing program 1: setsockopt$CAN_RAW_LOOPBACK(0xffffffffffffffff, 0x65, 0x3, &(0x7f0000000040)=0x1, 0x4) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) setsockopt$CAN_RAW_LOOPBACK(0xffffffffffffffff, 0x65, 0x3, &(0x7f0000000040)=0x1, 0x4) (async) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) 08:00:10 executing program 4: prctl$PR_SET_NAME(0x27, 0x0) 08:00:10 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r1, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r1, 0x0, 0x1, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x0, 0x4}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280), 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:10 executing program 1: setsockopt$CAN_RAW_LOOPBACK(0xffffffffffffffff, 0x65, 0x3, &(0x7f0000000040)=0x1, 0x4) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:10 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') ioctl$TIOCGISO7816(0xffffffffffffffff, 0x80285442, &(0x7f0000000000)) 08:00:10 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa04, {0x0}}, 0xfffffdef) 08:00:10 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x110, 0xfa00, {0x0}}, 0xfffffdef) 08:00:10 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r1, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r1, 0x0, 0x1, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x0, 0x4}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280), 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:10 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') ioctl$TIOCGISO7816(0xffffffffffffffff, 0x80285442, &(0x7f0000000000)) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') (async) ioctl$TIOCGISO7816(0xffffffffffffffff, 0x80285442, &(0x7f0000000000)) (async) 08:00:10 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdb06000000000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 08:00:10 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x1f14, 0x0, {"699a0000f400"}, 0x0, 0x7fff}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) socket$can_raw(0x1d, 0x3, 0x1) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:10 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') (async, rerun: 32) ioctl$TIOCGISO7816(0xffffffffffffffff, 0x80285442, &(0x7f0000000000)) (rerun: 32) 08:00:10 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x1f14, 0x0, {"699a0000f400"}, 0x0, 0x7fff}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x1f14, 0x0, {"699a0000f400"}, 0x0, 0x7fff}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) socket$can_raw(0x1d, 0x3, 0x1) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:10 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r1, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r1, 0x0, 0x1, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x0, 0x4}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280), 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:10 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r1, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r1, 0x0, 0x1, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x0, 0x4}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280), 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:10 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0xd29080, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000000c0)={'\x00', 0xf8, 0x2, 0x6}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f0000000040)={0x6381, 0x6}) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/\x13\n\x01\x01\x00\x00\x00\x00\x00') 08:00:10 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x1f14, 0x0, {"699a0000f400"}, 0x0, 0x7fff}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) socket$can_raw(0x1d, 0x3, 0x1) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x1f14, 0x0, {"699a0000f400"}, 0x0, 0x7fff}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) socket$can_raw(0x1d, 0x3, 0x1) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) [ 1792.560064][ T2837] ================================================================== [ 1792.568276][ T2837] BUG: KCSAN: data-race in __percpu_counter_compare / percpu_counter_add_batch [ 1792.577245][ T2837] [ 1792.579585][ T2837] read-write to 0xffff888100130b50 of 8 bytes by task 2834 on cpu 0: [ 1792.587674][ T2837] percpu_counter_add_batch+0xc9/0x140 [ 1792.593157][ T2837] shmem_get_folio_gfp+0x759/0x1200 [ 1792.598488][ T2837] shmem_write_begin+0xa6/0x1d0 [ 1792.603359][ T2837] generic_perform_write+0x1cf/0x410 [ 1792.608678][ T2837] __generic_file_write_iter+0xa1/0x120 [ 1792.614255][ T2837] generic_file_write_iter+0x7d/0x1c0 [ 1792.619652][ T2837] vfs_write+0x4ab/0x7d0 [ 1792.623952][ T2837] ksys_write+0xeb/0x1a0 [ 1792.628226][ T2837] __x64_sys_write+0x42/0x50 [ 1792.632859][ T2837] do_syscall_64+0x41/0xc0 [ 1792.637281][ T2837] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1792.643192][ T2837] [ 1792.645581][ T2837] read to 0xffff888100130b50 of 8 bytes by task 2837 on cpu 1: [ 1792.653145][ T2837] __percpu_counter_compare+0x2b/0x1d0 [ 1792.658704][ T2837] shmem_get_folio_gfp+0x722/0x1200 [ 1792.664032][ T2837] shmem_write_begin+0xa6/0x1d0 [ 1792.668898][ T2837] generic_perform_write+0x1cf/0x410 [ 1792.674370][ T2837] __generic_file_write_iter+0xa1/0x120 [ 1792.679946][ T2837] generic_file_write_iter+0x7d/0x1c0 [ 1792.685331][ T2837] vfs_write+0x4ab/0x7d0 [ 1792.689583][ T2837] ksys_write+0xeb/0x1a0 [ 1792.693837][ T2837] __x64_sys_write+0x42/0x50 [ 1792.698438][ T2837] do_syscall_64+0x41/0xc0 [ 1792.702859][ T2837] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1792.708775][ T2837] [ 1792.711105][ T2837] value changed: 0x0000000000000e30 -> 0x0000000000000e50 [ 1792.718234][ T2837] [ 1792.720556][ T2837] Reported by Kernel Concurrency Sanitizer on: [ 1792.726707][ T2837] CPU: 1 PID: 2837 Comm: syz-executor.3 Not tainted 6.5.0-rc1-syzkaller-00276-g20edcec23f92 #0 [ 1792.737062][ T2837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 1792.747124][ T2837] ================================================================== 08:00:10 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa05, {0x0}}, 0xfffffdef) 08:00:10 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfefdffff00000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 08:00:10 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r1, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r1, 0x0, 0x1, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x0, 0x4}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:10 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0xd29080, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000000c0)={'\x00', 0xf8, 0x2, 0x6}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f0000000040)={0x6381, 0x6}) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/\x13\n\x01\x01\x00\x00\x00\x00\x00') openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0xd29080, 0x0) (async) pipe(&(0x7f0000000140)) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) (async) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000000c0)={'\x00', 0xf8, 0x2, 0x6}) (async) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f0000000040)={0x6381, 0x6}) (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/\x13\n\x01\x01\x00\x00\x00\x00\x00') (async) 08:00:10 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x100ffff, {"00dee12ce78e3b03ec0800"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1, @in={0x2, 0x4e23, @loopback}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='net/udp\x00') sendmsg$DEVLINK_CMD_RATE_DEL(r2, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x78, 0x0, 0x2, 0x70bd2b, 0x25dfdbfe, {}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @handle=@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_PORT_INDEX={0x8, 0x3, 0x3}]}, 0x78}, 0x1, 0x0, 0x0, 0x40804}, 0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x2e}}, 0x20) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r4) ioctl$IOC_WATCH_QUEUE_SET_FILTER(r4, 0x5761, &(0x7f0000000600)=ANY=[@ANYBLOB="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"]) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r5) write$RDMA_USER_CM_CMD_JOIN_MCAST(r5, &(0x7f00000002c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x400000000000001, r3, 0x10, 0x0, @in6={0xa, 0x4e23, 0x4, @dev={0xfe, 0x80, '\x00', 0x23}, 0xcf}}}, 0xa0) 08:00:10 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa02, {0x0}}, 0xfffffdef) 08:00:10 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0xd29080, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) (async) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000000c0)={'\x00', 0xf8, 0x2, 0x6}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f0000000040)={0x6381, 0x6}) (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/\x13\n\x01\x01\x00\x00\x00\x00\x00') 08:00:10 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x100ffff, {"00dee12ce78e3b03ec0800"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1, @in={0x2, 0x4e23, @loopback}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) (async) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='net/udp\x00') sendmsg$DEVLINK_CMD_RATE_DEL(r2, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x78, 0x0, 0x2, 0x70bd2b, 0x25dfdbfe, {}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @handle=@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_PORT_INDEX={0x8, 0x3, 0x3}]}, 0x78}, 0x1, 0x0, 0x0, 0x40804}, 0x4000) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x2e}}, 0x20) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r4) (async) ioctl$IOC_WATCH_QUEUE_SET_FILTER(r4, 0x5761, &(0x7f0000000600)=ANY=[@ANYBLOB="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"]) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r5) write$RDMA_USER_CM_CMD_JOIN_MCAST(r5, &(0x7f00000002c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x400000000000001, r3, 0x10, 0x0, @in6={0xa, 0x4e23, 0x4, @dev={0xfe, 0x80, '\x00', 0x23}, 0xcf}}}, 0xa0) 08:00:10 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r1, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r1, 0x0, 0x1, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x0, 0x4}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:10 executing program 5: select(0x40, &(0x7f0000000000)={0x3f, 0xe8, 0xffffffff, 0x7, 0xea, 0x1, 0x5, 0x1000}, &(0x7f0000000080)={0x7fffffff, 0x758, 0xfffffffffffffffc, 0x4, 0x6, 0x8000000000000001, 0x36c, 0x8000}, &(0x7f00000000c0)={0x9e0, 0x5, 0x85e, 0x4, 0xb29, 0x949d, 0x6, 0x7}, &(0x7f0000000100)={0x0, 0xea60}) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') 08:00:10 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r1, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r1, 0x0, 0x1, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x0, 0x4}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:10 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x100ffff, {"00dee12ce78e3b03ec0800"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1, @in={0x2, 0x4e23, @loopback}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='net/udp\x00') sendmsg$DEVLINK_CMD_RATE_DEL(r2, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x78, 0x0, 0x2, 0x70bd2b, 0x25dfdbfe, {}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @handle=@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_PORT_INDEX={0x8, 0x3, 0x3}]}, 0x78}, 0x1, 0x0, 0x0, 0x40804}, 0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x2e}}, 0x20) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r4) ioctl$IOC_WATCH_QUEUE_SET_FILTER(r4, 0x5761, &(0x7f0000000600)=ANY=[@ANYBLOB="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"]) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r5) write$RDMA_USER_CM_CMD_JOIN_MCAST(r5, &(0x7f00000002c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x400000000000001, r3, 0x10, 0x0, @in6={0xa, 0x4e23, 0x4, @dev={0xfe, 0x80, '\x00', 0x23}, 0xcf}}}, 0xa0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x100ffff, {"00dee12ce78e3b03ec0800"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1, @in={0x2, 0x4e23, @loopback}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) pipe(&(0x7f0000000140)) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) (async) syz_open_procfs(0x0, &(0x7f0000000380)='net/udp\x00') (async) sendmsg$DEVLINK_CMD_RATE_DEL(r2, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x78, 0x0, 0x2, 0x70bd2b, 0x25dfdbfe, {}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @handle=@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_PORT_INDEX={0x8, 0x3, 0x3}]}, 0x78}, 0x1, 0x0, 0x0, 0x40804}, 0x4000) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080), 0x2e}}, 0x20) (async) pipe(&(0x7f0000000140)) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r4) (async) ioctl$IOC_WATCH_QUEUE_SET_FILTER(r4, 0x5761, &(0x7f0000000600)=ANY=[@ANYBLOB="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"]) (async) pipe(&(0x7f0000000140)) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r5) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r5, &(0x7f00000002c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x400000000000001, r3, 0x10, 0x0, @in6={0xa, 0x4e23, 0x4, @dev={0xfe, 0x80, '\x00', 0x23}, 0xcf}}}, 0xa0) (async) 08:00:11 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa06, {0x0}}, 0xfffffdef) 08:00:11 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 08:00:11 executing program 5: select(0x40, &(0x7f0000000000)={0x3f, 0xe8, 0xffffffff, 0x7, 0xea, 0x1, 0x5, 0x1000}, &(0x7f0000000080)={0x7fffffff, 0x758, 0xfffffffffffffffc, 0x4, 0x6, 0x8000000000000001, 0x36c, 0x8000}, &(0x7f00000000c0)={0x9e0, 0x5, 0x85e, 0x4, 0xb29, 0x949d, 0x6, 0x7}, &(0x7f0000000100)={0x0, 0xea60}) (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') 08:00:11 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r1, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280), 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:11 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x10, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x0, 0x0, 0x4}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:11 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa04, {0x0}}, 0xfffffdef) 08:00:11 executing program 1: openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x10, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x0, 0x0, 0x4}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:11 executing program 5: select(0x40, &(0x7f0000000000)={0x3f, 0xe8, 0xffffffff, 0x7, 0xea, 0x1, 0x5, 0x1000}, &(0x7f0000000080)={0x7fffffff, 0x758, 0xfffffffffffffffc, 0x4, 0x6, 0x8000000000000001, 0x36c, 0x8000}, &(0x7f00000000c0)={0x9e0, 0x5, 0x85e, 0x4, 0xb29, 0x949d, 0x6, 0x7}, &(0x7f0000000100)={0x0, 0xea60}) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') 08:00:11 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r1, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280), 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:11 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x10, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x0, 0x0, 0x4}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:11 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) ioctl$VT_WAITACTIVE(r0, 0x5607) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') 08:00:11 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r1, 0x10, 0x1, @in={0x2, 0x0, @loopback}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280), 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:11 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa08, {0x0}}, 0xfffffdef) 08:00:11 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) ioctl$TIOCL_BLANKSCREEN(r1, 0x541c, &(0x7f0000000040)) r2 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$PIO_FONTX(r2, 0x4b6c, &(0x7f0000000080)={0x42, 0x11, &(0x7f00000002c0)="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"}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:11 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) (async) ioctl$VT_WAITACTIVE(r0, 0x5607) (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') 08:00:11 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 08:00:11 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r1, 0x0, 0x1, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x0, 0x4}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280), 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:11 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa06, {0x0}}, 0xfffffdef) 08:00:11 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) ioctl$VT_WAITACTIVE(r0, 0x5607) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') pipe(&(0x7f0000000140)) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) (async) ioctl$VT_WAITACTIVE(r0, 0x5607) (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') (async) 08:00:11 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async, rerun: 64) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 64) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) (async, rerun: 32) ioctl$TIOCL_BLANKSCREEN(r1, 0x541c, &(0x7f0000000040)) (async, rerun: 32) r2 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$PIO_FONTX(r2, 0x4b6c, &(0x7f0000000080)={0x42, 0x11, &(0x7f00000002c0)="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"}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:11 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x0, 0x4}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280), 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:11 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/\x0f\xa6g\x00') 08:00:11 executing program 0: write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x0, 0x4}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280), 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:11 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 08:00:11 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa0c, {0x0}}, 0xfffffdef) 08:00:11 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/\x0f\xa6g\x00') 08:00:11 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) ioctl$TIOCL_BLANKSCREEN(r1, 0x541c, &(0x7f0000000040)) (async) ioctl$TIOCL_BLANKSCREEN(r1, 0x541c, &(0x7f0000000040)) syz_open_dev$tty1(0xc, 0x4, 0x3) (async) r2 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$PIO_FONTX(r2, 0x4b6c, &(0x7f0000000080)={0x42, 0x11, &(0x7f00000002c0)="51230836c199df0ee9992c8b370cae89c45a889d15e12ec5dafc9901eb326ff436e30de07388e7b22f025f207ee726897e51685030de77377207861f33660a726ef8f74bf956a0a66743da0d5fc8a8f8631db8709ea030b4be43da0b86b4dcd23a32840ea832997d06ecce470c30ec2e09953e98cf9b8d5c35b5ee0a94ab229159bdba9e69879dc3d6ebe22b9dd9621ae5a688211b5a25ad80c28b082f2ae3217f85f651bf3ebb3af3e46843cbad6c23fdb06672fb7bbd69096790451a93df47cdf41d2abca3377aa530830f63394a5e03d224b2595092fd8cf2e88d297151e8ffa151e684b9b194f75f8cfdbf3e80c8e49112f518dd7fa225e9d7ecbf33c0745bf96b9b94ca2d370235489f586326b0724427e90de676fa6e143d3a758f18061d5707f7bdb3ad1ec64f46ba1d49497cd817e5f354949defe164a3e4752fa0c6d200e886eb1e632c8defeb59a87034e1652fe3517bf5529e946eea98434ebc9c8824c3044c9bb856034216737a0d0d4a3691cd1a911a6bc66b77f5261b268f5bc299bb7e253d94f2869e13f9b4c02301ff4b226e91377e934c764fa8ab161694a5172007064b88b4eba955cc40ad73441e512c55d39485c45f18763d6bc5117e6cd0f9f62775bf2ac30db5ea74d43a786795d14a5bfc956854b0071528794b812b296522743df83f6c151ffe6880f301c28a028778eccce049c700338aa8c484f9c202f76c8fac85096b8e497babb26b09732a967675c5e253c026c7f11c157aa614bd8b56002dcf6dd8be3e769479fb23e8f03cbc33d63595df4e1d307ddb8bbef7e407a84f3079a41f5cc9b7ae81a69195a3baadc97f003d52b5dd8cfb2e86046d66a4eb5a043b38c0f921a5f1d881f610c1d9e57b6092539c4301a6e901442e447241a279cd9ac8ca97730e41af0eac2be9ec5d9d7407fa0cbd465fbe3392faf6961bc531dee6d62684af71540e7ab15d87bfa837ff46f7c5b5db801d80ad77a35fd5876c128cb02e60826e57f41a14ab68c892b4d2f4e0b1174a959765933521333ad1f9bf6c5436dba4ee8a943128b34a817d99ea7801f81e4e294ba27286b9dcc2c53327bfc4b20bcce0f6ccc2355f35fd7229f8b6ec9ab0a9dc5bf37f5f279de739adef6b12d6cf8a003c7b184ccac616dbe8febac15566e7b0c87d799d75ce75f66dc8ce9422dd0e5bb045c01dd1edfde527f155637c0c1bfc7723dda0fd313785db01823686f20d40b3aba0ca2c57748a6254735075fb6fb1bef8f5d9fd087f8c939a27e29a57614bef65da5b1337c6d53f68afff6baf0ca3ae08820e95b2d50ac1c901f6e56665b7949f99c2dd48121118d07254c1bfc8fe2df0969f7561d45a608e02890e392fe88e68b73e45bdf1eff2327d03a6547ca8fdb3b7b3d0298e0526a75892f3aacb0bb89964df5790c472508c0ce2a4df87ba051e39"}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:11 executing program 0: write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x0, 0x4}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280), 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:11 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 08:00:11 executing program 4: prctl$PR_SET_NAME(0x27, 0x0) 08:00:11 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/\x0f\xa6g\x00') 08:00:11 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x2, 0xffffffffffffffff, 0x10, 0x0, @in={0x2, 0x4e23, @multicast1}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000000)={0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e20, 0x81, @empty, 0x6}}}, 0xa0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r3) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r3, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0, r1}}, 0x18) 08:00:11 executing program 0: write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x0, 0x4}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280), 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:11 executing program 4: prctl$PR_SET_NAME(0x27, 0x0) 08:00:11 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) connect$llc(r1, &(0x7f0000000000)={0x1a, 0x322, 0x81, 0x9, 0x3f, 0x20}, 0x10) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000700)={0x4e, 0x1, &(0x7f0000000300)="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"}) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x106, 0x8}}, 0x20) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x68, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x4c, 0x18, {0x6, @link='syz1\x00'}}}, ["", "", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x20000040}, 0x81) 08:00:11 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x2, 0xffffffffffffffff, 0x10, 0x0, @in={0x2, 0x4e23, @multicast1}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x2, 0xffffffffffffffff, 0x10, 0x0, @in={0x2, 0x4e23, @multicast1}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000000)={0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e20, 0x81, @empty, 0x6}}}, 0xa0) pipe(&(0x7f0000000140)) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r3) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r3, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0, r1}}, 0x18) 08:00:11 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0xfffffdef) 08:00:11 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 08:00:11 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, 0x0, 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x0, 0x4}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280), 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:11 executing program 4: prctl$PR_SET_NAME(0x27, 0x0) 08:00:11 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) connect$llc(r1, &(0x7f0000000000)={0x1a, 0x322, 0x81, 0x9, 0x3f, 0x20}, 0x10) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000700)={0x4e, 0x1, &(0x7f0000000300)="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"}) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x106, 0x8}}, 0x20) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x68, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x4c, 0x18, {0x6, @link='syz1\x00'}}}, ["", "", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x20000040}, 0x81) pipe(&(0x7f0000000140)) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) (async) connect$llc(r1, &(0x7f0000000000)={0x1a, 0x322, 0x81, 0x9, 0x3f, 0x20}, 0x10) (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') (async) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000700)={0x4e, 0x1, &(0x7f0000000300)="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"}) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x106, 0x8}}, 0x20) (async) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x68, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x4c, 0x18, {0x6, @link='syz1\x00'}}}, ["", "", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x20000040}, 0x81) (async) 08:00:11 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x2, 0xffffffffffffffff, 0x10, 0x0, @in={0x2, 0x4e23, @multicast1}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000000)={0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e20, 0x81, @empty, 0x6}}}, 0xa0) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r3) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r3, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0, r1}}, 0x18) 08:00:11 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x4, 0x40, {"945555763137682d327c5e6bbd0b5dbd"}, 0x0, 0x8, 0x7fffffffffffffff}}}, 0xa0) ioctl$IOC_WATCH_QUEUE_SET_FILTER(r0, 0x5761, &(0x7f0000000380)=ANY=[@ANYBLOB="05000000000000000000000000000000ff000000feffffffc5f2ffff000000800000000079000000ff030000040000000200000000000000fcffffffffffffff00000000d802000000040000e00f00000400000003000000050000000800000004000000321d00000500000002000000fbffffff01000000e2000000a32a0000090000008600000040000000c18d000001000000000400020900000002000000bb000000030000000300000000000000050000000900000000040000810000000300000000000000f9e00000020000000500000007000000080000003aee0000b32e0000c60cc8ad2da73d11d8728ce7f61ab077bd3822c9ff799ec25ec12ce18cb3a36cfa7fab992b8b1219073b6cb049ccb498584a895d6646f0a4a51256a63cddcd3f4d34d249fbebb090ae113d06fcf9883c022684d09cf85d994a3d053afdf9d1af3a1b04bd9bfa113a52721d9a22a27947d7ecf903b409ac29726e3458151afd2e0ca21117276a4141121bacf561a367d3626c"]) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:11 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, 0x0, 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x0, 0x4}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280), 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:11 executing program 4: prctl$PR_SET_NAME(0x26, &(0x7f0000000040)='/dev/bsg\x00') 08:00:11 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) (async) connect$llc(r1, &(0x7f0000000000)={0x1a, 0x322, 0x81, 0x9, 0x3f, 0x20}, 0x10) (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') (async) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000700)={0x4e, 0x1, &(0x7f0000000300)="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"}) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x106, 0x8}}, 0x20) (async) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x68, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x4c, 0x18, {0x6, @link='syz1\x00'}}}, ["", "", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x20000040}, 0x81) 08:00:11 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x4, 0x40, {"945555763137682d327c5e6bbd0b5dbd"}, 0x0, 0x8, 0x7fffffffffffffff}}}, 0xa0) ioctl$IOC_WATCH_QUEUE_SET_FILTER(r0, 0x5761, &(0x7f0000000380)=ANY=[@ANYBLOB="05000000000000000000000000000000ff000000feffffffc5f2ffff000000800000000079000000ff030000040000000200000000000000fcffffffffffffff00000000d802000000040000e00f00000400000003000000050000000800000004000000321d00000500000002000000fbffffff01000000e2000000a32a0000090000008600000040000000c18d000001000000000400020900000002000000bb000000030000000300000000000000050000000900000000040000810000000300000000000000f9e00000020000000500000007000000080000003aee0000b32e0000c60cc8ad2da73d11d8728ce7f61ab077bd3822c9ff799ec25ec12ce18cb3a36cfa7fab992b8b1219073b6cb049ccb498584a895d6646f0a4a51256a63cddcd3f4d34d249fbebb090ae113d06fcf9883c022684d09cf85d994a3d053afdf9d1af3a1b04bd9bfa113a52721d9a22a27947d7ecf903b409ac29726e3458151afd2e0ca21117276a4141121bacf561a367d3626c"]) (async, rerun: 32) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (rerun: 32) 08:00:11 executing program 4: prctl$PR_SET_NAME(0x26, &(0x7f0000000040)='/dev/bsg\x00') 08:00:11 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, 0x0, 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x0, 0x4}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280), 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:11 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x2}}, 0xfffffdef) 08:00:11 executing program 4: prctl$PR_SET_NAME(0x26, &(0x7f0000000040)='/dev/bsg\x00') 08:00:11 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 08:00:11 executing program 5: ioctl$TIOCSIG(0xffffffffffffffff, 0x40045436, 0x7) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) ioctl$PIO_FONTX(r1, 0x4b6c, &(0x7f00000004c0)={0x1f4, 0xf, &(0x7f00000000c0)="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"}) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') ioctl$TIOCSIG(r1, 0x40045436, 0x39) 08:00:11 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x4, 0x40, {"945555763137682d327c5e6bbd0b5dbd"}, 0x0, 0x8, 0x7fffffffffffffff}}}, 0xa0) (async) ioctl$IOC_WATCH_QUEUE_SET_FILTER(r0, 0x5761, &(0x7f0000000380)=ANY=[@ANYBLOB="05000000000000000000000000000000ff000000feffffffc5f2ffff000000800000000079000000ff030000040000000200000000000000fcffffffffffffff00000000d802000000040000e00f00000400000003000000050000000800000004000000321d00000500000002000000fbffffff01000000e2000000a32a0000090000008600000040000000c18d000001000000000400020900000002000000bb000000030000000300000000000000050000000900000000040000810000000300000000000000f9e00000020000000500000007000000080000003aee0000b32e0000c60cc8ad2da73d11d8728ce7f61ab077bd3822c9ff799ec25ec12ce18cb3a36cfa7fab992b8b1219073b6cb049ccb498584a895d6646f0a4a51256a63cddcd3f4d34d249fbebb090ae113d06fcf9883c022684d09cf85d994a3d053afdf9d1af3a1b04bd9bfa113a52721d9a22a27947d7ecf903b409ac29726e3458151afd2e0ca21117276a4141121bacf561a367d3626c"]) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:11 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x0, 0x4}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280), 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:11 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000040)=0x3) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:11 executing program 4: prctl$PR_SET_NAME(0x26, 0x0) 08:00:11 executing program 5: ioctl$TIOCSIG(0xffffffffffffffff, 0x40045436, 0x7) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) ioctl$PIO_FONTX(r1, 0x4b6c, &(0x7f00000004c0)={0x1f4, 0xf, &(0x7f00000000c0)="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"}) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') ioctl$TIOCSIG(r1, 0x40045436, 0x39) ioctl$TIOCSIG(0xffffffffffffffff, 0x40045436, 0x7) (async) pipe(&(0x7f0000000000)) (async) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) (async) ioctl$PIO_FONTX(r1, 0x4b6c, &(0x7f00000004c0)={0x1f4, 0xf, &(0x7f00000000c0)="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"}) (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') (async) ioctl$TIOCSIG(r1, 0x40045436, 0x39) (async) 08:00:12 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x0, 0x4}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280), 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:12 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 08:00:12 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) (async) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000040)=0x3) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:12 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x4}}, 0xfffffdef) 08:00:12 executing program 5: ioctl$TIOCSIG(0xffffffffffffffff, 0x40045436, 0x7) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) ioctl$PIO_FONTX(r1, 0x4b6c, &(0x7f00000004c0)={0x1f4, 0xf, &(0x7f00000000c0)="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"}) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') ioctl$TIOCSIG(r1, 0x40045436, 0x39) ioctl$TIOCSIG(0xffffffffffffffff, 0x40045436, 0x7) (async) pipe(&(0x7f0000000000)) (async) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000080)) (async) ioctl$PIO_FONTX(r1, 0x4b6c, &(0x7f00000004c0)={0x1f4, 0xf, &(0x7f00000000c0)="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"}) (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') (async) ioctl$TIOCSIG(r1, 0x40045436, 0x39) (async) 08:00:12 executing program 4: prctl$PR_SET_NAME(0x25, &(0x7f0000000040)='/dev/bsg\x00') 08:00:12 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x0, 0x4}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280), 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:12 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000040)=0x3) (async) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000040)=0x3) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:12 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6db}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 08:00:12 executing program 1: ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x6) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x10, 0x1, @ib={0x1b, 0x5, 0x80, {"cfa6261dcf9e925e142acb29c182beb9"}, 0xfffffffffffffffc, 0x43d2, 0x22ea}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040), 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:12 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x0, 0x4}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280), 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:12 executing program 4: prctl$PR_SET_NAME(0x25, &(0x7f0000000040)='/dev/bsg\x00') 08:00:12 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) ioctl$SIOCX25SENDCALLACCPT(r0, 0x89e9) 08:00:12 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x0, 0x4}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280), 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:12 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) (async, rerun: 64) ioctl$SIOCX25SENDCALLACCPT(r0, 0x89e9) (rerun: 64) 08:00:12 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x5}}, 0xfffffdef) 08:00:12 executing program 1: ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x6) (async) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x10, 0x1, @ib={0x1b, 0x5, 0x80, {"cfa6261dcf9e925e142acb29c182beb9"}, 0xfffffffffffffffc, 0x43d2, 0x22ea}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040), 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:12 executing program 4: prctl$PR_SET_NAME(0x25, &(0x7f0000000040)='/dev/bsg\x00') 08:00:12 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) ioctl$SIOCX25SENDCALLACCPT(r0, 0x89e9) 08:00:12 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 08:00:12 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x0, 0x4}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280), 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:12 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bs_\x00') 08:00:12 executing program 4: prctl$PR_SET_NAME(0x25, 0x0) 08:00:12 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280), 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:12 executing program 1: ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x6) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x10, 0x1, @ib={0x1b, 0x5, 0x80, {"cfa6261dcf9e925e142acb29c182beb9"}, 0xfffffffffffffffc, 0x43d2, 0x22ea}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040), 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x6) (async) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x10, 0x1, @ib={0x1b, 0x5, 0x80, {"cfa6261dcf9e925e142acb29c182beb9"}, 0xfffffffffffffffc, 0x43d2, 0x22ea}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040), 0x2, 0xa}}, 0x20) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) 08:00:12 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bs_\x00') 08:00:12 executing program 4: prctl$PR_SET_NAME(0x25, 0x0) 08:00:12 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x6}}, 0xfffffdef) 08:00:12 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bs_\x00') 08:00:12 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280), 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:12 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6400}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 08:00:12 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x1}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:12 executing program 4: prctl$PR_SET_NAME(0x25, 0x0) 08:00:12 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x1}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:12 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280), 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:12 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280), 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:12 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) bind$x25(r0, &(0x7f0000000000), 0x12) 08:00:12 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x1}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:12 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}, 0x0, 0x4}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280), 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:12 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x8}}, 0xfffffdef) 08:00:12 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdb06}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 08:00:12 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) (async) bind$x25(r0, &(0x7f0000000000), 0x12) 08:00:12 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f00000003c0)="734ece59d31d6d706a44e13eaa5f9cc914f7e666f98f0810821b4519a6a181b1352b1c0359bbf5e84ada4e8f5ebf96066090bc10583a7c135fd3da9f1564222309c874df899ae6c310c38568fe5e6affcfd68bce178fae1d7723b0690cb916a7f9f134d56bbf8d845076edbdc0aa19d8c12a91c4d9c8d89090ae1b21260d776e82fe013523db255733cbfa1db1fecf205924deb649daf0ad5a16") write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000040)={'ip_vti0\x00', &(0x7f0000000280)={'gre0\x00', 0x0, 0x700, 0x7, 0x1, 0x8, {{0x43, 0x4, 0x1, 0x7, 0x10c, 0x68, 0x0, 0x3f, 0x4, 0x0, @remote, @remote, {[@rr={0x7, 0xb, 0x99, [@private=0xa010102, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @cipso={0x86, 0x6b, 0x3, [{0x3, 0x5, "4f49dc"}, {0x7, 0xe, "23fd5148151e45dfd58da153"}, {0x0, 0x5, "fe12b9"}, {0x7, 0xd, "824d43d43440b3970ec9cf"}, {0x2, 0x12, "49535bdbf9274fd501aa352e0d056aae"}, {0x6, 0x8, "79a9cee9a370"}, {0x7, 0xd, "e726dcde36e17d9e2ccdaf"}, {0x0, 0x8, "a6f04cb4c522"}, {0x7, 0x11, "0d1440ad9fdad08725240557dd0b66"}]}, @ssrr={0x89, 0x2b, 0x6, [@local, @rand_addr=0x64010100, @local, @remote, @private=0xa010102, @initdev={0xac, 0x1e, 0x1, 0x0}, @local, @local, @local, @multicast2]}, @timestamp_addr={0x44, 0x4c, 0x93, 0x1, 0x3, [{@loopback, 0x1000}, {@multicast1, 0x4}, {@private=0xa010100, 0x3}, {@remote, 0x3}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8}, {@broadcast, 0x100}, {@remote, 0x6}, {@broadcast, 0x6}, {@multicast1, 0x7}]}, @timestamp={0x44, 0x4, 0x36, 0x0, 0x4}, @generic={0x82, 0x5, "4aab76"}]}}}}}) 08:00:12 executing program 4: prctl$PR_SET_NAME(0x25, 0x0) 08:00:12 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280), 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:12 executing program 4: prctl$PR_SET_NAME(0x25, 0x0) 08:00:12 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) (async, rerun: 32) ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f00000003c0)="734ece59d31d6d706a44e13eaa5f9cc914f7e666f98f0810821b4519a6a181b1352b1c0359bbf5e84ada4e8f5ebf96066090bc10583a7c135fd3da9f1564222309c874df899ae6c310c38568fe5e6affcfd68bce178fae1d7723b0690cb916a7f9f134d56bbf8d845076edbdc0aa19d8c12a91c4d9c8d89090ae1b21260d776e82fe013523db255733cbfa1db1fecf205924deb649daf0ad5a16") (async, rerun: 32) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000040)={'ip_vti0\x00', &(0x7f0000000280)={'gre0\x00', 0x0, 0x700, 0x7, 0x1, 0x8, {{0x43, 0x4, 0x1, 0x7, 0x10c, 0x68, 0x0, 0x3f, 0x4, 0x0, @remote, @remote, {[@rr={0x7, 0xb, 0x99, [@private=0xa010102, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @cipso={0x86, 0x6b, 0x3, [{0x3, 0x5, "4f49dc"}, {0x7, 0xe, "23fd5148151e45dfd58da153"}, {0x0, 0x5, "fe12b9"}, {0x7, 0xd, "824d43d43440b3970ec9cf"}, {0x2, 0x12, "49535bdbf9274fd501aa352e0d056aae"}, {0x6, 0x8, "79a9cee9a370"}, {0x7, 0xd, "e726dcde36e17d9e2ccdaf"}, {0x0, 0x8, "a6f04cb4c522"}, {0x7, 0x11, "0d1440ad9fdad08725240557dd0b66"}]}, @ssrr={0x89, 0x2b, 0x6, [@local, @rand_addr=0x64010100, @local, @remote, @private=0xa010102, @initdev={0xac, 0x1e, 0x1, 0x0}, @local, @local, @local, @multicast2]}, @timestamp_addr={0x44, 0x4c, 0x93, 0x1, 0x3, [{@loopback, 0x1000}, {@multicast1, 0x4}, {@private=0xa010100, 0x3}, {@remote, 0x3}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8}, {@broadcast, 0x100}, {@remote, 0x6}, {@broadcast, 0x6}, {@multicast1, 0x7}]}, @timestamp={0x44, 0x4, 0x36, 0x0, 0x4}, @generic={0x82, 0x5, "4aab76"}]}}}}}) 08:00:12 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) bind$x25(r0, &(0x7f0000000000), 0x12) 08:00:12 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280), 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:12 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280), 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:12 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f00000003c0)="734ece59d31d6d706a44e13eaa5f9cc914f7e666f98f0810821b4519a6a181b1352b1c0359bbf5e84ada4e8f5ebf96066090bc10583a7c135fd3da9f1564222309c874df899ae6c310c38568fe5e6affcfd68bce178fae1d7723b0690cb916a7f9f134d56bbf8d845076edbdc0aa19d8c12a91c4d9c8d89090ae1b21260d776e82fe013523db255733cbfa1db1fecf205924deb649daf0ad5a16") (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000040)={'ip_vti0\x00', &(0x7f0000000280)={'gre0\x00', 0x0, 0x700, 0x7, 0x1, 0x8, {{0x43, 0x4, 0x1, 0x7, 0x10c, 0x68, 0x0, 0x3f, 0x4, 0x0, @remote, @remote, {[@rr={0x7, 0xb, 0x99, [@private=0xa010102, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @cipso={0x86, 0x6b, 0x3, [{0x3, 0x5, "4f49dc"}, {0x7, 0xe, "23fd5148151e45dfd58da153"}, {0x0, 0x5, "fe12b9"}, {0x7, 0xd, "824d43d43440b3970ec9cf"}, {0x2, 0x12, "49535bdbf9274fd501aa352e0d056aae"}, {0x6, 0x8, "79a9cee9a370"}, {0x7, 0xd, "e726dcde36e17d9e2ccdaf"}, {0x0, 0x8, "a6f04cb4c522"}, {0x7, 0x11, "0d1440ad9fdad08725240557dd0b66"}]}, @ssrr={0x89, 0x2b, 0x6, [@local, @rand_addr=0x64010100, @local, @remote, @private=0xa010102, @initdev={0xac, 0x1e, 0x1, 0x0}, @local, @local, @local, @multicast2]}, @timestamp_addr={0x44, 0x4c, 0x93, 0x1, 0x3, [{@loopback, 0x1000}, {@multicast1, 0x4}, {@private=0xa010100, 0x3}, {@remote, 0x3}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8}, {@broadcast, 0x100}, {@remote, 0x6}, {@broadcast, 0x6}, {@multicast1, 0x7}]}, @timestamp={0x44, 0x4, 0x36, 0x0, 0x4}, @generic={0x82, 0x5, "4aab76"}]}}}}}) 08:00:12 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0xc}}, 0xfffffdef) 08:00:12 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') ioctl$PTP_EXTTS_REQUEST(0xffffffffffffffff, 0x40103d02, &(0x7f00000000c0)={0xe53a, 0xb}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 08:00:12 executing program 4: prctl$PR_SET_NAME(0x25, 0x0) 08:00:12 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 08:00:12 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280), 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:12 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:12 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) 08:00:12 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') (async) ioctl$PTP_EXTTS_REQUEST(0xffffffffffffffff, 0x40103d02, &(0x7f00000000c0)={0xe53a, 0xb}) (async) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 08:00:12 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:12 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x2}}, 0xfffffdef) 08:00:12 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') ioctl$PTP_EXTTS_REQUEST(0xffffffffffffffff, 0x40103d02, &(0x7f00000000c0)={0xe53a, 0xb}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 08:00:12 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:13 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x10}}, 0xfffffdef) 08:00:13 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:13 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000080)='/dev/bsg\x00?R\x80\xab\xd9X\xf3\xdd\a\xe6+\x8f(\xf6\x06\x7fF\xb3\xf9S\",\b\xbd\xcd\x00\x00\x01\x00\x00\x00\x00\x00\xf1\xd6\x1b\xa8z\x00\x00\x00\x00\x00\xbe\xe9\xbaX\x0ez\xb9\x93w\x86\xea\xa9\xfa\x98\x96\xe3b\xbeY\bH_X9tw\xe7\xe6f1\xd4\xa9P\x84\xd9k\x18h\xa6\x89jU:\xcd$\xc6\xd6\xe6\xe6\xc4\xdf,\xdf&B\xc4\xa4;\xb93*\x06|\f\x95w\xcc3M\x18uG\xc9\xb26Pe\xf8j\x02#\xdc&\xd0\x12\x0f\xd6\xc95K:\x92T8\x8b\x12\x9c\xa2\b\x82\x88\xb8\x1f\x84)\xf2\xe5e\xe7\xe5\xe4\xfa4\xe6D\xffU\xf9%\x11\xa2\xa5\x06\x96r\x91\x10\xee(Z\x96#\xfdx^\x85\xef\xf4Ue)\xf0\xa1\xf6c\xe3\\\xd8!\xf9Q\x81\x92\x93\x92v\xff>\xb4\x84\x14\xa52\xb9:C\xf2\x19\xee\xa8\xbb\x9f\x0el\xc97j.a\r\x9d\x99p\xf3\x9e\xb8,\xf5U\xc3\x88\xa6w\xe1\xfa$\xb4\x00\xcec-\x17\x06\xec\xa0\xe8k)\xda\xf9\xe5\x9d\x87\x8e\x8a\xbd\xd6\xda\a\xcfn>\x03') r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2080, 0x0) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f0000000040)={0x1, 0x2}) prctl$PR_CAPBSET_READ(0x17, 0x18) ioctl$PTP_EXTTS_REQUEST(r0, 0x40103d02, &(0x7f00000001c0)={0x1, 0x1}) 08:00:13 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400300}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 08:00:13 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) ioctl$PTP_CLOCK_GETCAPS(r0, 0x80503d01, &(0x7f0000000040)) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000012c0)=0x20404, 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f0000000280)=""/4096) openat$random(0xffffffffffffff9c, &(0x7f0000001280), 0x10b300, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) ioctl$TIOCSIG(r0, 0x40045436, 0x2b) 08:00:13 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) ioctl$PTP_CLOCK_GETCAPS(r0, 0x80503d01, &(0x7f0000000040)) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000012c0)=0x20404, 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f0000000280)=""/4096) openat$random(0xffffffffffffff9c, &(0x7f0000001280), 0x10b300, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) ioctl$TIOCSIG(r0, 0x40045436, 0x2b) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) ioctl$PTP_CLOCK_GETCAPS(r0, 0x80503d01, &(0x7f0000000040)) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) pipe(&(0x7f0000000140)) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) (async) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000012c0)=0x20404, 0x4) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f0000000280)=""/4096) (async) openat$random(0xffffffffffffff9c, &(0x7f0000001280), 0x10b300, 0x0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) ioctl$TIOCSIG(r0, 0x40045436, 0x2b) (async) 08:00:13 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000080)='/dev/bsg\x00?R\x80\xab\xd9X\xf3\xdd\a\xe6+\x8f(\xf6\x06\x7fF\xb3\xf9S\",\b\xbd\xcd\x00\x00\x01\x00\x00\x00\x00\x00\xf1\xd6\x1b\xa8z\x00\x00\x00\x00\x00\xbe\xe9\xbaX\x0ez\xb9\x93w\x86\xea\xa9\xfa\x98\x96\xe3b\xbeY\bH_X9tw\xe7\xe6f1\xd4\xa9P\x84\xd9k\x18h\xa6\x89jU:\xcd$\xc6\xd6\xe6\xe6\xc4\xdf,\xdf&B\xc4\xa4;\xb93*\x06|\f\x95w\xcc3M\x18uG\xc9\xb26Pe\xf8j\x02#\xdc&\xd0\x12\x0f\xd6\xc95K:\x92T8\x8b\x12\x9c\xa2\b\x82\x88\xb8\x1f\x84)\xf2\xe5e\xe7\xe5\xe4\xfa4\xe6D\xffU\xf9%\x11\xa2\xa5\x06\x96r\x91\x10\xee(Z\x96#\xfdx^\x85\xef\xf4Ue)\xf0\xa1\xf6c\xe3\\\xd8!\xf9Q\x81\x92\x93\x92v\xff>\xb4\x84\x14\xa52\xb9:C\xf2\x19\xee\xa8\xbb\x9f\x0el\xc97j.a\r\x9d\x99p\xf3\x9e\xb8,\xf5U\xc3\x88\xa6w\xe1\xfa$\xb4\x00\xcec-\x17\x06\xec\xa0\xe8k)\xda\xf9\xe5\x9d\x87\x8e\x8a\xbd\xd6\xda\a\xcfn>\x03') r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2080, 0x0) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f0000000040)={0x1, 0x2}) prctl$PR_CAPBSET_READ(0x17, 0x18) ioctl$PTP_EXTTS_REQUEST(r0, 0x40103d02, &(0x7f00000001c0)={0x1, 0x1}) prctl$PR_SET_NAME(0xf, &(0x7f0000000080)='/dev/bsg\x00?R\x80\xab\xd9X\xf3\xdd\a\xe6+\x8f(\xf6\x06\x7fF\xb3\xf9S\",\b\xbd\xcd\x00\x00\x01\x00\x00\x00\x00\x00\xf1\xd6\x1b\xa8z\x00\x00\x00\x00\x00\xbe\xe9\xbaX\x0ez\xb9\x93w\x86\xea\xa9\xfa\x98\x96\xe3b\xbeY\bH_X9tw\xe7\xe6f1\xd4\xa9P\x84\xd9k\x18h\xa6\x89jU:\xcd$\xc6\xd6\xe6\xe6\xc4\xdf,\xdf&B\xc4\xa4;\xb93*\x06|\f\x95w\xcc3M\x18uG\xc9\xb26Pe\xf8j\x02#\xdc&\xd0\x12\x0f\xd6\xc95K:\x92T8\x8b\x12\x9c\xa2\b\x82\x88\xb8\x1f\x84)\xf2\xe5e\xe7\xe5\xe4\xfa4\xe6D\xffU\xf9%\x11\xa2\xa5\x06\x96r\x91\x10\xee(Z\x96#\xfdx^\x85\xef\xf4Ue)\xf0\xa1\xf6c\xe3\\\xd8!\xf9Q\x81\x92\x93\x92v\xff>\xb4\x84\x14\xa52\xb9:C\xf2\x19\xee\xa8\xbb\x9f\x0el\xc97j.a\r\x9d\x99p\xf3\x9e\xb8,\xf5U\xc3\x88\xa6w\xe1\xfa$\xb4\x00\xcec-\x17\x06\xec\xa0\xe8k)\xda\xf9\xe5\x9d\x87\x8e\x8a\xbd\xd6\xda\a\xcfn>\x03') (async) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2080, 0x0) (async) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f0000000040)={0x1, 0x2}) (async) prctl$PR_CAPBSET_READ(0x17, 0x18) (async) ioctl$PTP_EXTTS_REQUEST(r0, 0x40103d02, &(0x7f00000001c0)={0x1, 0x1}) (async) 08:00:13 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:13 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:13 executing program 4: prctl$PR_SET_NAME(0x23, &(0x7f0000000040)='/dev/bsg\x00') 08:00:13 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000080)='/dev/bsg\x00?R\x80\xab\xd9X\xf3\xdd\a\xe6+\x8f(\xf6\x06\x7fF\xb3\xf9S\",\b\xbd\xcd\x00\x00\x01\x00\x00\x00\x00\x00\xf1\xd6\x1b\xa8z\x00\x00\x00\x00\x00\xbe\xe9\xbaX\x0ez\xb9\x93w\x86\xea\xa9\xfa\x98\x96\xe3b\xbeY\bH_X9tw\xe7\xe6f1\xd4\xa9P\x84\xd9k\x18h\xa6\x89jU:\xcd$\xc6\xd6\xe6\xe6\xc4\xdf,\xdf&B\xc4\xa4;\xb93*\x06|\f\x95w\xcc3M\x18uG\xc9\xb26Pe\xf8j\x02#\xdc&\xd0\x12\x0f\xd6\xc95K:\x92T8\x8b\x12\x9c\xa2\b\x82\x88\xb8\x1f\x84)\xf2\xe5e\xe7\xe5\xe4\xfa4\xe6D\xffU\xf9%\x11\xa2\xa5\x06\x96r\x91\x10\xee(Z\x96#\xfdx^\x85\xef\xf4Ue)\xf0\xa1\xf6c\xe3\\\xd8!\xf9Q\x81\x92\x93\x92v\xff>\xb4\x84\x14\xa52\xb9:C\xf2\x19\xee\xa8\xbb\x9f\x0el\xc97j.a\r\x9d\x99p\xf3\x9e\xb8,\xf5U\xc3\x88\xa6w\xe1\xfa$\xb4\x00\xcec-\x17\x06\xec\xa0\xe8k)\xda\xf9\xe5\x9d\x87\x8e\x8a\xbd\xd6\xda\a\xcfn>\x03') r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2080, 0x0) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f0000000040)={0x1, 0x2}) prctl$PR_CAPBSET_READ(0x17, 0x18) ioctl$PTP_EXTTS_REQUEST(r0, 0x40103d02, &(0x7f00000001c0)={0x1, 0x1}) prctl$PR_SET_NAME(0xf, &(0x7f0000000080)='/dev/bsg\x00?R\x80\xab\xd9X\xf3\xdd\a\xe6+\x8f(\xf6\x06\x7fF\xb3\xf9S\",\b\xbd\xcd\x00\x00\x01\x00\x00\x00\x00\x00\xf1\xd6\x1b\xa8z\x00\x00\x00\x00\x00\xbe\xe9\xbaX\x0ez\xb9\x93w\x86\xea\xa9\xfa\x98\x96\xe3b\xbeY\bH_X9tw\xe7\xe6f1\xd4\xa9P\x84\xd9k\x18h\xa6\x89jU:\xcd$\xc6\xd6\xe6\xe6\xc4\xdf,\xdf&B\xc4\xa4;\xb93*\x06|\f\x95w\xcc3M\x18uG\xc9\xb26Pe\xf8j\x02#\xdc&\xd0\x12\x0f\xd6\xc95K:\x92T8\x8b\x12\x9c\xa2\b\x82\x88\xb8\x1f\x84)\xf2\xe5e\xe7\xe5\xe4\xfa4\xe6D\xffU\xf9%\x11\xa2\xa5\x06\x96r\x91\x10\xee(Z\x96#\xfdx^\x85\xef\xf4Ue)\xf0\xa1\xf6c\xe3\\\xd8!\xf9Q\x81\x92\x93\x92v\xff>\xb4\x84\x14\xa52\xb9:C\xf2\x19\xee\xa8\xbb\x9f\x0el\xc97j.a\r\x9d\x99p\xf3\x9e\xb8,\xf5U\xc3\x88\xa6w\xe1\xfa$\xb4\x00\xcec-\x17\x06\xec\xa0\xe8k)\xda\xf9\xe5\x9d\x87\x8e\x8a\xbd\xd6\xda\a\xcfn>\x03') (async) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2080, 0x0) (async) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f0000000040)={0x1, 0x2}) (async) prctl$PR_CAPBSET_READ(0x17, 0x18) (async) ioctl$PTP_EXTTS_REQUEST(r0, 0x40103d02, &(0x7f00000001c0)={0x1, 0x1}) (async) 08:00:13 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) ioctl$PTP_CLOCK_GETCAPS(r0, 0x80503d01, &(0x7f0000000040)) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000012c0)=0x20404, 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f0000000280)=""/4096) openat$random(0xffffffffffffff9c, &(0x7f0000001280), 0x10b300, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) ioctl$TIOCSIG(r0, 0x40045436, 0x2b) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) ioctl$PTP_CLOCK_GETCAPS(r0, 0x80503d01, &(0x7f0000000040)) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) (async) pipe(&(0x7f0000000140)) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) (async) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000012c0)=0x20404, 0x4) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) (async) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f0000000280)=""/4096) (async) openat$random(0xffffffffffffff9c, &(0x7f0000001280), 0x10b300, 0x0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) (async) ioctl$TIOCSIG(r0, 0x40045436, 0x2b) (async) 08:00:13 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x204}}, 0xfffffdef) 08:00:13 executing program 2: socket$inet(0x2, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pselect6(0xc, &(0x7f0000000080)={0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 08:00:13 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) ioctl$PIO_FONTX(r1, 0x4b6c, &(0x7f00000008c0)={0x117, 0x1f, &(0x7f00000004c0)="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"}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000002c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000100), 0x2, r3, 0x10, 0x1, @in={0x2, 0x4e20, @broadcast}}}, 0xa0) getsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f00000000c0)=[{}, {}, {}], &(0x7f0000000080)=0x18) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000240), r2) sendmsg$DEVLINK_CMD_RATE_DEL(r2, &(0x7f0000000480)={&(0x7f0000000200), 0xc, &(0x7f0000000440)={&(0x7f0000000380)={0x88, r4, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@DEVLINK_ATTR_PORT_INDEX={0x8, 0x3, 0x3}, @DEVLINK_ATTR_PORT_INDEX={0x8}, @DEVLINK_ATTR_PORT_INDEX={0x8, 0x3, 0x1}, @handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @handle=@pci={{0x8}, {0x11}}, @handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x88}, 0x1, 0x0, 0x0, 0x4008000}, 0x40000) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r5) ioctl$TIOCSISO7816(r5, 0xc0285443, &(0x7f0000000900)={0xffff7653, 0x7, 0x20, 0x1, 0x8}) r6 = syz_open_procfs(0x0, &(0x7f0000000940)='mountstats\x00') ioctl$TIOCGPKT(r6, 0x80045438, &(0x7f0000000980)) 08:00:13 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) ioctl$TIOCGDEV(r2, 0x80045432, &(0x7f0000000040)) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) ioctl$SIOCX25SDTEFACILITIES(r1, 0x89eb, &(0x7f0000000080)={0xfbe, 0x1, 0x5, 0x80, 0x60, 0x13, 0xf, "f4797c6c4f694249f644237252bf285bf2b87784", "aa6e71978f4be9e47c349f4bf48c04c4e550eeb0"}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:13 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:13 executing program 4: prctl$PR_SET_NAME(0x23, &(0x7f0000000040)='/dev/bsg\x00') 08:00:13 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) ioctl$TIOCGDEV(r2, 0x80045432, &(0x7f0000000040)) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) ioctl$SIOCX25SDTEFACILITIES(r1, 0x89eb, &(0x7f0000000080)={0xfbe, 0x1, 0x5, 0x80, 0x60, 0x13, 0xf, "f4797c6c4f694249f644237252bf285bf2b87784", "aa6e71978f4be9e47c349f4bf48c04c4e550eeb0"}) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:13 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x0, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:13 executing program 4: prctl$PR_SET_NAME(0x23, &(0x7f0000000040)='/dev/bsg\x00') 08:00:13 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) (async) ioctl$PIO_FONTX(r1, 0x4b6c, &(0x7f00000008c0)={0x117, 0x1f, &(0x7f00000004c0)="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"}) (async) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000002c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000100), 0x2, r3, 0x10, 0x1, @in={0x2, 0x4e20, @broadcast}}}, 0xa0) (async) getsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f00000000c0)=[{}, {}, {}], &(0x7f0000000080)=0x18) (async) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000240), r2) sendmsg$DEVLINK_CMD_RATE_DEL(r2, &(0x7f0000000480)={&(0x7f0000000200), 0xc, &(0x7f0000000440)={&(0x7f0000000380)={0x88, r4, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@DEVLINK_ATTR_PORT_INDEX={0x8, 0x3, 0x3}, @DEVLINK_ATTR_PORT_INDEX={0x8}, @DEVLINK_ATTR_PORT_INDEX={0x8, 0x3, 0x1}, @handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @handle=@pci={{0x8}, {0x11}}, @handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x88}, 0x1, 0x0, 0x0, 0x4008000}, 0x40000) (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/bsg\x00') (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r5) (async) ioctl$TIOCSISO7816(r5, 0xc0285443, &(0x7f0000000900)={0xffff7653, 0x7, 0x20, 0x1, 0x8}) r6 = syz_open_procfs(0x0, &(0x7f0000000940)='mountstats\x00') ioctl$TIOCGPKT(r6, 0x80045438, &(0x7f0000000980)) 08:00:13 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"699aa3220ca08d1eea433001faffdde5"}}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x0, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 08:00:13 executing program 4: prctl$PR_SET_NAME(0x23, 0x0) 08:00:13 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x551701, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x402}}, 0xfffffdef) 08:00:13 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r1) ioctl$PIO_FONTX(r1, 0x4b6c, &(0x7f00000008c0)={0x